Foreign cybercriminals pose a growing threat to enterprise targets, making risk management critical for commercial and government organizations facing increasingly dangerous attacks, according to the findings of a new report detailing the changes in threat actors and their tactics, activities, and motivations over the past six months.
The Flashpoint mid-year update to its Business Risk Intelligence Decision Report aims to inform business decision-makers about different threats so they can prepare to respond.
Major cyber players listed in the report include Russia, China, Iran, North Korea, and Five Eyes (US, UK, Canada, Australia, New Zealand), though the report states Five Eyes does not use its cyber powers for destructive attacks against allied systems. Researchers also listed cybercriminals, disruptive and attention-seeking actors, hacktivists, and jihadi actors.
"Nation states are always going to be at the top of [cyber] capabilities," says Jon Condra, director of East Asian Research and Analysis at risk and threat intelligence firm Flashpoint. "They have the time, resources, everything to carry out these types of attacks."
Condra, who authored the report, specifies Russia and China as two entities "moving rapidly" to solidify their cyber sovereignty. Both are abolishing anonymity and gaining stronger control over content presented to citizens and traffic exiting the country, which he says has big implications for companies doing business in each country.
Iran and North Korea are also on experts' radar, albeit at a lower level than Russia and China. Iran, which doesn't currently have a vibrant cybercrime community, is on experts' radar because of its focus on critical infrastructure. North Korea is "incredibly active", says Condra, and the report cites its ability to hit targets in the US and South Korea.
Tom Kellermann, CEO of Strategic Cyber Ventures, acknowledges the growing trend of foreign entites using cybercriminal groups to launch attacks. This started in eastern Europe, he explains, and has been embraced by the Russians and the Chinese.
"You see other nation states utilizing the same model to increase their own capabilities," he says.
Nation-state actors have also begun to work together, Kellermann notes. The "tech transfer" between Russia and Iran, and between China and North Korea, is "enabling 'B' teams to become 'A' teams so they can collaborate internationally."
Researchers discovered that activity among disruptive actors has quieted in 2017 as law enforcement cracks down on key groups and historical targets improve their security practices. Cybercriminals continued to target organizations this year as a means of collecting personal data and money from large businesses, particularly in healthcare.
Motivations of nation-state actors vary across the players in the space. Financial gain isn't a major part of nation-state attacks for most players, says Condra, but North Korea is the exception.
Dmitri Alperovitch, cofounder and CTO at CrowdStrike, says while much of North Korea's cybercrime is directed towards South Korea, it's "notorious" for using cybercrime to monetize and fund their regime. The country has been suspected of targeting the banking sector as a means to steal from financial institutions.
Condra cites Russia's attempts at intervening in elections by targeting political organizations. This is driven less by financial gain and more by the goal of stealing intellectual property, which can be used to expose sensitive information or embarrass candidates. Examples of this have been seen in the US, France, and Germany, he explains.
Alperovitch also acknowledges a focus on data theft among nation-state adversaries. Some actors may "moonlight" and conduct military espionage by day, then use the same capabilities to steal for their own benefit after hours.
Cybercrime isn't only about stealing data for geopolitics or espionage, says Kellermann. Cybercriminals also aim to change and destroy data, which can have broad implications for businesses. He likens this to a burglar burning down a house after taking what they want.
After hackers pillage a brand's intellectual property, they can use the brand and its customers' trust to turn consumers away through business email compromise, malware-laced emails, and other forms of cybercrime. Kellermann says this is increasing with attacks like WannaCry, which created a polymorphic campaign and hit several critical infrastructure systems.
"One of the biggest shifts we've been seeing, increasing steadily over the last few years, is the move to fileless attacks," says Alperovitch. "They're moving away from leveraging malware to using these types of methods."
Threat actors can bypass tools that rely on machine learning to detect signatures, instead using components already in place. Alperovitch says among Russian threat actors, he has noticed the trend of leveraging online cloud services to blend in with an organization's network traffic.
Once adversaries have a foothold in the business, he explains, some exfiltrate data using Microsoft OneDrive. Admins monitoring the network see encrypted Microsoft traffic but don't notice anything is amiss.
While more advanced strategies are on the rise, threat actors continue to rely on traditional and effective forms of breaking in. Spearphishing continues to work, says Alperovitch, and many cybercriminals don't see the need to deviate. Web exploitation and Web compromise are also popular hacking methods.
What can be done?
"There are three things you need to do that are really key to responding to any type of intrusion," says Alperovitch.
Businesses should assume they have been compromised and get a compromise assessment, invest in endpoint detection and response (EDR) for greater visibility, and use that insight to put themselves in the mindset of an attacker, he continues. Those who have a strong security program and leverage EDR are in a better place than those who ignore the problem.
High-profile attacks are motivating organizations to take these threats seriously, says Alperovitch, and business execs are starting to ask CISOs the tough questions: "Have we already been breached?" "How do you know if we have been breached?" "Are you ready?"
Kellermann advises using intrusion suppression to hunt for adversaries already in the network. This method requires businesses to alter their architecture for the purpose of detecting, deceiving, diverting, and containing adversaries who have broken in.
"We can't stop them at the wall anymore, not when they're using NSA capabilities put on dark web forums," he cautions.
Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio