Cyber Defense Magazine - Annual RSA Conference 2019 - Print Edition
Cyber Defense Magazine - Electronic Version - Annual RSA Conference 2019 - Print Edition
Cyber Defense Magazine - Electronic Version - Annual RSA Conference 2019 - Print Edition
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
P3 - Nation-state hacking, it’s an emergency<br />
The number of operations attributed to nation-state attackers will increase<br />
in the next months. The lack of a global framework of norms of<br />
state behaviour in the cyber space and the absence of severe sanctions<br />
for rogue states will encourage state-sponsored hacking. Government<br />
will continue to carry out cyber espionage and sabotage<br />
campaigns, Russia, China and North Korea will be most aggressive<br />
countries in the cyber arena. While China will be more focused on<br />
cyber espionage, North Korea will focus its operations on stealing<br />
funds due to the sanctions against its Government. The most dreaded<br />
state will be Russia, its state-sponsored hackers will be more focused<br />
on cyber espionage and on online misinformation.<br />
In this scenario, other APT groups, such as Iran-linked cyber espionage<br />
crews, will be very active in <strong>2019</strong>.<br />
P4 – Supply Chain attacks on the rise<br />
Threat actors, especially state-sponsored attackers, will focus their<br />
efforts in compromising the supply chain of popular software to hit a<br />
wide audience. Threat actors implant malware into legitimate applications<br />
replacing their software update with tainted versions. In this<br />
way, every user receiving the update will automatically have their<br />
system compromised.<br />
In the last months security experts discovered several attacks against<br />
supply chain of popular applications. In August, experts from Trend<br />
Micro uncovered the Operation Red Signature, attackers compromised<br />
update server of a remote support solutions provider in South<br />
Korea and delivered a remote access Trojan (RAT) used to steal sensitive<br />
information from the victims.<br />
In July Microsoft revealed that hackers attempted to compromise<br />
the supply chain of an unnamed maker of PDF software.<br />
Experts fear that a growing number of threat actors will target the<br />
supply chain in the next months due to the efficiency of this attack<br />
scheme. The attacks will be more sophisticated and could be hard to<br />
detect.<br />
6 <strong>Cyber</strong> <strong>Defense</strong> <strong>Magazine</strong> - <strong>Annual</strong> <strong>Print</strong> <strong>Edition</strong> <strong>2019</strong>