Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Thursday, 9 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Cyber War and Anti–War

by The Gurus
September 3, 2015
in Editor's News, News
Share on FacebookShare on Twitter

By Martin Lee, Intelligence Manager at Alert Logic

Cyber war is often in the headlines. The hype centered on state sponsored malware means that the lines defining fact and fiction often become blurred leading to increasing fear bordering on hysteria. However, cyber weapons have a very specific weakness that means that they might be less effective than anticipated in the real world.
The discovery of Stuxnet in 2010 and the subsequent information leaks confirming that the trojan was indeed a state sponsored malware designed to damage the nuclear processing infrastructure of an independent nation showed that cyber weapons were no longer a theoretical issue. Developing such  malware takes a lot of resources and skill. There are many stages in the life cycle of the malware that must be completed before any putative cyber weapon can be described as having successfully completed its mission. The target must first be researched to understand the strength of its defenses and any areas of weakness that may exist.  A ‘weaponised’ exploit must then be created in order to deliver and install the malware on the target, and covert communications must be established back to the attacker in order to await further instructions, or capture data for exfiltration. The discovery of the exploit or malware during any of these phases means that defenses can be put in place disrupting the attack and preventing the mission from being completed.
Cyber defenses have improved to the point that once an attack has been identified, it can largely be blocked and defeated. Of course identifying an attack is not trivial, and diligent effort has to be undertaken to ensure that adequate detection is put in place so that an attacker cannot evade defenses. However, this does
tend to suggest that cyber weapons will be limited to a single use. Once they cause obvious damage and are discovered they are no longer useful since they can be expected to be detected and blocked from communicating back to their controllers. To be effective, cyber weapons must rely on stealth to remain hidden until the moment when they can be activated.
A similar issue affected the state of the art weaponry of the 1980’s. Cruise missiles stationed in Europe were intended to leave their bases and melt into the countryside where they could be stealthily hidden, safe from enemy action until the orders to launch their nuclear payload were received. However, this doctrine suffered from a major flaw. Protestors followed the cruise missile convoys whenever they left their bases. A network of observers reported the movement of the missiles along highways ensuring that they could never melt unseen into the countryside. This constant observation rendered the stealth required by the nature of weapons impossible to achieve.
Cyber weapons suffer from a similar problem. Although there is no cyber equivalent of the peace protests of the 1980’s, there is nevertheless a co-ordinated network of observers constantly seeking out cyber weapons. For any security researcher, identifying a cyber weapon, or any new sophisticated malware, is a career-defining moment. Adulation and kudos from peers flow to any individual who finds such an attack. This ensures that the most ambitious and skilled security researchers and network analysts are constantly searching for the traces left by cyber weapons. Indeed, venture capital funds are being invested in the development of new detection tools, to improve the discovery of these traces.
By their nature these cyber weapons require stealth, as soon as they are detected they are rendered useless. Yet, the interest that they generate means that they are the constantly being hunted. Similar to the cruise missile, cyber weapons can not be expected to melt into the background for long periods of time and remain undiscovered until they are ready to be activated. Any subtle change in the environment they reside in has the capacity to render them impotent and being high profile and highly sought after, they face an ever-growing risk of discovery.
Paradoxically, the stealth and capabilities of advanced malware means that they are far too interesting and attract far too much attention for their stealthiness to persist. For once, this might mean that fear and hype are actually helping to keep a genuine threat at bay.
 
visit Alert Logic’s site to see what they do: www.alertlogic.com

FacebookTweetLinkedIn
Tags: APTattackBreachCyber Securitycyber warfacecyber weaponcybersecuritycyberwarfaredata breachFlawGovernmentHackhackedHackerHackershackinginfosecinfosecurityITit securityMalwareNSAPatchsecuritystate sponsored threatStuxnetSurveillanceThreatTrojanVulnerability
ShareTweetShare
Previous Post

Unpatched software vulnerabilities continue to plague businesses

Next Post

Match.com hit by malicious adverts

Recent News

Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato SASE Cloud Named “Leader” and “Outperformer” in GigaOm Radar Report for SD-WAN

February 7, 2023
AT&T Cybersecurity grows SASE offering by adding Palo Alto Networks

UK second most targeted nation behind America for Ransomware

February 7, 2023
safe

Will Emphasising App Security Lead to More App Installs?

February 6, 2023
Phone with app store open

$400,000 Fine for Stalkerware App Developer

February 6, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information