Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Nation-State Cyberthreats: Why They Hack
Newest First  |  Oldest First  |  Threaded View
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
1/26/2015 | 9:25:03 AM
Re: Why the Hack Not?
Good points,@andregironda. If you haven't already, I hope you will take a few minutes to check out and comment on Mike's follow up blogs on why Russia and North Korea hack. Coming up next is Iran, then US & Israel. So stay tuned! 
andregironda
50%
50%
andregironda,
User Rank: Strategist
1/26/2015 | 8:49:29 AM
Re: Why the Hack Not?
It is really simple to gauge the intentions of each country leading to cyber indications, based on a sort of personality test.

While the sociocultural theories are still under massive development, starter frameworks such as Hofstede's cultural dimensions theory should be used to explain the intracacies behind what is going on with cyber.

For China, it is merely about the feeling of overpopulation and raising the standard of living. They feel that breaking the rules is ok because of a sort of motherbearing complex.

Iran is surrounded by great countries of power: Oman and Qatar with huge financial success, Saudi Arabia with their GDP, UAE with their flexibility and popularity, and Iran's local enemy, Israel, with their advanced weapons research. So they build a brotherhood with Lebanon, Syria, Iraq, and the Caucasus.

Russia wants to take all. They want land and resources especially. There is a narcissism to this country that can't be staved.

North Korea has nothing to lose and everything to gain. There is always power in powerlessness and it comes out in cyber.

Part of the problem we have in the US is that we see things only from our perspective. There are many other players, but they may be sided with popular interests. For example, Taiwan -- an enemy of China or not? How do Europe and Russia relate? What of Central, South America, and the Carribean? Africa? You will see all of these in the foreign-relations-related media but rarely ever spoken of in terms of cyber capabilities or interests.
mwallsedgewave
50%
50%
mwallsedgewave,
User Rank: Author
1/16/2015 | 12:26:18 PM
Re: Why the Hack Not?
Great points!  We agree that an understanding of motivation for malicious cyber activity provides insight into what hapopens after a successful attack.  We also agree that it is criitical that we defend against bad actors obtaining credentials.  I think we would also agree that both these points support the notion that we need a more holistic approach to cyber defense.  To truly understand how to defend, we need the complete or "Big" picture.  A little offensive cyber would also help...but we'll have to leave that to the Government.

Again, great points, Thanks!!!
ernesthemmingway
50%
50%
ernesthemmingway,
User Rank: Apprentice
1/14/2015 | 3:10:17 PM
Re: Why the Hack Not?
Excellent article. Understanding the motives and expectations of an adversary is extremely critical to designing a response. As noted, 'ethics', are relative to cultures and are varied depending on your world view. China, Russia and Iran for example have significantly different histories, cultures and world views. Each would likely have diverse agendas for attacking your enterprise, which makes our job quite interesting.

What I might suggest is that while the adversaries are diverse, their means of attack do have a common thread- acquiring credentials from the target in some fashion. Regardless of their goals, our opponents need credentials. Their motivations and capabilities to me mainly become critical post credential compromise... what will they do with those credentials and why?

Doing all we can to make those credentials expensive to obtain seems to be the best solution at this point. I am hopeful that behavior analytics will mature to the extent we can identify anomolous activity to become aware of when the credentials have been compromised. For some highly sensitive accounts this can today be acheived to some degree, however for the most part, most identities are very difficult to recognize as compromised when in the hands of a skilled attacker.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
1/14/2015 | 2:35:11 PM
Re: Why the Hack Not?
Yes , and, to me, the value of this series, is to better understand the context for various  nation-state actors in the  actions they choose to take. Thanks for enlightening us!
mwallsedgewave
50%
50%
mwallsedgewave,
User Rank: Author
1/14/2015 | 2:15:40 PM
Re: Why the Hack Not?
Thanks Marilyn.  Your statement about China not having "any ethical problem with stealing intellecctual property to further its aims" really captures the point...Nations will act according to what they see as in their own best interest.
mwallsedgewave
50%
50%
mwallsedgewave,
User Rank: Author
1/14/2015 | 2:01:17 PM
Re: Why the Hack Not?
I think Nations/governments "do things" for a number of reasons, but usually they are acting out of what they see as their "National Interests."  A question is whether they are justifiable, or "just" "National Interestes."
David Wagner
50%
50%
David Wagner,
User Rank: Black Belt
1/13/2015 | 12:21:58 PM
Re: Why the Hack Not?
@Marilyn- Well, I find the article interesting, but I don't think the targets of hacking are the "whys" of hacking. If it wasn't medical technology it would be mining or anything else. Evne if the only thing left to take was vacation pictures, a government would take them. 
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
1/13/2015 | 12:17:48 PM
Re: Why the Hack Not?
Have to respectfully disagree with you @Dave. I think it's fascinating to learn, for instance, that China looks to the West for technology solutions, and doesn't have any ethical problem with stealing intellecctual property to further its aims. I also had no idea that the Chinese were focused on medical technology innovation and that they are invnesting in that sector of their own economy. Looking forward to reading about what's going on in North Korea, Russia and others in the series. 

 

 
David Wagner
50%
50%
David Wagner,
User Rank: Black Belt
1/8/2015 | 11:17:33 AM
Why the Hack Not?
I guess my answer to the question of why countries hack is the same as why countries do anything-- governments tend to do whatever they can get away with unchecked. Until someone checks them, governments will do it. Sure, knowing the reason behind the espionage helps defend against it. But "because we can" is always the best reason. 


7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8003
PUBLISHED: 2020-01-27
A double-free vulnerability in vrend_renderer.c in virglrenderer through 0.8.1 allows attackers to cause a denial of service by triggering texture allocation failure, because vrend_renderer_resource_allocated_texture is not an appropriate place for a free.
CVE-2019-20427
PUBLISHED: 2020-01-27
In the Lustre file system before 2.12.3, the ptlrpc module has a buffer overflow and panic, and possibly remote code execution, due to the lack of validation for specific fields of packets sent by a client. Interaction between req_capsule_get_size and tgt_brw_write leads to a tgt_shortio2pages integ...
CVE-2019-20428
PUBLISHED: 2020-01-27
In the Lustre file system before 2.12.3, the ptlrpc module has an out-of-bounds read and panic due to the lack of validation for specific fields of packets sent by a client. The ldl_request_cancel function mishandles a large lock_count parameter.
CVE-2019-20429
PUBLISHED: 2020-01-27
In the Lustre file system before 2.12.3, the ptlrpc module has an out-of-bounds read and panic (via a modified lm_bufcount field) due to the lack of validation for specific fields of packets sent by a client. This is caused by interaction between sptlrpc_svc_unwrap_request and lustre_msg_hdr_size_v2...
CVE-2019-20430
PUBLISHED: 2020-01-27
In the Lustre file system before 2.12.3, the mdt module has an LBUG panic (via a large MDT Body eadatasize field) due to the lack of validation for specific fields of packets sent by a client.