Cyberwar Between Nation-States Damages Business

Businesses risk becoming “collateral damage” in nation-state cyber wars, acording to the lastest threat report from the experts at Crowdstrike
 
Revelations that North Korea is using “widespread and increasingly sophisticated” cyber-attacks to steal money highlight the risk of collateral damage from nation-state attacks, with one security expert warning that businesses are so highly interconnected that they run the risk of becoming targets if they don’t co-ordinate cybersecurity defence with partners and other stakeholders.
 
A confidential United Nations report suggested that North Korea has managed to steal up to $US2 billion ($A2.9b) to fund its military development by leaning on “widespread and increasingly sophisticated” cyber-attacks.
 
Those attacks, which targeted more than 35 banks and crypto-currency exchanges in 17 countries, highlighted the increasingly volatile state of nation-state attacks, which run the increasing risk of affecting connected but unrelated organisations.
 
“You don’t want to be the splash-back from an attack on somebody else,” Shawn Henry, a former FBI agent who now serves as president and CSO of CrowdStrike Services, recently told CSO Australia. “But because all of the networks are connected, the danger is very high for that to happen.”
 
That risk had also elevated because “much more brazen” adversaries “either are not afraid of being detected, or don’t think they are going to be detected,” he said. “And even if they are detected, they don’t believe there is going to be any type of retribution or accountability.”
 
This attitude had increased the present danger from nation-state attacks, in which a growing climate of often below-the-radar hacking had created a potentially disastrous new threat for both government bodies and corporations brimming with personal or commercially sensitive information.
 
Malicious organisations were being uncovered within governments around the world and, the recent CrowdStrike Global Threat Report   revealed, have resulted in average breakout times as low as 19 minutes for Russia-affiliated cybercriminals.
That’s just 19 minutes between initial compromise and lateral movement within a target network, putting additional pressure on CSOs to implement effective detection and response measures.
 
Highlights from the 2019 CrowdStrike Global Threat Report 
CrowdStrike dives deeply into the data to show attackers most favored TTPs of 2018 through the lens of MITRE ATT&CK™ framework.  
 
• Updates on global “breakout” time statistics, including observations on which adversaries showed the fastest tradecraft in 2018.
• No respite from nation-state threats: Nation-state adversaries were continuously active throughout 2018, targeting dissidents, regional adversaries and foreign powers to collect intelligence for decision-makers.
• The continued rise of “Big Game Hunting”, where cyber criminals combine advanced, targeted attack techniques with ransomware to achieve massive financial payoffs.
• The eCrime ecosystem continues to evolve and mature, showing increased collaborations between highly sophisticated criminal actors.
 
That pressure is further increased given that attack techniques were being adapted to reflect the relative vulnerability profiles of different regions. Malware, registry run keys and command line interface attacks, for example, were the most common attack vectors in the Indo-Pacific region. By contrast, malware constituted more than 75 percent of the attacks on Latin American targets and scripting was used in well over half of attacks on EMEA organisations.
 
These variations meant that there was no one-size-fits-all solution for detecting and managing such attacks, which get even harder to detect when cautious attackers ‘live off the land’ by relying on built-in system tools, such as PowerShell and JavaScript, whose very presence won’t set off red flags. Once the target is compromised, human attackers can take the controls to explore and target data to be exfiltrated.
 
“From what we have seen in the last two years or so, the adversary’s capability moved beyond malware to signature-less attacks where they use existing capabilities in the operating systems to move in the environment undetected,” Henry said.
 
Yet many organisations “are still asleep at the switch,” he added. “I see a lot of boards and CEOs who are very attentive and have a sense of urgency and understand the business risk, but I still bump into organisations that have a laissez-faire attitude about cyber-security and feel that they will deal with it if it happens....That type of attitude is just not acceptable.”
 
Those with such attitudes will be particularly held to account once they suffer a public breach at the hands of nation-state attackers who, despite diplomatic assertions to the contrary, continue to double down on their attack efforts and are rapidly changing both the tactics they use and their intensity.
 
Those changing tactics “have really made some significant changes in the whole ecosystem,” Henry said, “and organisations need to be protected in a way that is fundamentally different from what they have done historically.”
 
“There is the potential for things to escalate beyond proportionality, and we have to start a broader discussion about this if we
are going to curtail the use of what many experts say are a devastating and potentially existential deployment of weapons.”
 
Crowdstrike:       CSO:         
 
You Might Also Read: 
 
Shockwave - A Global Transformation In Warfare:
 
 
 
« Home Working Can Often Be A Security Threat
Over 60% of Enterprises Fail to Build Effective Cloud Security »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

IEEE Computer Society

IEEE Computer Society

The IEEE Computer Society is the world's leading membership organization dedicated to computer science and technology.

Latham & Watkins LLP

Latham & Watkins LLP

Latham & Watkins is an international law firm. Practice areas include Data Privacy, Security and Cybercrime.

Octopus Cybercrime Community

Octopus Cybercrime Community

The Octopus Community is a platform for information sharing and cooperation on cybercrime and electronic evidence.

Prescient

Prescient

Prescient’s Cyber solutions supplement your firm’s existing data security infrastructure with specialized investigations that identify unconventional cyber risks.

Greenetics Solutions

Greenetics Solutions

Greenetics Solutions is a company focused on providing solutions for information security.

Renesas Electronics

Renesas Electronics

Renesas Electronics delivers trusted embedded design innovation with solutions that enable billions of connected, intelligent devices to enhance the way people work and live - securely and safely.

Red Snapper Recruitment

Red Snapper Recruitment

Red Snapper Recruitment is a market leading staffing services provider to the law enforcement, cyber security, offender supervision and regulatory services markets.

Authomize

Authomize

Authomize aggregates identities and authorization mechanisms from any applications around your hybrid environment into one unified platform so you can easily and rapidly manage and secure all users.

Scarlett Cybersecurity

Scarlett Cybersecurity

Scarlett Cybersecurity provide cybersecurity services to US private and public organizations with specific emphasis on compliance and cybersecurity incident prevention, detection, and response.

Datrix

Datrix

Datrix is a leading Smart Infrastructure and Cyber Security solutions provider. We deliver critical networking, communications and cyber security solutions to public and private sector organisations.

Trellix

Trellix

Trellix is an extended detection and response (XDR) solutions provider created from a merger of McAfee Enterprise and FireEye Products.

Atlas VPN

Atlas VPN

Atlas VPN is a highly secure freemium VPN service with a goal to make safe and open internet accessible for everyone.

Camelot Secure

Camelot Secure

Camelot Secure Secure360 platform is a holistic redefinition of what world-class cybersecurity strategies can be. Prepare. Protect. Deploy.

AUCloud

AUCloud

AUCloud is a leading Australian cyber security and secure cloud provider, specialising in supporting businesses and Governments with the latest cloud infrastructure.

Upwind Security

Upwind Security

Upwind delivers comprehensive cloud security, precisely when and where it’s most critical.

SteelGate

SteelGate

SteelGate’s core capabilities are centered around architecture design and engineering of network, systems, and cybersecurity solutions.