Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Report Highlights Business Risks Drawn From Geopolitical Flashpoints

Geopolitical Cyber Risks

Geopolitical Cyber Risks

Flashpoint’s mid-year Business Risk Intelligence Report analyzes data from geopolitics and the deep and dark web to show how threat actors and their motivations have evolved over the first six months of 2017, and to provide insight into what new threats might appear in the coming months. It comprises sections covering both the primary nation-states and the main threat sub-sections.

Russia

The report notes the continuing Russian effort to interfere with western elections; especially during the approach to the German national elections in September 2017. 

The Shadow Brokers (TSB) have re-emerged from dormancy, and are generally considered to be tied to the Russian state. Internally, Russia is tightening control over dissidents and internet usage. Ruslan Stoyanov was arrested over un-specified charges relating to ‘treason’. From prison, he warned the regime against “the consequences of partnering with domestic ‘patriot-thieves’ (cybercriminals).

“Moscow is moving quickly towards establishing an unprecedented level of information control within the country’s borders” warns Flashpoint, “…cementing the state’s authority over online activities.”

China

Chinese state-sponsored activity has remained low following the Xi-Obama agreement made in September 2015. Nevertheless, there has been some activity. In early March, a DHS report described activity under the ‘Pleasantly Surprised’ campaign spear-phishing commercial entities in the financial, retail and technology sectors. APT10 was also linked to a campaign targeting the National Foreign Trade Council around the time of the US/China summit in early April. Other probable Chinese activities included attacks against MSSPs and attempts to compromise South Korea’s Terminal High Altitude Area Defense (THAAD) anti-ballistic missile system.

Flashpoint notes that China remains a potent cyber force, but seems to have turned the focus of its attention to Asian and geographically nearby targets. Internally it continues to increase control over cyber activities with new regulations on data flows and VPNs.

Advertisement. Scroll to continue reading.

Five Eyes

The Five Eyes group of nations is described as the “pinnacle of cyber capabilities of all actors in cyberspace” — but one that is not considered a ‘threat actor’ to other western nations. However, the NSA continues to be embarrassed by the TSB leaks, while the CIA has been embarrassed by WikiLeaks’ Vault7 leaks. However, “Despite the synchronicity between the ShadowBrokers releases and the Wikileaks dump, there is no known connection between the two,” says Flashpoint.

Iran

Iran is described as a ‘moderately-capable threat actor in cyberspace’, and one that has concentrated on exploiting vulnerabilities in critical infrastructure systems. While it has been relatively quiet in recent months, Flashpoint warns that any attempt by the US Administration to dismantle the Iranian nuclear accord is likely “to be accompanied by renewed Iranian efforts in the cyber domain.” However, for the moment, it believes that the “re-election of Iranian President Hassan Rouhani is likely to have a stabilizing effect on Iranian cyber activities.”

North Korea

North Korea is considered to be a potent threat, but one that has been relatively quiet this year following China’s apparent withdrawal of political support. Nevertheless, there have been at least two spear-phishing campaigns: one against South Korean research organizations, and the other against North Korean defectors.

The report notes the suggested links of the WannaCry ransomware to the North Korean Lazarus Group. Its own findings suggest a Chinese-speaking author; but adds these two findings are not mutually exclusive.

Geopolitically, the Trump administration has said, the “era of strategic patience is over.” Flashpoint concludes, “The North’s current apparent quiescence in cyberspace may come to a swift end in the event that the United States reacts strongly to the country’s sixth nuclear test, for which many analysts believe that Pyongyang is preparing.”

Just this week, US-CERT released a technical alert on behalf of the DHS and the FBI to warn organizations of North Korea’s “Hidden Cobra” activities, particularly distributed denial-of-service (DDoS) attacks.

Disruptive and Attention-Seeking Actors

Such actors have been quieter than usual during the first half of 2017. Flashpoint believes it may be because they are starved of publicity due to the media’s current focus on the new administration and the FBI/Russia probe. Other reasons may be industry’s improving security stance and, for example, the increased awareness among police departments of SWATTING techniques.

Cybercriminals

Cybercriminals are continuing to innovate and evolve. The switch from targeting individuals to targeting organizations continues, and the focus on targeting healthcare remains. “Flashpoint has observed a variety of actors such as “svako,” “hackworld,” “covrig3500,” and more targeting healthcare clinics across the United States in efforts to monetize the stolen data.”

Business Email Compromise (BEC) is growing. In April, Google and Facebook became victims in a scam that netted $100 million for the scammers.

Hacktivists

Flashpoint notes a decline in western hacktivism. “Thus far in 2017,” it says, “the hacktivist landscape has been dominated by a small subset of largely-ineffectual hacktivist operations linked to the Anonymous collective, as well as activity emanating out of Turkey and China in particular.” 

Jihadi Actors

Jihadi actors have shown little growth in technical skill over the first half of 2017. “Due to the lack of technical acumen within most jihadi hacker groups, their victims tend to be poorly-defended or smaller, low-hanging-fruit webs
ites.” The most active hacker group is the United Cyber Caliphate (UCC) which has called for all pro-ISIS hackers to unite under one banner, including the newly-created “Caliphate Cyber Terrorism Army (CCTA).” There is, however, no evidence that the group is directed or supported by ISIS itself. It has also suffered from the loss of at least three of its leaders to US airstrikes — the most recent being Osed Agha in March 2017, and the most notable being Junaid Hussain, or “TriCk” of TeaMp0isoN.

The physical threat to western nations has, however, increased. As the strength of the Isis Caliphate has dwindled, it has turned to recruiting and encouraging the “lone mujahid in the West.” Although not mentioned by Flashpoint as part of this report, this has led to increasing demands from western governments to curb end-to-end encryption, and for the social media giants to co-operate more closely with government.

Flashpoint believes that a deeper understanding of geopolitics and the interaction with cyber threats can help business better prepare for both current and future threats.

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.