Ultimate magazine theme for WordPress.

The rise of nation-state attacks


Hackers acting on behalf of nation-state powers are no longer just out to disrupt critical infrastructures – they’re also actively seeking trade secrets. New battle lines have been drawn across the world, and organisations need to tool up accordingly. The recently released Verizon Data Breach Investigations Report (VDBIR) is an eye-catching case in point, noting a sharp uptick in nation-state attacks, rising from 12% of all analysed breaches to 23% in the past year. 25% of breaches are currently influenced by cyberespionage, rising from 13%.


Hackers’ goals


Further research compiled by the Swedish Security and Defence Industry Association (SOFF) echoes VDBIR’s 25% espionage figure but also breaks the issue down by sector.


Remarkably, 94% of all attacks currently aimed at the manufacturing industry are motivated by espionage, usually with the intent to steal trade secrets or sabotage plants. Manufacturing – along with public administration and educational services – tend to aggregate large volumes of attractive, highly sensitive data.


SOFF predicts that security researchers now spend 90% of their time looking into espionage-based targeted attacks. Ten years ago, they would spend similar amounts of time focusing on criminal campaigns.


The financial impact associated with data breaches, espionage-based or not, are too consequential for organisations to ignore. SOFF also adds that it is worth understanding how 90% of the impacts caused by a cyberattack tend to be hidden (beyond the obvious outlay for mitigation, customer notification or legal action).


The techniques


In the last year alone, recent Infosec analysis shows an explosion of underground hacker marketplaces on the dark web. There are at least 300 hacker communities in existence, some with as many as half a million registered users, all packed to the gills with resources and disruptive tips.


In another alarming trend, hackers acting on behalf of nation-states are also increasingly carrying out zero-day attacks. Cybersecurity Ventures research predicts there will be one zero-day attack a day by 2021. Unfortunately, a zero-day attack is the first instance of a vulnerability being exploited so, if adequate defences aren’t in place, organisations will have to a messy clean-up operation on their hands.


Another favoured technique is phishing, whereby attackers trick employees into providing their credentials and log-in details via fraudulent emails and communication. Recent analysis from PhishMe found that phishing emails are responsible for 91% of cyber-attacks – a concerning trend, but one that could soon be reversed with adequate training mechanisms.


How to stay one step ahead


The number of state sponsored attacks is only going to rise with the imminent impacts of trends like 5G and IoT. New attack surfaces are always expanding for switched on cybercriminals.


As you’d expect, a range of new technologies are emerging to aid the fightback. For example, AI solutions are being developed that can analyse all traffic in real-time to spot unusual behaviours and anomalies previously out of sight. These types of AI are explicitly designed to understand how traffic is meant to function, automatically flagging problems as they occur.


Whatever the technology mix looks like, both now and into the future, there will always be a need to apply security at every level and on every surface: endpoint, application, and infrastructure. Applications require consistent, intelligent and adaptable policies wherever they reside (on-premises, in the cloud or in a multi-cloud environment). Protecting perimeters is no longer enough. Modern authentication techniques, such as the “principle of least privilege” and two-factor authentication, should become the norm. As ever, organisations should constantly review and update security settings and tools, running regular penetration tests to monitor and improve staff behaviour. Organisations also need to control wayward BYOD activity and ensure all staff are equipped with the tools they need to do they jobs safely. It is a dangerous world out there. Pre-emption, prevention and continuous education are the ways ahead.

Get real time updates directly on you device, subscribe now.

  1. Mary Walker says

    What i don’t understood is actually how you are not actually much more well-liked than you may be right now. You’re so intelligent. You realize therefore significantly relating to this subject, made me personally consider it from a lot of varied angles. Its like men and women aren’t fascinated unless it is one thing to accomplish with Lady gaga! Your own stuffs outstanding. Always maintain it up!

  2. Evan Davidson says

    You made some decent points there. I did a search on the issue and found most guys will agree with your blog.

  3. Ella Jackson says

    Thanks for your exciting article. Other thing is that mesothelioma is generally attributable to the inhalation of fibers from mesothelioma, which is a extremely dangerous material. Its commonly viewed among laborers in the structure industry who may have long contact with asbestos. It is caused by residing in asbestos covered buildings for a long period of time, Your age plays a huge role, and some people are more vulnerable to the risk as compared with others.

  4. Kelvin says

    How long have you lived here? pornmdcom â??Itâ??s always tough to claim eradication â?? there could always be a cell which we didnâ??t analyze that has the virus in it,â? Louis Picker, of the Vaccine and Gene Therapy Institute at OHSU, told the BBC News. â??But for the most part, with very stringent criteria â?¦ there was no virus left in the body of these monkeys.â?

  5. Lance says

    Could I make an appointment to see ? hyzaar 100 25 price Unless and until technology saves us, we will keep drowning in this information, classified and unclassified

  6. Jayden says

    How much notice do you have to give? imagfap The SPD was seen as the most likely partner from the start, but its experience during the last grand coalition has tempered the enthusiasm of grassroots members. In 2009, after four years of governing with Merkel, the SPD plunged to its worst election result since World War Two.

Leave A Reply

Your email address will not be published.

Do NOT follow this link or you will be banned from the site!