Nation State Attacks Increase, But Tactics Remain The Same

Netskope, a cybersecurity company, revealed that nearly two-thirds of attributable malware used in attacks over the past year is linked to state-backed groups.

The report is based on 12 months of data collected from customer environments, with the largest share of malware attacks coming from North Korean groups, followed by China and Russia.

Netskope's findings highlight the growing digital threat from state-backed cyber-threats. The report emphasizes that state-affiliated actors are outsourcing operations to cybercriminals, further complicating attribution.

MI5 director general, Ken McCallum, warned of the increasing digital threat from Russia.

Ray Canzanese, Director of Netskope Threat Labs, pointed out that attribution can be challenging as adversaries try to hide their true identities or launch false-flag operations. Multiple groups often use the same tactics and techniques, making it difficult to define adversary groups.

The article also mentions that financially motivated attacks, largely carried out by cybercrime groups, comprised more than 90 percent of the total analyzed by Verizon last year.

Netskope's warnings carry weight because as nation state actors expand their operations, they target cloud applications for entry and exfiltration.

North Korean actors focus mainly on profit, while China and Russia target high-value victims such as critical infrastructure providers for disruption and cyber-espionage.

Source: https://www.infosecurity-magazine.com/news/twothirds-attributable-malware/
 

Commentary

The source notes two groups that are targeting data - nation states and cybercriminals. Although their goals may be different - espionage, profit, disruption - their social engineering methods are similar.

The most common tactics are:

  • Spear Phishing: This involves sending carefully crafted emails to targeted individuals, often impersonating trusted sources to trick targets into revealing sensitive information or clicking on malicious links. These emails are designed to look legitimate and can be highly personalized based on the victim's online presence.
  • Smishing: This is like phishing but conducted through SMS or text messages. Cybercriminals send texts pretending to be someone else to steal information. These messages can include fake delivery notifications, late payment warnings, or requests for sensitive information.
  • Poisoning the Well: This tactic involves compromising strategic websites that are frequently visited by the target audience. The compromised websites then serve malicious software to their visitors, effectively snaring victims.

The final takeaway is that organizations that want to lower their exposure to nation state and cybercriminal attacks should focus on training employees and other system participants on identifying phishing.

Finally, your opinion is important to us. Please complete the opinion survey:

Product

Articles

FBI Warns Of IoT Malware: How Does It Affect Video Surveillance In Organizations?

The FBI issued a warning about malware compromising certain IoT devices, including video surveillance equipment. We examine and provide IoT best practices for organizations.

Staffing Algorithms, Negligence, And Employment Practice Liability

A senior living facility agrees to pay nearly $2M in fees and expenses concerning its staffing algorithm. We examine the liability exposure from staffing algorithms.

The Many Faces Of Payroll Fraud: What Steps Can Organizations Take?

An office manager goes to prison for committing payroll fraud. We examine the facts and the different types of payroll fraud, as well as provide loss prevention steps.

Crypto-Kidnappings Surge In France And Europe: Why Now?

A kidnapping attempt is made on the daughter of a cryptocurrency executive. This is just one of other crimes, including abductions, against crypto executives. Why now?

Which Is More Important - Location Or Schedule? You Make The Call

A survey reveals employees prefer remote work, but really want schedule autonomy. Is that true? You make the call.