Increase In State-Sponsored Cyber Attacks

Western nations should brace for more cyber security attacks on critical infrastructure from "second tier" nation states, as warfare from developing nations increasingly shifts online, according to a US cyber security expert who spent more than 30 years with the National Security Agency.

Phil Quade, who has recently become chief information security officer at cyber security software firm Fortinet, rose through the ranks of the NSA in his three-decade long career, serving in both "offensive" and "defensive" capacities, protecting the country's secrets and attacking adversaries.

He said the so-called Five Eyes countries (an alliance between Australia, Canada, the US, New Zealand and the UK), had adversaries of all sizes, including states that would be too small to consider starting a traditional war, but now saw an opportunity to strike virtual blows.

"They recognise that you don't want to take on a nation state with planes, bullets and ships from their position, they want to take them on asymmetrically. I expect mid-sized and smaller countries will increasingly resort to more cyber warfare," Mr Quade said.

Examples of state-based attacks are numerous. In 2015 the Ukraine energy grids was temporarily switched off after cyber criminals, suspected to be acting for Russia, compromised information systems of three energy distribution companies.

North Korean state-sponsored groups were also linked to the 2014 Sony hack and cybersecurity company FireEye has previously said to be monitoring 30 groups linked to nation state cyber-attacks.

Mr Quade said he was in Australia to investigate why local clients were adopting the company's broad range of cyber security products more quickly than other countries, which still invest mostly in its flagship firewall product.

Strategy

The former NSA leader joined Fortinet in January and is responsible for building alliances with external c-suite executives and advancing the national dialogue on cyber security, as well as internally ensuring Fortinet's IT products and services are secure.

Mr Quade was also given permission to create a group dedicated to critical infrastructure protection, which he said would focus on community concerns around national assets, rather than business development.

Despite regular assurances from utility and telecommunications companies (considered critical infrastructure) that they have state-of-the-art cyber security defences, Mr Quade said that in his experience financial services companies were usually best in class for their approach to cyber security

"I don't want to be too critical, because my knowledge of the US is better ... but typically financial services does a nice job of communicating about shared risks. One man's detection is another man's prevention. But it goes mostly downhill from there," he said.

"[To get to the leading edge] the first thing to recognise is that we need to better integrate the disciplines of security. Right now we often manage IT and OT (operational technology) separately and then have a third person in charge of physical security.

"We need to get better at integrating these approaches and that will close the seams the adversaries seem to exploit."

Increasing Threats

According to Fortinet's latest quarterly threat landscape report, cyber-attacks are increasing in volume, variety and velocity.

The report found cryptocurrency mining malware was on the rise in APAC and globally, with cyber criminals utilising a technique termed crypto-jacking to mine cryptocurrencies by loading a script into a web browser without installing anything onto the computer.

In Australia specifically, it was also observed that attacks had been particularly concentrated on the healthcare and education sectors and this was attributed to the lower cyber knowledge of workers in these sectors, in conjunction with the bring-your-own-device trend.

Ransomware was also found to still be prevalent and three of the top 20 attacks identified by Fortinet had been targeted at internet of things devices.

In February the new mandatory data breach notification rules came into effect in Australia, meaning companies above a $3 million revenue threshold or that are subject to the Privacy Act, must disclose data breaches that could result in "serious harm".

Under the new laws, sea safety and support company Svitzer Australia was the first to publicly disclose that the email accounts of three Australian employees had been compromised between May 27, 2017 and March 1, 2018, with emails auto forwarded to two external accounts. After discovering the breach, the company stopped the theft within five hours.

Mr Quade said that internationally Europe's GDPR regulations on data breaches were considered the most aggressive, with penalties including 4 per cent of a company's revenue for failing to report a breach.

"It's a toothy way of causing movement. But in my whole career I've found you don't always have to use the stick, sometimes the carrot is the right approach," he said.

"The NDB scheme doesn't have the same toothiness as the GDPR, but that doesn't mean it's wrong, it's just a different balance."

Australian Financial Review

You Might Also Read: 

Cyber Criminals Catch Up With Nation-States:

Nation State Hacking Is On Trend In 2018:

 

« Will AI Replace Most Jobs?
NATO & EU Form Cybersecurity Partnership »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Caliber Security Partners

Caliber Security Partners

Caliber Security Partners is a full-service information security company, with a wide range of security services for clients with varying levels of security maturity.

American International Group (AIG)

American International Group (AIG)

AIG, is an American multinational insurance corporation. Commercial services include cyber risk insurance.

Security Industry Association (SIA)

Security Industry Association (SIA)

The SIA's mission is to be a catalyst for success​ within the global security industry through information, insight and influence.

Conix

Conix

Conix offerings include Governance and Risk Management, Auditing and Penetration Testing, Digital Forensics, Managed Security Operations Centre (SOC).

D-Fence

D-Fence

D-Fence high availability security service protects corporate email communication, the company and it's employee's against cyber threats.

Assystem

Assystem

Assystem delivers a comprehensive security approach for the industrial and service sectors that integrates physical security systems, industrial cyber-security, functional safety and dependability.

Get Safe Online

Get Safe Online

Get Safe Online is a leading source of unbiased, factual and easy-to-understand information on online safety.

Get Indemnity

Get Indemnity

Get Indemnity are specialist insurance brokers with experience working on a wide range of innovative business insurance products that combine risk management, indemnity and incident response services.

About Cyber Security.

About Cyber Security.

About Cybersecurity provides a galaxy-wide knowledge base of cybersecurity tactics and techniques derived from actual experience.

OriginalMy

OriginalMy

OriginalMy is a cybersecurity startup, focussed on digital governance and information authentication. Its mission is to prove authenticity using state-of-the-art cryptography and blockchain technology

Revere Technologies

Revere Technologies

Revere Technologies is a pure-play cyber security solutions and services provider in Sub-Saharan Africa.

Cranfield University

Cranfield University

Cranfield Defence and Security are at the forefront of their fields, offering capabilities ranging from cyber security and digital warfare to robotics, forensic sciences and simulation and analytics.

RMC

RMC

RMC was purpose-built for Mission Assurance and ICS/OT cybersecurity, dedicated to strengthening and protecting government and commercial assets.

Moro Hub

Moro Hub

Moro Hub, a subsidiary of Digital DEWA, is a UAE-based digital data hub focused on digital transformation and operational services.

Radiant Security

Radiant Security

Radiant Security offers an AI-powered security co-pilot for Security Operations Centers (SOCs). Reinforce your SOC with an AI assistant.

Sensity

Sensity

Sensity is a company that offers an AI-driven solution to detect and verify deepfakes and other forms of identity fraud.