02.03.2019 Views

Cyber Defense Magazine - Annual RSA Conference 2019 - Print Edition

Cyber Defense Magazine - Electronic Version - Annual RSA Conference 2019 - Print Edition

Cyber Defense Magazine - Electronic Version - Annual RSA Conference 2019 - Print Edition

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

P3 - Nation-state hacking, it’s an emergency<br />

The number of operations attributed to nation-state attackers will increase<br />

in the next months. The lack of a global framework of norms of<br />

state behaviour in the cyber space and the absence of severe sanctions<br />

for rogue states will encourage state-sponsored hacking. Government<br />

will continue to carry out cyber espionage and sabotage<br />

campaigns, Russia, China and North Korea will be most aggressive<br />

countries in the cyber arena. While China will be more focused on<br />

cyber espionage, North Korea will focus its operations on stealing<br />

funds due to the sanctions against its Government. The most dreaded<br />

state will be Russia, its state-sponsored hackers will be more focused<br />

on cyber espionage and on online misinformation.<br />

In this scenario, other APT groups, such as Iran-linked cyber espionage<br />

crews, will be very active in <strong>2019</strong>.<br />

P4 – Supply Chain attacks on the rise<br />

Threat actors, especially state-sponsored attackers, will focus their<br />

efforts in compromising the supply chain of popular software to hit a<br />

wide audience. Threat actors implant malware into legitimate applications<br />

replacing their software update with tainted versions. In this<br />

way, every user receiving the update will automatically have their<br />

system compromised.<br />

In the last months security experts discovered several attacks against<br />

supply chain of popular applications. In August, experts from Trend<br />

Micro uncovered the Operation Red Signature, attackers compromised<br />

update server of a remote support solutions provider in South<br />

Korea and delivered a remote access Trojan (RAT) used to steal sensitive<br />

information from the victims.<br />

In July Microsoft revealed that hackers attempted to compromise<br />

the supply chain of an unnamed maker of PDF software.<br />

Experts fear that a growing number of threat actors will target the<br />

supply chain in the next months due to the efficiency of this attack<br />

scheme. The attacks will be more sophisticated and could be hard to<br />

detect.<br />

6 <strong>Cyber</strong> <strong>Defense</strong> <strong>Magazine</strong> - <strong>Annual</strong> <strong>Print</strong> <strong>Edition</strong> <strong>2019</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!