Nation states sponsoring increasingly sophisticated cyber attacks
Security experts Carbon Black warn that cyber attacks are becoming increasingly sophisticated. It calls out the rise of nation state sponsored groups as one of the causes. These groups are upskilling themselves and playing a much longer game, one that is more associated with intelligence agencies and spies than hackers.
This does not mean that they are eschewing the mundane attacks of malware, cryptojacking and ransomware. After all, these are responsible for generating vast amounts of money for those groups. The end goal seems to be being able to stay undetected inside the enterprises they’ve attacked.
This is, of course, nothing new. Advanced Persistent Threats (APTs) are typical of this type of long term attack. Many of them have a life span of at least five years and involve several phases of attack and evolution. They all have a few things in common:
They all come from nation state sponsored groups.
Russia, China, Iran and North Korea are the biggest sponsors of these groups.
Attacks can take years (average 5 years) to discover.
Large enterprises, governments and critical national infrastructure (CNI) are the main targets.
Carbon Black has called out another thing that all these groups have in common. The end goal is not actually IP theft, or just traditional financial gains, but actually espionage.
This is of real concern to many enterprises especially as there is an increase in those paying up when hit with ransomware. Security researchers are seeing details of targets often sold on after the attack. Now, it seems, those same attackers are keeping a foot in the door for later.
Enterprise Times (ET) talked with Tom Kellermann, Chief Cybersecurity Officer at Carbon Black and Rick McElroy, Head of Security Strategy at Carbon Black to get more details on this.
A nexus of cyber security bad guys
Each of the four countries named by Kellermann has its own reasons for sponsoring hacking groups. This include:
Russia: Pawn Storm, Fancy Bear, APT28. This is all about destabilising the West. Russia has adopted the doctrine of General Valerie Gerasimov who was appointed first Deputy Defence Minister by President Putin. He believes that war is a continuum and that Russia needs to use cyber attacks to damage the integrity of the West.
China: Cyber attacks by China are closely aligned with the countries national interest. It has plans to infiltrate those industry sectors that it considers essential to its own safety. One area in which it is concentrating attacks is education. Universities are increasingly involved in commercial research. Kellermann points out that this means: “they have access 2-3 years before research is published. This is, in turn, is up to 4-5 years before ideas are developed.“
North Korea: It’s all about the money and sanctions. The success of North Korea to generate and steal cryptocurrency is not in question. It has been blamed for large numbers of attacks on cryptocurrency exchanges. It has well trained hackers that it sends overseas to create new teams who work to raise funds to send home.
Iran: Having been on the receiving end of cyber attacks (Stuxnet) and with the breakdown of the Nuclear Agreement with the West, Iran sees cybersecurity as a leveller. Kellermann claims that: “They want to level the playing field. If they can’t have nuclear weapons they are willing to take another approach. That approach is cyber security where they have an ambition to be the kings.”
In addition to sponsoring hacking teams, all of these countries trade cyber attack data on the dark web. They make attacks available to the wider hacking community and leak data to enable attacks to take place.
The problem of attribution
One problem that is often overlooked is attribution over an attack. It is easy to write an attack that mimics that from another hacking group or country. What is harder to mimic is the construction of the attack and the minor details in the code. Poor attribution means that it is hard for intelligence agencies to estimate the size of the threat.
This problem is exacerbated by the sharing of attacks. It means that the attacks can come from a number of unexpected sources. However, where the sharing includes access to the source code it does become easier to identify the skilled attacker from the bumbling amateur due to the changes they make
According to McElroy: “We fingerprint by other things than the code. People work the same way on different projects. We put things together to understand the code and the attack. We are also getting better about source origin.” One of the reasons why this is important is that amateurs are looking for a quick result while the nation state teams are looking for a long term play. Identify the difference in each attack and it can help guide defensive responses.
Why we need a change in the way we deal with these attacks
McElroy told us that training hackers and deploying the right tools to breach targets is being done on the dark web. It is relatively simple for anyone to learn the basics of hacking and cheap to buy access to the resources for an effective hacking kit. Hackers are able to join online classes in new techniques and these are about far more than just breaching systems.
What is worrying cyber security teams is the rise in countermeasures being deployed by attackers. They are creating attacks that are not just difficult to spot but also difficult to trace. When the attacks are over, they delete all the files used leaving, at best, just file fragments. This means that forensic investigation teams struggle to identify many of the attack vectors and even the real targets.
Spending money to defeat attackers is a pointless task. McElroy estimates that $96 billion is being spent today to disrupt the attackers. To match the spending of the attackers, McElroy said defenders would need to spend 10x more than today. The emphasis on what is defended also has to change. Companies are so stretched that they are not able to effectively patch systems.
What does defence have to do?
Defence needs to evolve. Rather than react to attack there needs to be a better killchain. This means early identification which can only happen with complete visibility over all the systems and devices an enterprise uses. For many this is impossible as they have no effective asset register that covers basic IT let alone IoT and end-user owned devices. It is not just about the assets. Security teams need to know what is running on every device and what should not be allowed to run. Unless they can identify bad processes they won’t spot attacks until it is too late.
End user organisations need better playbooks to guide their responses. These should not be cast in stone but should adapt to keep pace with the attackers. Current approaches tend to have a very fixed end point – virus cleaned, data restored. They need to do deeper checks into systems to see what has changed or been left behind by the attackers.
There is a need to train teams in forensic awareness. The focus on restoring services often means that data that would identify attackers is lost. Law enforcement needs data that meets evidential standards in order to prosecute. There is a big gap between what is gathered and what is lost.
Hunt quietly is another approach that Carbon Black recommends. Most cybersecurity teams tramp around systems like guards marching around a building. Kellerman believes that we need to be more gamekeeper and hunter/killer than high profile security guard. It is a balance. Overt security puts off a proportion of attackers. A covert approach catches those that get through the lines.
What does this mean
To defeat a sophisticated attacker we need skills, investment and a rethink of how cybersecurity should work. The problem is that we lack the first two and the third requires people to step back. Stepping back when you are firefighting to keep operational is difficult.
Kellerman and McElroy both believe that there is insufficient sharing between different agencies. This is not just between governments but also includes government to business, business to business and importantly, inside organisations.
Regulators in the financial markets have created ways to allow companies to share threat intelligence without breaching compliance laws. Businesses are beginning to put more anonymised data into threat intelligence projects that share the data widely. The latter is essential for the cyber security industry. Without a large enough pool of data, it is hard to train tools effectively. Many of the new tools on the market that rely on machine learning and AI are often trained on very small data sets. It takes greater exposure for them to be realistically effective.
Inside organisations there is much more needed to stop being victims. This includes user training, IT training as well as investment in the security teams. Without this organisations will continue to be easy targets. One of the big things that has to be done is a change of conversation with the board. Kellerman agrees that when we talk cybersecurity, the board shuts down. Talk risk and you have their attention.
- M&E Project Manager
- £35,000 - £65,000 + Bonus + Benefits
M&E Project Manager with a Data centre / Construction / Mission Crticial background is needed in London area to join a leading Data Centre business. The M&E Project Manager MUST have experience working in data centre or mission critical project environments for a minimum of 2 years The M&E Project Manager will be responsible for planning, controlling and coordinating the delivery of various construction and business as usual projects. Ensuring work keeps to deadlines and within cost parameters. You will be responsible for overseeing projects worth over £5 million from start to finish, managing suppliers and contractors. This is an excellent opportunity for someone looking to build a career working for an internationally recoginised brand who truely belive in staff development and progression. Reference Number: PG7448
- Marketing Specialist
- £35k - £37k + Bonus + Excellent Benefits
My client, a leading name in the IT industry, are seeking a Marketing Specialist to join their team. This is an excellent role for someone looking to develop themselves in a diverse role with resposnbilites and authority with the real chance to make change and have an effect on a global business. Required Experience: 5+ Years in Marketing + Public Relations Experience organising and running campaigns and events. Content Creation - Social Media, Website and Blogs Email Campaigns A degree in Marketing, Business admin or related subject Marketing qualification, ideally CIM. IT / Telecoms Background prefered but not essential. Reference: PG7447
- ServiceNow Administrator (Contract)
- £350 Per Day
We are currently working on behalf of a London based service provider who are on the look out for a ServiceNow Administrator for a 6 month initial contract The ServiceNow Administrator will be responsible for supporting, configuring, scripting & integrating the ServiceNow ITSM (IT Service Management) tool. Requirements Current ServiceNow ITSM (IT Service Management) experience is a MUST Current experience within an IT service provider A Certified ServiceNow System Administrator certification isn’t a must be extremely beneficial Day Rate: £350 Per Day Reference Number: BD7439a
- Cyber Security Sales
- £120,000 – £140,000 OTE
£120k - £140k OTE Sales Account Management / New Business in the London / Reading area. This opportunity comes with existing accounts with internal sales support. MUST have the ability to develop New business as well as help existing accounts. Experience selling Solution and Managed service experience preferred e.g. Check Point, Palo Alto, F5, etc. Must be UK based and ideally able to achieve SC clearance DCL Search & Selection Exclusive and looking to hire ASAP. Contact me for more info 07884666351 / chris.holt@DCLSearch.com Reference Number: CH7444