Increase In State-Sponsored Cyber Attacks

Western nations should brace for more cyber security attacks on critical infrastructure from "second tier" nation states, as warfare from developing nations increasingly shifts online, according to a US cyber security expert who spent more than 30 years with the National Security Agency.

Phil Quade, who has recently become chief information security officer at cyber security software firm Fortinet, rose through the ranks of the NSA in his three-decade long career, serving in both "offensive" and "defensive" capacities, protecting the country's secrets and attacking adversaries.

He said the so-called Five Eyes countries (an alliance between Australia, Canada, the US, New Zealand and the UK), had adversaries of all sizes, including states that would be too small to consider starting a traditional war, but now saw an opportunity to strike virtual blows.

"They recognise that you don't want to take on a nation state with planes, bullets and ships from their position, they want to take them on asymmetrically. I expect mid-sized and smaller countries will increasingly resort to more cyber warfare," Mr Quade said.

Examples of state-based attacks are numerous. In 2015 the Ukraine energy grids was temporarily switched off after cyber criminals, suspected to be acting for Russia, compromised information systems of three energy distribution companies.

North Korean state-sponsored groups were also linked to the 2014 Sony hack and cybersecurity company FireEye has previously said to be monitoring 30 groups linked to nation state cyber-attacks.

Mr Quade said he was in Australia to investigate why local clients were adopting the company's broad range of cyber security products more quickly than other countries, which still invest mostly in its flagship firewall product.

Strategy

The former NSA leader joined Fortinet in January and is responsible for building alliances with external c-suite executives and advancing the national dialogue on cyber security, as well as internally ensuring Fortinet's IT products and services are secure.

Mr Quade was also given permission to create a group dedicated to critical infrastructure protection, which he said would focus on community concerns around national assets, rather than business development.

Despite regular assurances from utility and telecommunications companies (considered critical infrastructure) that they have state-of-the-art cyber security defences, Mr Quade said that in his experience financial services companies were usually best in class for their approach to cyber security

"I don't want to be too critical, because my knowledge of the US is better ... but typically financial services does a nice job of communicating about shared risks. One man's detection is another man's prevention. But it goes mostly downhill from there," he said.

"[To get to the leading edge] the first thing to recognise is that we need to better integrate the disciplines of security. Right now we often manage IT and OT (operational technology) separately and then have a third person in charge of physical security.

"We need to get better at integrating these approaches and that will close the seams the adversaries seem to exploit."

Increasing Threats

According to Fortinet's latest quarterly threat landscape report, cyber-attacks are increasing in volume, variety and velocity.

The report found cryptocurrency mining malware was on the rise in APAC and globally, with cyber criminals utilising a technique termed crypto-jacking to mine cryptocurrencies by loading a script into a web browser without installing anything onto the computer.

In Australia specifically, it was also observed that attacks had been particularly concentrated on the healthcare and education sectors and this was attributed to the lower cyber knowledge of workers in these sectors, in conjunction with the bring-your-own-device trend.

Ransomware was also found to still be prevalent and three of the top 20 attacks identified by Fortinet had been targeted at internet of things devices.

In February the new mandatory data breach notification rules came into effect in Australia, meaning companies above a $3 million revenue threshold or that are subject to the Privacy Act, must disclose data breaches that could result in "serious harm".

Under the new laws, sea safety and support company Svitzer Australia was the first to publicly disclose that the email accounts of three Australian employees had been compromised between May 27, 2017 and March 1, 2018, with emails auto forwarded to two external accounts. After discovering the breach, the company stopped the theft within five hours.

Mr Quade said that internationally Europe's GDPR regulations on data breaches were considered the most aggressive, with penalties including 4 per cent of a company's revenue for failing to report a breach.

"It's a toothy way of causing movement. But in my whole career I've found you don't always have to use the stick, sometimes the carrot is the right approach," he said.

"The NDB scheme doesn't have the same toothiness as the GDPR, but that doesn't mean it's wrong, it's just a different balance."

Australian Financial Review

You Might Also Read: 

Cyber Criminals Catch Up With Nation-States:

Nation State Hacking Is On Trend In 2018:

 

« Will AI Replace Most Jobs?
NATO & EU Form Cybersecurity Partnership »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Global Secure Solutions (GSS)

Global Secure Solutions (GSS)

Global Secure Solutions is an IT security and risk consulting firm and authorised ISO training partner for the PECB.

Intelligence-sec

Intelligence-sec

Intelligence-Sec is a fully integrated Conferences and Exhibitions Company managing and producing topical events for the security industry.

Feedzai

Feedzai

Feedzai provide software that uses big data analysis and machine-based learning to prevent fraud in ecommerce.

Global Learning Systems (GLS)

Global Learning Systems (GLS)

Global Learning Systems provides security awareness and compliance training programs for employees that effectively promote behavior change and protect your organization.

Equilibrium Security Services

Equilibrium Security Services

Equilibrium Security Services is a specialist cyber security company providing a full spectrum of IT security solutions from consultancy to design & implementation and managed security services.

Cynerio

Cynerio

Cynerio develops cybersecurity protections for medical devices, comparing network behavior with a database of medical workflows.

Red Snapper Recruitment

Red Snapper Recruitment

Red Snapper Recruitment is a market leading staffing services provider to the law enforcement, cyber security, offender supervision and regulatory services markets.

Lumu Technologies

Lumu Technologies

Lumu is a cybersecurity company that illuminates threats and attacks affecting enterprises worldwide.

Cyberspace Solarium Commission (CSC)

Cyberspace Solarium Commission (CSC)

The Cyberspace Solarium Commission was established to develop a consensus on a strategic approach to defending the United States in cyberspace against cyber attacks of significant consequences.

Finosec

Finosec

Finosec's mission is to change the way information security and cybersecurity are managed in banking.

Secura B.V.

Secura B.V.

Secura is an independent specialized cybersecurity expert, providing insights to protect valuable assets and data.

Force Majeure

Force Majeure

Force Majeure specializes in cybersecurity, incident response, and digital forensics, with experience spanning more than a decade.

Helix Security Services

Helix Security Services

Helix Security provides IT & information security consultancy to government and businesses across New Zealand.

Gomboc.ai

Gomboc.ai

Gomboc solve cloud infrastructure security policy deviations by providing tailored remediations to the IaC (Infrastructure as Code).

Boecore

Boecore

Boecore is an aerospace and defense engineering company that specializes in software solutions, systems engineering, cybersecurity, enterprise networks, and mission operations.

Revytech

Revytech

Revytech is a tech company providing services in a broad range of areas including IT operations, cyber security and network engineering.