Nation State Hacking Has A Big Commercial Impact

What impact does the long standing practice of State sponsored hacking to steal secrets and influence elections have on the business world?

It seems that cyber-espionage is on everyone’s mind these days. Fierce allegations are being made by US officials, claiming that Russian hackers interfered with the US election process. One of President Obama’s last act in office was to issue sanctions against alleged Russian hacking. But is this really surprising?

Nation states have been spying on one another since biblical times, the only thing that’s really changed are their methods. Instead of sending spies to infiltrate high ranks of political parties, nations can now utilise even more subtle, and less risky methods to achieve an even greater political and diplomatic impact.

In fact, America is certainly not alone; it is known that the NSA wiretapped Greek officials prior to, and during, the 2004 Athens Olympics.

‘The Athens Affair’, however, was over a decade ago. Today, the process is much simpler. Instead of hacking telephone networks, wiretapping, recording, and processing thousands of hours of calls, one simply has to hack a single email server to gain access to millions of emails and documents, all ready and waiting to be leaked at the right moment. For instance, with the goal of tarnishing a political candidate’s reputation.

Impact on the Enterprise

The question remains: what does this have to do with the business world? Well, due to the peculiar nature of cyberspace, the lines between nation states, hacking groups, hacktivists and cyber criminals are blurred. Russia makes extensive use of “patriotic” (read: nation state sponsored) hacking groups, as does China and Iran.

These “Blackhats” hackers are sent to do their nation’s dirty work. They operate with guidance and are backed by substantial resources, all with plausible deniability of the regime that employs them. However, because the lines are so blurred, hackers will often use the information they find, or the tools they possess, for personal gain. The methods that they perfect to hack and steal sensitive information from other nations can be used by them, the next day, to hack corporations.

Data Dumps

Hackers use data dumps to scourge and identify information which they can then utilize to hack organisations. In the process they may find information which could be used to hack corporations, which they will gladly use or resell. We’ve written in the past about the danger emanating from data dumps and password reuse  and it is advised that enterprises enforce policies preventing password re-use and monitor dump sites regularly to identify information leakage.

Playing the Supply Chain

In more sophisticated cyber-espionage operations, hackers retreat down the supply chain and try to hack the weakest link. For example, it is difficult to hack the US Department of Defence networks, in order to gain intelligence about the next generation of aircrafts the US is building.

It is far easier to hack the defence contractor who manufactures these aircrafts, simply because such companies employ thousands of smaller, less protected vendors who provide them with just about anything, from toilet paper and stationery, to aircraft-specific toilets, to missile casings. These vendors are still connected to the defence contractor’s ERP system, and communicate with it directly, creating a huge vulnerability.     

Meet CyberZeist

CyberZeist is “a Political & Offensive Black-Hat hacker.” He is a former member of the UGNazi hacking group, from which various members were arrested for hacking and credit card fraud. CyberZeist has been active for many years, and embodies the duplicity of hacktivists today. While he mainly focuses his efforts on political goals, such as human rights, he occasionally (or during the process of) hacks “regular” commercial enterprises.

In 2012, CyberZeist hacked the security services company G4S, and published a document that allegedly revealed human rights violations (for more information see the following link). He also leaked a few hundred login credentials that he allegedly obtained by launching a spear phishing attack on US federal employees.

Most, recently he uncovered the passwords to dozens of senators’ email addresses, as well as social security numbers and credit card information for senior members of the Democratic party, including Vice President Joe Biden, Senate Minority Leader Harry Reid, House Minority Leader Nancy Pelosi and acting Chair of the DNC Donna Brazile. The information was posted to Pastebin. On December 22, 2016, he even hacked the FBI website and leaked the data on Pastebin.

ITInsights

State-sponsored Cyberspies:          Cyberspies Impersonate Security Researcher:

State Sponsored Hackers: Finding  The Country Behind The Attack:

 

« Is There A Truly Secure Messaging App?
Indian Police Training To Crackdown On Electronic Fraud »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perkins Coie LLP

Perkins Coie LLP

Perkins Coie LLP is an internationalk law firm with offices across the USA and Asia. Practice areas include Privacy and Data Security.

Netresec

Netresec

Netresec is an independent software vendor with focus on the network security field. We specialize in software for network forensics and analysis of network traffic.

Sasa Software

Sasa Software

Sasa Software is a cybersecurity software developer specializing in the prevention of file-based network attacks.

ODSC

ODSC

ODSC is a security systems integrator that provides services and expertise in identity management and access.

Deepwatch

Deepwatch

deepwatch’s cloud SecOps platform and relentless customer focus are redefining the managed security services industry.

Agio

Agio

Agio is a hybrid managed IT and cybersecurity provider servicing the financial services, health care and payments industries.

Keeper Security

Keeper Security

Keeper is a leading enterprise password manager and cybersecurity platform for preventing password-related data breaches and cyberthreats.

Wavex Technology

Wavex Technology

Wavex Technology is an award winning IT Services firm offering clients a secure and fully managed IT service.

Securix

Securix

SECURIX AG delivers holistic IT security solutions that are tailored to the specific challenges and requirements of your company.

Comparitech

Comparitech

Comparitech strives to promote cyber security and privacy for all. We are committed to providing detailed information to help our readers become more cyber secure and cyber aware.

Perygee

Perygee

Perygee is a fully integrated platform for operational security. Companies depend on Perygee to identify and streamline the most important security practices for their operations.

Trustifi

Trustifi

Trustifi leads the market with the easiest to use and deploy email security products, providing both inbound and outbound email security from a single vendor.

Vaultree

Vaultree

We believe in an encrypted tomorrow. Vaultree technology enables a foundational change in how we communicate with each other: Safely!

RiverSafe

RiverSafe

RiverSafe is a professional services provider specialising in Cyber Security, Data Operations and DevOps, putting security at the heart of everything we do.

OccamSec

OccamSec

OccamSec is a leading provider in the world of cybersecurity. We provide accurate, actionable information to reduce risk and enable better informed decisions.

DataProof Communications

DataProof Communications

DataProof Communications is Cybersecurity Company specialising in cybersecurity operations, incident management and response best practices and technologies.