Cyberwar: How Prepared Is Nepal?

The main reason Nepal became a target of cyber attackers was because of the chaos and dilemma caused by the earthquake.

The proliferation of Internet usage in the recent years has changed the way we interact daily.

Right from the usage of e-Commerce, online banking, social networking sites up to connecting every single device like the Internet of things, IOT i.e. toasters, refrigerators, televisions, temperature controls, home automation systems, nuclear power station to the Internet and controlling them from any end point of the globe have been developed.

After land, sea, air and space, warfare has entered the fifth domain: cyberspace.

Back in the old days, war was fought either from land, sea, air, and space with guns, ammunition, fighter jets, missiles, but now an individual or even a group of individuals can wage a war with just a use of computers and working Internet connection, right from their bed while taking a sip of tea and in pajamas.

So, cyber warfare is the art and science of fighting without fighting; defeating an opponent without spilling their blood. In other words, cyber war refers to the action by a nation-state, to penetrate other nations’ computers and networks for the purpose of causing damage or disruption.

These days almost all the nations are fully dependent on the Internet for storage and transference of information and information in this era has become a critical part of daily operations.

What we say, what we do, what we share, what we plan are very critical information we hold as an individual or as a nation overall, and this information could be used against us.

The Internet was not originally designed with security in mind, but as an open system to allow scientists and researchers to send data to one another quickly. Without strong investments in cyber security and cyber defenses, data systems remain open and susceptible to rudimentary and dangerous forms of exploitation and attack.

Back in the old days (the late 80’s and early 90’s), hackers used to break into systems for fun and with motive of learning new things. Robert Tappan Morris, a Cornell University graduate student who released the most notable internet worm also known as ‘Morris worm’ on November of 1988, was where the people started noticing the ability and potential of the Internet.

Vulnerability of Nepal

Nepal is also extremely vulnerable to cyber-attacks and is encountering a high number of malware attacks on a daily basis. The Asia Pacific region is especially vulnerable with emerging markets most at risk of malware threats.

Nepal has also become a target and being exploited by cyber-criminals and state sponsored hackers. Previously, Naikon also known as APT-30 (Advanced Persistent Threat) group, has targeted military, government and civil organizations and exploited them.

Carbanak, an APT style attack, also resulted in financial loss for Nepal and almost thirty other countries. These types of attacks are growing rapidly although Nepal has not developed much in terms of technology.

Although Nepal has Information Technology Security Emergency Response Team (ITSERT-NP) it does not actively participate in research and development nor do they participate in active intelligence gathering and learning about new threats and spreading awareness.

Technical personnel capable of defending the national level infrastructure are extremely limited and are always outnumbered by start-up hackers. Lack of training, resource, materials and especially security awareness seem to be the problem in Nepal.

The first phase should be divided into learning defensive tactics and then gradually developing offensive techniques and eventually building up an elite cyber task force for national defense of information and security of Nepal.

During 2014-2015 Nepal was highly vulnerable to cyber-attacks since the national infrastructure almost collapsed because of the massive earthquake, and as a result, thousands of websites and servers, including servers from government, military and private servers, were victims of huge cyber-attacks and cyber vandalism.

Most of the websites are built by people who have little or no knowledge about security and on top of that the websites are built for small amounts ranging from a minimum of five thousand to fifty thousand rupees.

Until and unless the gap between developers and security people are bridged, cyber-attacks will continue and will be a big curse for Nepalese economy and national infrastructure.

There is no such thing as hack-proof security but still adding an extra layer of security and using the concept of defense in depth will make attackers put in more effort, time and resource.

No matter how deep the defense is or how hard you are trained to defend, an attacker will always find a way inside and eventually break into the systems, but that does not mean to do nothing. We can never predict a cyber-war until we start one.

Previous attacks could be of great help to predict future attacks and patterns of attacks. We can expect satellites, naval forces, aircraft, missiles and rockets being hacked and exploited to cause severe damage to the global economy and infrastructure.

If we do not prepare now for cyber warfare, develop threat intelligence and prepare defensively then it could raise massive threats.

Ein News:      Cyber Warfare: Regional Is Becoming Global:

 

« How Much Cyber Insurance Is Enough?
Iranian Malware Delivered Via Fake Oxford University Sites »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Security Affairs

Security Affairs

Security Affairs is a blog covering all aspects of cyber security.

Cloud Security Alliance (CSA)

Cloud Security Alliance (CSA)

The CSA is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing

Ingalls Information Security

Ingalls Information Security

Ingalls Information Security provides network security, monitoring and forensics.

LIFARS

LIFARS

LIFARS is a global leader in Digital Forensics and Cyber Resiliency Services.

GraVoc

GraVoc

GraVoc is a technology-consulting firm committed to solving business problems for customers through the development, implementation, & support of technology-based solutions.

Vehere

Vehere

Vehere specialises in mission critical signals aquisition and analytics platform and cyber defence systems.

Cyber Security Academy (CSA)

Cyber Security Academy (CSA)

The CSA aims to educate professionals who wish to contribute to strengthening the digital defensibility of states, organisations and individual citizens.

Responsible Cyber

Responsible Cyber

Protect yourself with Responsible Cyber’s 360° platform, IMMUNE, arming you with comprehensive support for your business.

Flix11

Flix11

Flix11 is a Cyber Security & ICT Solutions focused company. We provide a range of products and services in Cyber Security, Internet of Things (IoT) and infrastructure solutions.

Senserva

Senserva

Senserva delivers a deep analysis for security user accounts and applications within the Microsoft cloud environment.

CyberLab

CyberLab

CyberLab (formerly Chess) is a specialist cyber security company that provides a wide range of security solutions and services.

National Institute for Research & Development in Informatics (ICI Bucharest) - Romania

National Institute for Research & Development in Informatics (ICI Bucharest) - Romania

ICI Bucharest is the most important institute in the field of research, development and innovation in information and communication technology (ICT) in Romania.

Diligent

Diligent

Diligent's SaaS GRC platform gives leaders a connected view of governance, risk, compliance and ESG across their organization.

TatvaSoft

TatvaSoft

TatvaSoft is a custom software development company delivering business IT solutions and related services to customers across the globe.

Hushmesh

Hushmesh

Hushmesh is a start-up aimed at securing the world’s digital infrastructure by developing develop the Mesh, a global information space with automated security built in.

ThreatDown

ThreatDown

ThreatDown, powered by Malwarebytes, is on a mission to overpower threats and empower IT by removing the complexity of detecting and stopping today’s most advanced threats.