Connect with us

Hi, what are you looking for?



Eugene Kaspersky: Definition Of ‘Cyberwar’ In Flux, Threat Of Cyber Weapons Underestimated

Kaspersky Lab’s CEO is on a mission to save the world from cyber-war. And along the way, if he can stop those cyber-criminals, that’s a bonus.

Kaspersky Lab’s CEO is on a mission to save the world from cyber-war. And along the way, if he can stop those cyber-criminals, that’s a bonus.

Enterprise systems are at risk of becoming collateral damage as malware designed to compromise a specific target can get out of control and infect their networks, Eugene Kaspersky, CEO of Moscow-based Kaspersky Lab, told attendees at a student cyber-security conference and competition at NYU-Poly on Friday. In a freewheeling question-and-answer session, Kaspersky fielded questions from the audience on a range of topics, including cyber-war and cyber-terrorism, the difficulties of attribution, and growing cyber-crime.

When talking about the company’s current plan to build a secure operating system for industrial systems, Kaspersky emphasized the goal was to make it costlier for adversaries to attempt an attack.

Eugene Kaspersky, CEO Kaspersky Lab“As long as it’s cheaper to send cruise missile than to hack then I’m happy,” Kaspersky said.

Cyber-warfare and cyber-weapons were very much on Kaspersky mind that day. While it’s much easier to know who is behind the attack using conventional weapons, it’s difficult to know who is behind a cyber-weapon attack, Kaspersky warned. Stuxnet, to date, is the only cyber-weapon researchers have identified and it was made in a “very professional way” to compromise a nuclear facility in Iran. However it still spread and infected over 100,000 computers around the world, including Chevron, Kaspersky noted. “Governments still don’t understand how dangerous cyber-weapons really are,” Kaspersky said.

Despite how frequently the word gets bandied about, Kaspersky believed there was still no set definition on what constitutes cyber-terrorism. The definition is in flux because there are distinct groups with different levels of motivation, he said, noting that nation-states will have different reasons for resorting to cyber-terror tactics than hacktivists. Traditional terrorists will also be a player, Kaspersky said.

“The next 10 years we’ll see more and more attacks. I’m afraid that other states will join the game. We’ll see much more sophisticated attacks,” said Kaspersky.

Even when an attack happens, “we can only guess who is behind” the incident, Kaspersky said. It’s easy to lay the blame on other countries—U.S. intelligence officials believe the devastating attack on Saudi oil company Aramco this summer was backed by Iran, for example—but there isn’t a lot of information available to definitively know who was responsible.

Advertisement. Scroll to continue reading.

Defense Secretary Leon Panetta hinted last month that Iranians may have been behind the wave of denial of service attacks that affected financial banking institutions, despite there being no hard evidence the Iranian government sanctioned the attacks.

“We’re very far from attribution,” Kaspersky said.

Kaspersky has said several times in the past that he wasn’t concerned about the “who” of attacks, but more about the “what” and “how” when it comes to understanding cyber-threats. While Kaspersky Lab is focusing some of its research and development energies towards the attribution question, the bulk of the effort is on defenses, Kaspersky said.

He discussed how the cloud has made it possible for security companies to detect threats faster and to push out protection sooner than it used to be.

Related Reading: While Connections Exist Between Cyber Weapons, Many Secrets Remain

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content


WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet


The war in Ukraine is the first major conflagration between two technologically advanced powers in the age of cyber. It prompts us to question...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...


Iranian APT Moses Staff is leaking data stolen from Saudi Arabia government ministries under the recently created Abraham's Ax persona

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...


Russia-linked cyberespionage group APT29 has been observed using embassy-themed lures and the GraphicalNeutrino malware in recent attacks.


ENISA and CERT-EU warn of Chinese threat actors targeting businesses and government organizations in the European Union.