Nation states sponsoring increasingly sophisticated cyber attacks
Security experts Carbon Black warn that cyber attacks are becoming increasingly sophisticated. It calls out the rise of nation state sponsored groups as one of the causes. These groups are upskilling themselves and playing a much longer game, one that is more associated with intelligence agencies and spies than hackers.
This does not mean that they are eschewing the mundane attacks of malware, cryptojacking and ransomware. After all, these are responsible for generating vast amounts of money for those groups. The end goal seems to be being able to stay undetected inside the enterprises they’ve attacked.
This is, of course, nothing new. Advanced Persistent Threats (APTs) are typical of this type of long term attack. Many of them have a life span of at least five years and involve several phases of attack and evolution. They all have a few things in common:
They all come from nation state sponsored groups.
Russia, China, Iran and North Korea are the biggest sponsors of these groups.
Attacks can take years (average 5 years) to discover.
Large enterprises, governments and critical national infrastructure (CNI) are the main targets.
Carbon Black has called out another thing that all these groups have in common. The end goal is not actually IP theft, or just traditional financial gains, but actually espionage.
This is of real concern to many enterprises especially as there is an increase in those paying up when hit with ransomware. Security researchers are seeing details of targets often sold on after the attack. Now, it seems, those same attackers are keeping a foot in the door for later.
Enterprise Times (ET) talked with Tom Kellermann, Chief Cybersecurity Officer at Carbon Black and Rick McElroy, Head of Security Strategy at Carbon Black to get more details on this.
A nexus of cyber security bad guys
Each of the four countries named by Kellermann has its own reasons for sponsoring hacking groups. This include:
Russia: Pawn Storm, Fancy Bear, APT28. This is all about destabilising the West. Russia has adopted the doctrine of General Valerie Gerasimov who was appointed first Deputy Defence Minister by President Putin. He believes that war is a continuum and that Russia needs to use cyber attacks to damage the integrity of the West.
China: Cyber attacks by China are closely aligned with the countries national interest. It has plans to infiltrate those industry sectors that it considers essential to its own safety. One area in which it is concentrating attacks is education. Universities are increasingly involved in commercial research. Kellermann points out that this means: “they have access 2-3 years before research is published. This is, in turn, is up to 4-5 years before ideas are developed.“
North Korea: It’s all about the money and sanctions. The success of North Korea to generate and steal cryptocurrency is not in question. It has been blamed for large numbers of attacks on cryptocurrency exchanges. It has well trained hackers that it sends overseas to create new teams who work to raise funds to send home.
Iran: Having been on the receiving end of cyber attacks (Stuxnet) and with the breakdown of the Nuclear Agreement with the West, Iran sees cybersecurity as a leveller. Kellermann claims that: “They want to level the playing field. If they can’t have nuclear weapons they are willing to take another approach. That approach is cyber security where they have an ambition to be the kings.”
In addition to sponsoring hacking teams, all of these countries trade cyber attack data on the dark web. They make attacks available to the wider hacking community and leak data to enable attacks to take place.
The problem of attribution
One problem that is often overlooked is attribution over an attack. It is easy to write an attack that mimics that from another hacking group or country. What is harder to mimic is the construction of the attack and the minor details in the code. Poor attribution means that it is hard for intelligence agencies to estimate the size of the threat.
This problem is exacerbated by the sharing of attacks. It means that the attacks can come from a number of unexpected sources. However, where the sharing includes access to the source code it does become easier to identify the skilled attacker from the bumbling amateur due to the changes they make
According to McElroy: “We fingerprint by other things than the code. People work the same way on different projects. We put things together to understand the code and the attack. We are also getting better about source origin.” One of the reasons why this is important is that amateurs are looking for a quick result while the nation state teams are looking for a long term play. Identify the difference in each attack and it can help guide defensive responses.
Why we need a change in the way we deal with these attacks
McElroy told us that training hackers and deploying the right tools to breach targets is being done on the dark web. It is relatively simple for anyone to learn the basics of hacking and cheap to buy access to the resources for an effective hacking kit. Hackers are able to join online classes in new techniques and these are about far more than just breaching systems.
What is worrying cyber security teams is the rise in countermeasures being deployed by attackers. They are creating attacks that are not just difficult to spot but also difficult to trace. When the attacks are over, they delete all the files used leaving, at best, just file fragments. This means that forensic investigation teams struggle to identify many of the attack vectors and even the real targets.
Spending money to defeat attackers is a pointless task. McElroy estimates that $96 billion is being spent today to disrupt the attackers. To match the spending of the attackers, McElroy said defenders would need to spend 10x more than today. The emphasis on what is defended also has to change. Companies are so stretched that they are not able to effectively patch systems.
What does defence have to do?
Defence needs to evolve. Rather than react to attack there needs to be a better killchain. This means early identification which can only happen with complete visibility over all the systems and devices an enterprise uses. For many this is impossible as they have no effective asset register that covers basic IT let alone IoT and end-user owned devices. It is not just about the assets. Security teams need to know what is running on every device and what should not be allowed to run. Unless they can identify bad processes they won’t spot attacks until it is too late.
End user organisations need better playbooks to guide their responses. These should not be cast in stone but should adapt to keep pace with the attackers. Current approaches tend to have a very fixed end point – virus cleaned, data restored. They need to do deeper checks into systems to see what has changed or been left behind by the attackers.
There is a need to train teams in forensic awareness. The focus on restoring services often means that data that would identify attackers is lost. Law enforcement needs data that meets evidential standards in order to prosecute. There is a big gap between what is gathered and what is lost.
Hunt quietly is another approach that Carbon Black recommends. Most cybersecurity teams tramp around systems like guards marching around a building. Kellerman believes that we need to be more gamekeeper and hunter/killer than high profile security guard. It is a balance. Overt security puts off a proportion of attackers. A covert approach catches those that get through the lines.
What does this mean
To defeat a sophisticated attacker we need skills, investment and a rethink of how cybersecurity should work. The problem is that we lack the first two and the third requires people to step back. Stepping back when you are firefighting to keep operational is difficult.
Kellerman and McElroy both believe that there is insufficient sharing between different agencies. This is not just between governments but also includes government to business, business to business and importantly, inside organisations.
Regulators in the financial markets have created ways to allow companies to share threat intelligence without breaching compliance laws. Businesses are beginning to put more anonymised data into threat intelligence projects that share the data widely. The latter is essential for the cyber security industry. Without a large enough pool of data, it is hard to train tools effectively. Many of the new tools on the market that rely on machine learning and AI are often trained on very small data sets. It takes greater exposure for them to be realistically effective.
Inside organisations there is much more needed to stop being victims. This includes user training, IT training as well as investment in the security teams. Without this organisations will continue to be easy targets. One of the big things that has to be done is a change of conversation with the board. Kellerman agrees that when we talk cybersecurity, the board shuts down. Talk risk and you have their attention.
- Architect | Cyber Security | Public sector Permanent
Architect | Cyber Security | Public sector Permanent Seeking a Security Architect with Public Sector / Cloud Security experience for a lead technical role. Public sector security architecture design experience essential. (MoD) Current project experience delivering HLD / assurance of computer networks / build evaluations. Active Security clearance required. If you are open to hear about a new / exclusive opportunity where you are interested to be more than a number in a company reach out to team today. Chris.email@example.com 07884666351
- CIAM Architect Azure B2C
We are seeking a highly skilled and experienced Azure B2C CIAM Architect for a contract starting on Jan 2024. As an Azure B2C CIAM Architect, you will be responsible for designing, implementing, and deploying an new Azure B2C Solution . Responsibilities: Design and implement an Azure B2C-based CIAM solution that meets the needs of our clients organization. Maintain and support the Azure B2C-based CIAM solution. Provide training and support to our employees on the use of the CIAM solution. Background designing, implementing, and maintaining CIAM solutions. Experience with cloud-based identity and access management (IAM) solutions. Experience with OAuth, OpenID Connect,and SAML. Excellent written and verbal communication skills
- Senior IAM Consultant
- Upto €110,000 depending on level of position
Senior IAM Consultant is needed to help lead and deploy IAM Projects for this expand IAM Consultancy The ideal candidate will have a deep understanding of IAM concepts and technologies, as well as experience in deploying and managing complex IAM solutions. Responsibilities Lead the deployment of IAM solutions for our clients Work with clients to understand their IAM requirements and design solutions that meet their needs Configure and implement IAM solutions using best practices Integrate IAM solutions with other enterprise systems Provide training and support to clients on the use of IAM solutions Stay up-to-date on the latest IAM technologies and trends We are looking for an experieneced IAM Consutlatn with: Strong understanding of IAM concepts and technologies,including identity lifecycle management,access control,and authentication Experience in deploying and managing complex IAM solutions Experience with IAM products and solutions,such as SailPoint,One Identity Manager,and Azure Active Directory Excellent communication and interpersonal skills Ability to work independently and as part of a team Fluent in German Candidates witll need to live and have the right to work within Germany to be considered.
- Security Architect - SOC Design - Outside IR35 London. SC / DV cleared
- Outside IR35
Security Architect - With in-depth SOC Design experience needed for Outside IR35 London. SC / DV cleared. 6 month rolling Immediate Experience delivering technical Security Architecture design / assurance of security design with mobile network experience. HLD / LLD Current SC Clearance a must. Willingness to undertake DV. London 3 days a week Immediately interviewing.