Page 77 - Cyber Defense eMagazine - September 2017
P. 77

Nation State Threats



               Each  nation-state  cyber  threat  actor  has  its  own  goals  and  reasons  for  conducting  cyber
               attacks. Some state-sponsored actors concentrate their efforts on espionage, while others focus
               on warfare-type operations. While these types of actors rarely turn their attention to generating
               money, they are nonetheless well-funded, typically through consistent money streams from their
               respective governments.



               Since at least 2001, China has focused almost exclusively on espionage-driven cyber attacks.
               Their goal has been to steal key intelligence information and intellectual property secrets in the
               hopes  of  replicating,  or  even  surpassing,  America’s  innovative  edge.  Chinese  cyber  attacks
               have been so successful in the intellectual property area that some Chinese manufacturers can
               actually  build  an  American  company's  product during the  day—and  then  at  night  change the
               same assembly line to print a Chinese company's logo on the product.



               In other cases, Chinese-affiliated cyber actors infiltrate major global corporations to gain insight
               into mergers and acquisitions. In these cases, Chinese companies are usually seeking an edge
               in order to outbid the U.S. or another western company. They accomplish this by understanding
               the bottom line prior to commencement of formal negotiations.



               In 2014, Russia established a goal of resurrecting the might of the former USSR. To this end,
               the  country  has  greatly  expanded  its  cyber  operations  over  the  last  three  years  in  a  multi-
               pronged approach. This comprises not only espionage operations, but information warfare as
               well. Demonstrated tellingly during the 2016 U.S. election cycle, Russia’s information warfare
               capability was extremely successful, using asymmetric operations involving proxy organizations
               such  as  Wikileaks.  The  Russians  managed  to  hack  countless  Republican  and  Democratic-
               based political organizations with little effort and to damage those they were most interested in.



               Attackers Work More Methodically Than First Thought

               Today’s  attackers  have  formerly  unsuspected  commonalities,  actually  operating  in  a  unified,
               professionalized, and sophisticated manner when conducting cyber attacks. We like to think of
               attackers as a disjointed set of individuals loosely collaborating—when in fact they often work
               more as an assembly line; from a technical perspective, they are quite routine. Cyber actors rely
               on operational efficiency, reusable modular toolkits, and infrastructure stability to attack a large
               number of targets successfully.





                    77   Cyber Defense eMagazine – September 2017 Edition
                         Copyright © Cyber Defense Magazine,  All rights reserved worldwide.
   72   73   74   75   76   77   78   79   80   81   82