Page 46 - Cyber Defense eMagazine for September 2020
P. 46

State-sponsored hackers have found a preference for corporate espionage, the exfiltration of intellectual
            property to narrow the technological gap with competing nations, the stealing of PII and CII data for
            financial gain, and defaming adversaries to further socio-political agendas.

            Hackers  have  explored  new  attack  surfaces  as  industry  and  country  IT  systems  have  remained
            vulnerable  with  poorly  configured  and  outdated  programs  and  applications.  Weak  applications  or
            networks become a test field for hackers as they carry out advanced persistent threat (APT) attacks, first
            establishing long-term connections, then understanding the architecture of the targeted organization, and
            finally starting to mine sensitive data such as PII, official documents, agreements, compliance data, etc.
            The Anthem APT attack, which compromised almost 80 million customer PII data, is a popular example
            of such an attack.

            It  is  now  of  utmost  importance  for  governments  and  businesses  to  adopt  a  predictive  approach  to
            protecting their reputation, ensuring business continuity and protecting national interests. However, this
            can only be achieved by going deep into the hacker trenches to gain real-time cyber threat visibility. To
            this end, we need a platform that can discover evolving threats, decode and segregate valuable cyber
            threat insights from the vast amount of data available.

            In order to beat hackers in their own game, cyber intelligence is needed for businesses to take action
            against unseen threats. Having a platform that allows one to predict a cyberattack is needed more than
            ever before. And there's one that fits the bill – CYFIRM's DeCYFIR.

            Using DeCYFIR, CYFIRMA researchers analyzed data sources across deep / dark web, hacker forums
            and closed communities, and uncovered the following cyber-war threat scenarios.



            • Trade wars fueling cybercrime and cyber warfare

            The ongoing trade war between two of the world's largest economies – the US and China – has already
            created a geopolitical strain. The US has long accused China of unfair trade and theft of intellectual
            property. The race for political and technological supremacy has now fueled cyber warfare.



            • Geopolitical conflicts between neighboring countries

            Relations between Japan and South Korea, China and India, China and Australia have deteriorated
            rapidly over wartime issues and bilateral trade differences.


            War hysteria, historical differences, and geopolitical supremacy will lead state-sponsored hackers to push
            their cyberattack threshold to a limit. Social hacktivists, political parties and large corporations will be
            drawn to cybercrime as a means of achieving business and political objectives, fueling the expansion of
            the hackers-for-hire economy.









            Cyber Defense eMagazine – September 2020 Edition                                                                                                                                                                                                         46
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   41   42   43   44   45   46   47   48   49   50   51