The Cyber War Winter Has Arrived

When Russia placed nuclear missiles in Cuba in 1962, they were, apparently, baiting the US to retaliate with full-scale nuclear war, and it nearly worked. However, the US had earlier placed nuclear weapons inside Turkey, which had then, understandably, up-set Russia and so Cuba going nuclear was their response!

More than 50 years later, we’re reaching a similar position. We’re at the edge of a balancing act that is tipping toward the world’s first war fought online.

In the past month, two major attacks on US government-related agencies, both allegedly perpetrated by Russian hackers, who may or may not be working with the Kremlin, have shown what could be the first publicly acknowledged cards in what has been a years-long tension between two world superpowers. A nation possibly revealing that it has gained access to U.S. systems and actively flaunting the ability to interfere with a presidential election is deliberate bait for our government to take stronger action.

Until now, nation-state cyber activity has amounted to little more than threats and conversations behind closed doors, as illustrated by last year’s anticlimactic US-China cyber pact meant to prevent nation-state hacking of private companies.

The agreement was met with security industry criticism for providing only the illusion of progress while leaving governments free to attack each other. And that’s exactly what they’ve done for years, nations have long been laying the groundwork for cyber combat, launching stealthy, ongoing attacks that have not (yet) been publicly uncovered.

But when one of these threats does come to light, whether by counter-attack or strategic leaking of information, the balance of terror is disrupted and calls for retaliation. Those claiming the recent Guccifer 2.0 and Shadow Brokers attacks are a warning from Russia are likely right, but what’s wrong is that we’re treating this like a new problem.

Powerful nations like the US, Russia and China laid the groundwork for attacks long ago as a “just in case” measure. We’ve seen this type of activity before with the revelation of Stuxnet, a virus thought to be the first public act of cyber warfare to cause physical damage (and that has been rumored to be linked to the Equation Group via technical details of the organization’s exploits).  

And while the recent attacks are a significant indicator of what might be in store as tension with Russia escalates, this is just the start of publicly acknowledged cyber warfare. Further, what we are seeing now is not even the worst case scenario as future attacks will likely go beyond embarrassing government documents, beyond wreaking havoc in elections and instead target citizens directly.

As we saw last year in Russia’s attack on Ukraine’s power grid, governments with aggressive cyber initiatives have unprecedented, direct power over the citizens of other nations. Nations like Russia, China and the US likely already have a stronghold on some aspect of each other’s critical infrastructure. This could mean energy grids and oil plants, or it could mean nuclear power facilities, it’s all dependent on the weapons lurking below the surface.

What’s more, these critical infrastructure facilities are nearly all built with archaic software that doesn’t stand a chance against hackers backed by a cyber-savvy nation. Imagine trying to create a website using only Microsoft Word 97, that’s essentially what it’s like for these tools to try blocking modern threats.

So are we all doomed? Not yet, at least. From where we stand now, it’s likely that the US’s next move is to place sanctions on Russia similar to those used to shut down public cyber conflict with China last year. But while that may work to mitigate the current situation, it’s a band aid over a bullet hole. If government organizations don’t work fast to update critical infrastructure security tools and policies, there’s a significant chance we’ll be facing physical battles as the result of a cold war.

Ein News

 

« High Resolution Cameras to Iraq
Russian Cyber Spies & Hackers Are The New Normal »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Uppsala Security

Uppsala Security

Uppsala Security built the first crowdsourced Threat Intelligence platform known as the Sentinel Protocol, which is powered by blockchain technology.

ngCERT

ngCERT

ngCERT is the National Computer Emergency Response Team for Nigeria.

H-ON Consulting

H-ON Consulting

H-ON Consulting develops and applies robust cyber security procedures enabling control systems to be secure.

Trustless Computing Association (TCA)

Trustless Computing Association (TCA)

TCA is is a non-profit organization promoting the creation and wide availability of IT and AI technologies that are radically more secure and accountable than today’s state of the art.

Danish Maritime Cybersecurity Unit

Danish Maritime Cybersecurity Unit

The Danish Maritime Cybersecurity Unit is tasked with delivering the initiatives set out in the Cyber and Information Security Strategy for the Maritime Sector.

Sergeant Laboratories

Sergeant Laboratories

Sergeant Laboratories builds advanced technologies to prove compliance in complex IT security and regulatory compliance situations.

Swedish Incubators & Science Parks (SISP)

Swedish Incubators & Science Parks (SISP)

Swedish Incubators & Science Parks (SISP) is the Swedish industry association for Swedish incubators and science parks.

Prophaze Technologies

Prophaze Technologies

Prophaze enable organizations and SaaS providers to improve their web application cybersecurity and reduce costs through AI automation.

Threatsys Technologies

Threatsys Technologies

Threatsys’s Integrated cyber security process helps your organizations to ensure that it’s secure from any fraudulent attacks.

Sentryc

Sentryc

Sentryc provides automated monitoring of brands on online marketplaces and social media making online brand protection processes faster, more clearly structured and more efficient.

Cura Technology

Cura Technology

Cura Technology offers a wide array of security solutions meticulously designed to address specific facets of your security requirements.

SecureFlag

SecureFlag

SecureFlag is dedicated to enhancing secure coding across all technical profiles within the Software Development Lifecycle.

Symbiotic Security

Symbiotic Security

Symbiotic Security revolutionizes code security by integrating an AI-driven security coach directly within developers' IDEs.

Cloud & More

Cloud & More

Tired of impersonal IT support? Experience the Cloud & More difference. We offer tailored IT services with a personal touch, ensuring your business technology runs smoothly.

Seasia Infotech

Seasia Infotech

Seasia Infotech is a leader in offering efficient, tailor-made and comprehensive digital transformation services.

M2 Recovery

M2 Recovery

M2 Recovery are Crypto legal recovery specialists.