Destructive Nation-State Cyberattacks Will Rise

  /     /     /  
Publicated : 22/11/2024   Category : security


Destructive Nation-State Cyberattacks Will Rise


More than 90 percent of respondents in a Tripwire survey in Europe expect attacks by state-sponsored threat actors to increase in the next 12 months.



Incidents like last years WannaCry attacks by suspected North Korean threat actors and the more recent news about Russian hackers taking control of hundreds of thousands of network routers worldwide have clearly spooked the enterprise infosec community.
Security vendor Tripwire surveyed attendees at Infosecurity Europe 2018 in London earlier this month and found 83% of the 416 respondents saying they expected nation-state attacks against critical infrastructure targets in Europe to increase in the next 12 months.
The same proportion of respondents expected the attacks would go beyond espionage and cause service disruptions and actual physical harm to the victim organizations. Recent news about malware campaigns like Triton/Trisis and Industroyer/CrashOverride appear to be feeding those fears, Tripwire said in a
blog
announcing survey results.
More than 9-in-10 of the respondents—93%—expected an overall increase in attacks led by state-sponsored actors.
The results are unsurprising considering all the recent attacks and news worldwide involving state-sponsored threats, says Tim Erlin, vice president of product management and strategy at Tripwire.
Just in May for instance, the FBI
disclosed
that Russian persistent threat actor, the Sofacy group, had managed to infect more than 500,000 home-office routers and network attached storage devices worldwide with malware for remotely controlling them. Many security experts have
expressed concern
that infected devices could be used to launch DDoS and other attacks against organizations worldwide.
Similarly, last Decembers news that a threat actor had used a highly sophisticated malware tool dubbed
Triton/Trisis
to disrupt operations at a critical infrastructure facility in the Middle East, has stoked widespread concern about cyberattacks causing massive physical damage. In a
survey
that Dimensional Security conducted for Tripwire earlier this year, 70% of 151 respondents from energy and oil and gas companies expressed worry about cyberattacks causing catastrophic physical harm, such as explosions, at their facilities.
The main takeaway from these survey results is that organizations are increasingly concerned about nation-state attacks, Erlin says. Many are making specific investments to defend against the growing threats, he says. Forty-four percent of the respondents in Tripwires survey for instance said that malware like Triton/Trisis and Industroyer/Crashoverride used in attacks against Ukraines electric grid, had driven increases in ICS security spending.
Concerns over nation-state attacks are certainly not limited to Europe. A similarly high degree of apprehension over the threat exists among US companies and organizations elsewhere. Many of them have been affected by notable attacks, and many more by less well-known or public incidents, Erlin says. Nation-state cyberattacks are not a geographically limited problem.
Expectedly, critical infrastructure organizations are more concerned about the threat because of the potential impact of a successful attack, he says. Other industries are also concerned, but their concerns are centered more around operational impact than safety, Erlin notes.
Tripwires survey at Infosecurity Europe 2018 showed that many organizations are not just cognizant about the heightened threat activity but are responding to it as well. More than two-thirds, or 69%, said their organizations had stepped up efforts to defend against nation-state attacks over the past 12 months. The results also revealed a somewhat surprisingly high degree of confidence among respondents, with 22% saying they felt very prepared and 60% saying they felt fairly prepared to defend against nation-state attacks. A bare 18% said they were unprepared.
It’s common for individuals to express confidence in their own defensive capabilities, while simultaneously expressing a lack of confidence in everyone else, Erlin says. The fact is that successful attacks continue to take place. Consistently and comprehensively implementing foundational security controls is the best way to reduce your risk.
Related Content:
70% of Energy Firms Worry About Physical Damage from Cyberattacks
TRITON Attacker Disrupts ICS Operations, While Botching Attempt to Cause Physical Damage
How to Protect Industrial Control Systems from State-Sponsored Hackers
5 Tips for Protecting SOHO Routers Against the VPNFilter Malware
Why Cybercriminals Attack: A DARK READING VIRTUAL EVENT Wednesday, June 27. Industry experts will offer a range of information and insight on who the bad guys are – and why they might be targeting your enterprise. Go
here
for more information on this free event.

Last News

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Destructive Nation-State Cyberattacks Will Rise