Cybercrime Links To Russian State Hackers

In 2015, there were over one million cyber-attacks on individuals and companies every day, and that is why even the strongest US response to the theft of the Democratic National Committee emails will do little to deter future state-sponsored attacks, cybersecurity experts say.

The sheer volume and increasing sophistication of network attacks provide plausible deniability to state-sponsored groups, like the APT 28 and APT 29 thought to be behind the DNC hack, says Christopher Porter, of cybersecurity company FireEye.

“One of the key factors that makes these Russian operations doable is that sophisticated criminal groups have APT-like capabilities and go after similar targets,” said Porter, whose company first documented APT 29’s ties to the Kremlin in 2014.“The best criminals use some of the same tools that lower-end states might use.”

Recognizing the valuable cover this provides, the “Russian government has been intentionally blurring the lines between cyber activists, criminals and state-paid hackers,” said Jarno Limnell, vice president for cybersecurity at Insta Group Oy.

This makes it hard to conclusively attribute an attack to a particular government, and all but impossible to respond firmly. So Western countries have thus far remained “fairly quiet” in the face of various Russian provocations, and that has only emboldened Moscow, Limnell said.

“The increase in state-sponsored cyber-attacks of Russia is the result of a perception that there is not a significant ‘price to pay’ for such activities,” he said. “Russia will keep pushing more aggressive and sophisticated cyber operations as long as the West doesn’t push back.”

The restrained US response to the DNC theft fits that pattern. When asked about the motives behind the attack, President Barack Obama deferred to the ongoing FBI investigation, and simultaneously acknowledged the reality of Russia’s aggressive online behavior.

“What we do know is that the Russians hack our systems, not just government systems but private systems,” Obama told NBC in a recent interview. “What the motives were in terms of the leaks, all that, I can’t say directly. What I do know is that Donald Trump has repeatedly expressed admiration for Vladi­mir Putin.”

Russia’s information warfare, efforts to create a positive image of itself while “breaking the internal coherence” of its adversaries with tactics ranging from shutting down Ukraine’s power grid to deploying online troll armies to shape public opinion, is the central thread knitting together the country’s theory of Next-Generation Warfare, according to a review of the strategy published last year by the Institut Francais des Relations Internationales.

“The informational campaign is an uninterrupted (bezpriryvnost) strategic effort,” wrote Dima Adamsky, the study’s author and a professor of government, diplomacy and strategy at the Interdisciplinary Center Herzliya in Israel. “It is waged during ‘peacetime’ and wartime, simultaneously in domestic, the adversary’s and international media domains and in all spheres of new media.”

The US government’s response to the DNC leak is unlikely to curtail the Russians’ use of offensive cyber campaigns, said Tobias Feakin of the Australian Strategic Policy Institute. Cyber-attacks and other informational manipulations of the socio-political landscapes are too well integrated into the Russian doctrine.

“The chances are that a strong public response would lead to Russian activity dropping for a short time, but more often than not this would pick up again once they felt the storm had passed, and they had developed new means of achieving the same goals,” said Feakin, the director of ASPI’s International Cyber Policy Center.

Longer-term solutions require a more comprehensive and serious approach, said Porter, who heads FireEye’s strategic intelligence and forecasting arm. Governments must tamp down sophisticated cyber-crime and deny state-sponsored attackers their camouflage. “A lack of attention to cyber-crime has enabled this to be something that’s doable,” he said. “Large-scale cyber-crime needs to be recognized as a national security issue.”

DefenseOne: http://bit.ly/2bbKb7l

 

« Anatomy Of Cyber Jihad
Benefits of Penetration Testing »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

RKH Specialty

RKH Specialty

RKH Specialty, part of the Hyperion Insurance Group, is a provider of specialty insurance services including Cyber Risk cover.

Secude

Secude

SECUDE is an established global security solutions provider offering innovative data protection for SAP users.

LMG Security

LMG Security

LMG Security is a cybersecurity consulting, research and training firm.

Pareteum

Pareteum

Pareteum is a leading Global provider of mobile networking software and services. Our mission is to provide a single solution to the problem of fully enabling and securing the Mobile Cloud.

Haventec

Haventec

Haventec’s internationally patented technologies reduce cyber risk and enable pervasive trust services with a decentralised approach to authentication.

Newtech Recycyling

Newtech Recycyling

Newtech Recycyling specializes in the removal and disposal of IT infrastructure which has reached the end of its life cycle.

Argo Group

Argo Group

Argo is an international underwriter of specialty insurance. Argo Cyber offers a full spectrum of coverage solutions related to professional and technology services.

XioGuard

XioGuard

XioGuard is a managed security service for 360-degree cybersecurity coverage, protecting the entire attack surface, increasing performance, reducing cost, and simplifying operations.

Arcanna.ai

Arcanna.ai

Using a wide range of out-of-the box integrations, Arcanna.ai continuously learns from existing enterprise cybersecurity experts and scales your team’s capacity to deal with threats.

Hackurity.io

Hackurity.io

Hackurity.io is a high energy IT security start-up founded in 2021 out of the frustration that IT Security is highly fragmented and reactive.

Redcoat AI

Redcoat AI

Redcoat AI provide a comprehensive security platform that continuously evolves with the threats and opportunities presented by AI.

DataTrails

DataTrails

DataTrails enables organizations to prove and verify the provenance and authenticity of any data they use in their business operations.

Infodot Technologies

Infodot Technologies

Infodot Technologies specialize in a co-managed IT support and services approach, where businesses share their IT responsibilities with a skilled Managed IT Services Provider (MSP).

Canary Technology Solutions (Canary IT)

Canary Technology Solutions (Canary IT)

A Cloud, Cyber Security, Retail Solutions and Managed IT Services provider for over 25 years, we safeguard and revolutionise business through technology and foresight.

Nexsan

Nexsan

Nexsan offers versatile and robust data storage solutions tailored to adapt seamlessly across a diverse range of sectors, ensuring reliable performance for critical data management.

CyVent

CyVent

CyVent helps you select the right cybersecurity solutions at the right price for your unique situation, without the need to invest endless time evaluating the ever-evolving options.