Nation State Hacking Is On Trend In 2018

Last year was a banner year for cybercrime; more data was stolen in the first six months of 2017 than in the entirety of 2016. Gemalto’s Breach Level Index found that over 900 data breaches occurred during the first half of 2017, compromising 1.9 billion records. 

According to Jing Xie, senior threat intelligence analyst for Venafi, this explosive development in data exfiltration will continue in 2018.

In an even more ominous trend, the number of sophisticated state sponsored cyber attacks increased significantly last year. 

“In 2017, attackers working for nation-states focused on efficiency and return on investment, and they were very successful,” said Xie. 

“As a result, we should expect to see escalations and variations of similar attacks this year.”

Xie examined the condition of nation-state sponsored cyber warfare and offered these predictions and insights for 2018:

The ongoing wrestling match between super powers will move from clandestine programs that are largely carried out behind the scenes to more public attacks aimed at critical infrastructure and services, according to Venafi. Because vital security assets control encrypted communication between machines, many cyber attacks will leverage compromised or rogue keys and certificates. 

A nation-state with this power can bombard critical infrastructure through increasingly sophisticated variations of attacks, sabotaging core services using attacks derived from Stuxnet and Duqu. Venafi says cyber criminals sponsored by nation-states may find ways to exploit the trust models used to control communication between machines. 

The easiest way to accomplish this would be to attack or manipulate Certificate Authorities and the keys and certificates they issue. If successful, this exploit vector would allow cyber criminals to eavesdrop on a wide range of confidential communications, intercept and redirect encrypted traffic, and target government watchdogs and human rights activists.
We saw numerous state-sponsored social media campaigns that concentrated on fostering public doubt, and fear, during the 2016 US presidential elections. 

Venafi says that, due to the success of these campaigns, we should expect additional attacks against local and national elections. Some attacks may even utilise fraudulent identities of both humans and machines to steal and leak sensitive nation-state data. Distressingly, these attacks are occurring in elections around the globe.

“With every major nation-state expanding both offensive and defensive cyber war spending, public and private critical infrastructure and communication providers should expect to be caught in the crosshairs of cyber warfare. 

“As a result of the cumulative impact of powerful spending and attack trends, we should expect to see at least one act of nation-state sponsored cyber warfare that directly impacts citizens this year,” added Xie.

MacTech

You Might Also Read: 

Offensive Security, Cyber Insurance & Cryptocurrencies: 2018 Predictions:

Eight Ways Cyber Threats & Business Security Will Change in 2018:

 

« What Does Brexit Mean For Britain's Spies?
How GDPR Affects Your Marketing Strategy »

Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

QinetiQ

QinetiQ

QinetiQ is one of the world's leading defence technology and security companies. Areas of activity include air, land, sea and space systems, weapons, robotics, C4ISR and cyber security.

DigitalCrazyTown

DigitalCrazyTown

Technology, policy and business analysis covering the media, Internet, broadband, mobile and smart grid and cybersecurity arenas.

InfoSec Institute

InfoSec Institute

InfoSec Institute provides certification-based training courses for security professionals and enterprise-grade security awareness and phishing training for businesses.

Versa Networks

Versa Networks

Versa is a software-defined networking vendor providing an end-to-end solution that both simplifies and secures the WAN/branch office network.

Red Canari

Red Canari

Red Canari are specialists in penetration testing and security assessments. We think like hackers – and act like them – to disclose discreet dangers to your organization.

Atonomi

Atonomi

Atonomi provides IoT developers and manufacturers with an embedded solution to secure devices with blockchain-based immutable identity and reputation tracking.

C3i Hub

C3i Hub

C3i Hub aims to address the issue of cyber security of cyber physical systems in its entirety, from analysing security vulnerabilities to developing tools and technologies.

Precursor Security

Precursor Security

Precursor Security are information security specialist, delivering all aspects of Security testing, Cyber Risk Management, and Continuous Security Testing.