Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

6/21/2018
05:44 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

Destructive Nation-State Cyberattacks Will Rise

More than 90 percent of respondents in a Tripwire survey in Europe expect attacks by state-sponsored threat actors to increase in the next 12 months.

Incidents like last year's WannaCry attacks by suspected North Korean threat actors and the more recent news about Russian hackers taking control of hundreds of thousands of network routers worldwide have clearly spooked the enterprise infosec community.

Security vendor Tripwire surveyed attendees at Infosecurity Europe 2018 in London earlier this month and found 83% of the 416 respondents saying they expected nation-state attacks against critical infrastructure targets in Europe to increase in the next 12 months.

The same proportion of respondents expected the attacks would go beyond espionage and cause service disruptions and actual physical harm to the victim organizations. Recent news about malware campaigns like Triton/Trisis and Industroyer/CrashOverride appear to be feeding those fears, Tripwire said in a blog announcing survey results.

More than 9-in-10 of the respondents—93%—expected an overall increase in attacks led by state-sponsored actors.

The results are unsurprising considering all the recent attacks and news worldwide involving state-sponsored threats, says Tim Erlin, vice president of product management and strategy at Tripwire.

Just in May for instance, the FBI disclosed that Russian persistent threat actor, the Sofacy group, had managed to infect more than 500,000 home-office routers and network attached storage devices worldwide with malware for remotely controlling them. Many security experts have expressed concern that infected devices could be used to launch DDoS and other attacks against organizations worldwide.

Similarly, last December's news that a threat actor had used a highly sophisticated malware tool dubbed Triton/Trisis to disrupt operations at a critical infrastructure facility in the Middle East, has stoked widespread concern about cyberattacks causing massive physical damage. In a survey that Dimensional Security conducted for Tripwire earlier this year, 70% of 151 respondents from energy and oil and gas companies expressed worry about cyberattacks causing catastrophic physical harm, such as explosions, at their facilities.

"The main takeaway from these survey results is that organizations are increasingly concerned about nation-state attacks," Erlin says. Many are making specific investments to defend against the growing threats, he says. Forty-four percent of the respondents in Tripwire's survey for instance said that malware like Triton/Trisis and Industroyer/Crashoverride used in attacks against Ukraine's electric grid, had driven increases in ICS security spending.

Concerns over nation-state attacks are certainly not limited to Europe. A similarly high degree of apprehension over the threat exists among US companies and organizations elsewhere. "Many of them have been affected by notable attacks, and many more by less well-known or public incidents," Erlin says. "Nation-state cyberattacks are not a geographically limited problem."

Expectedly, critical infrastructure organizations are more concerned about the threat because of the potential impact of a successful attack, he says. "Other industries are also concerned, but their concerns are centered more around operational impact than safety," Erlin notes.

Tripwire's survey at Infosecurity Europe 2018 showed that many organizations are not just cognizant about the heightened threat activity but are responding to it as well. More than two-thirds, or 69%, said their organizations had stepped up efforts to defend against nation-state attacks over the past 12 months. The results also revealed a somewhat surprisingly high degree of confidence among respondents, with 22% saying they felt "very prepared" and 60% saying they felt "fairly prepared" to defend against nation-state attacks. A bare 18% said they were unprepared.

"It’s common for individuals to express confidence in their own defensive capabilities, while simultaneously expressing a lack of confidence in everyone else," Erlin says. "The fact is that successful attacks continue to take place. Consistently and comprehensively implementing foundational security controls is the best way to reduce your risk."

Related Content:

Why Cybercriminals Attack: A DARK READING VIRTUAL EVENT Wednesday, June 27. Industry experts will offer a range of information and insight on who the bad guys are – and why they might be targeting your enterprise. Go here for more information on this free event.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
6/24/2018 | 10:50:05 PM
"Well, NOW I'm expecting it!!!"
Surveys like this always leave me suspicious. I strongly suspect that a lot of the respondents affirming these fears simply weren't thinking of them until they read the survey question.
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18954
PUBLISHED: 2019-11-14
Pomelo v2.2.5 allows external control of critical state data. A malicious user input can corrupt arbitrary methods and attributes in template/game-server/app/servers/connector/handler/entryHandler.js because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious at...
CVE-2019-3640
PUBLISHED: 2019-11-14
Unprotected Transport of Credentials in ePO extension in McAfee Data Loss Prevention 11.x prior to 11.4.0 allows remote attackers with access to the network to collect login details to the LDAP server via the ePO extension not using a secure connection when testing LDAP connectivity.
CVE-2019-3661
PUBLISHED: 2019-11-14
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows remote authenticated attacker to execute database commands via carefully constructed time based payloads.
CVE-2019-3662
PUBLISHED: 2019-11-14
Path Traversal: '/absolute/pathname/here' vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows remote authenticated attacker to gain unintended access to files on the system via carefully constructed HTTP requests.
CVE-2019-3663
PUBLISHED: 2019-11-14
Unprotected Storage of Credentials vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows local attacker to gain access to the root password via accessing sensitive files on the system.