Where In The World Do The Cyber Villains Live?

Hackers work all around the world, but what's particularly surprising is how much the style of an attack depends on where it comes from.

Until now it has been fairly easy to categorize malicious cyber-actors as State Sponsored APT, Hacktivist, Mercenary and Script Kiddie. However, a new threat actor has emerged who uses technological means to bring terror and chaos to our nation and its allies: the Cyber-Jihadist.

Cyber-Jihad has quickly arrived on the scene and will only continue to grow and hyper-evolve. As a well-funded adversary, Cyber-Jihadists can easily outsource the more sophisticated attacks, purchase potent zero days, infiltrate and map networks and exfiltrate and manipulate data from America’s virtually unprotected Internet of Things.

China

Security experts describe China as almost the polar opposite of the former Soviet Union.

“China as an adversary: they’re very loud and clangy when they get into the networks,” said James Scott, a senior fellow with the Institute for Critical Infrastructure Technology. A contributor to the ICIT’s brief Know Your Enemies, a primer on geographic threat vectors in cybersecurity, Scott has studied regional signatures extensively. Much of it has to do, he explained, with local conditions and goals.

While the former Soviet hackers are big money players, and so more surgically pursue larger payouts, attacks from China are generally government orchestrated attempts to consume as much data as possible.

“They’re in panic right now [to catch up technologically,” he said. “They’re throwing sheer number as far as attacks and going after everything and anything from aerospace to academia to hospitals. They’re saying, ‘We’ll figure out a way to use it later, but go after everything before the U.S. and the West starts making cybersecurity and [digital] hygiene a part of their culture.'”

The result is a noisier threat vector, one that’s less concerned with subtle, undetected attacks than it is with expatriating as much data as possible. The hackers often act with similar brazenness to their Russian counterparts as they often operate in the open as a branch of the Chinese government.

North Korea

A similar actor to China in that attacks out of North Korea are government sponsored, this epicenter has two distinctions that set it apart.

First, North Korean attacks lack the sophistication of those that come out of China. Calling them “script kiddies,” Scott said that the government relies on third parties to do the heavy lifting when it comes to technical sophistication. The country has a dedicated cyberwarfare agency Bureau 121, but it likely suffers from the same crippled development in both material and human capital as the rest of the country.

Second, North Korean attacks are actual attacks. As ICIT mentioned in their report, “North Korea uses cyber-warfare as a cost effective branch of their military. Many in North Korea see cyber-warfare as the strongest weapon.”

As a result, these attacks have in the past focused on targets with military and political value, including financial and media institutions. There is some dispute, however, about some of the attacks attributed to Pyongyang, most notably the Sony Pictures hack of 2014.

Southeast Asia/India

In Southeast Asia, a band of territory roughly stretching from Vietnam to India, hackers pursue fast capitalization, according to Scott. Absent the resources or time table of an Eastern Europe attack, attacks from this section of the world focus on quick fraud and low-key attacks.

A Southeast Asian hacker is more likely to be operating as a petty criminal than one of the corporate or government agents from elsewhere.

“The criminal element,” Scott said, “is looking for capitalization. That’s why ransomware is going to be big.”

This is a region that produces high volume, low stakes attacks such as fake antivirus software and ransomware, which locks up and erases a computer unless the victim pays for the decryption key, typically in bitcoins. As with much of the rest of the world, the profile here meets the circumstances. This band of countries doesn’t have a malicious state actor or the kind of cohesive resources that build the infrastructure seen elsewhere. Instead it’s more about individuals working in Internet cafes looking to make a relatively small amount of money.

The US

The most targeted nation in the world, the US has a wide variety of home-grown threats as well. Increasingly one of the biggest concerns out of America is corporate espionage.

Given the effectiveness of US law enforcement, hacker groups in America remain underground and can’t create the kind of overt institutionalization that they can in other countries. That doesn’t mean that they remain disorganized however. Identifying one such group as “Butterfly Group/Morpho,” the ICIT wrote that they are “organized and efficient.”

“The emergence of the Butterfly group should remind organizations that corporate espionage groups and non-state sponsored APTs [Advanced Persistent Threats] still exist," the ICIT said. "In fact, in certain aspects, they are more dangerous than state sponsored groups. Mercenary and espionage groups may possess specific knowledge of what information to steal or from what systems to steal data. This information may come from competitors or it may come from insider threats within the organization.”

Many American companies will pay good money for the kind of information that a hacker can steal, Scott said. Patent secrets, insider information stolen from law firms, strategy documents, all of this information is worth billions in the right hands, and it absolutely has a market here in the United States.

This isn’t an exhaustive list by absolutely any stretch of the imagination. It’s a series of profiles, and like any profile is limited both in scope and precision… a hacker can work anywhere he’s got a laptop and a wireless connection, and many from the regions above have their own way of doing business. Out of China alone, for example, many private criminal attacks have also been identified such as the Elderwood Platform and the mercenary group Hidden Lynx.

Still, hackers are swapping digital attacks all across the world. One of the remarkable things is how much geography seems to play a role in the Internet’s borderless world.

ICIT: http://bit.ly/1Oh7CL1    The Street: http://bit.ly/2b5d71R

« Cyber Spying All At Sea
Artificial Intelligence Has Finally Emerged Into Real Life »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

InformationWeek

InformationWeek

InformationWeek is the world's most trusted online community for business technology professionals like you.

Korea Internet & Security Agency (KISA)

Korea Internet & Security Agency (KISA)

KISA is committed to improving the competitiveness, reliability and security of Internet information and knowledge in Korea.

National Intelligence Service (NIS) - South Korea

National Intelligence Service (NIS) - South Korea

The NIS oversees policy on cyber security in South Korea by formulating and coordinating the execution of such policy and devising necessary schemes and guidelines.

Assured Information Security (AIS)

Assured Information Security (AIS)

AIS is committed to providing our customers with critical information security products, services, and training. We support diverse needs throughout business and industry.

Bechtel

Bechtel

Bechtel’s Industrial Control Systems Cyber Security Laboratory focuses on protecting large-scale industrial and infrastructure systems that support critical infrastructure.

Moxa

Moxa

Moxa is a leading provider of industrial networking, computing, and automation solutions for enabling the Industrial Internet of Things.

Quantum Xchange

Quantum Xchange

As the provider of unbreakable quantum-safe encryption, Quantum Xchange gives commercial enterprises and government agencies the ultimate defense to keep high-value data safe.

Center for Infrastructure Assurance and Security (CIAS)

Center for Infrastructure Assurance and Security (CIAS)

CIAS is developing the world's foremost center for multidisciplinary education and development of operational capabilities in the areas of infrastructure assurance and security.

Barikat Cyber Security

Barikat Cyber Security

Barikat is a provider of information security solution and services including security analysis and compliance, security testing, managed security services, incident response and training.

CyNam

CyNam

CyNam is a platform for enabling the growth and development of people and organisations within Cheltenham’s flourishing cyber technology ecosystem.

gener8tor

gener8tor

The gener8tor Cybersecurity Accelerator offers a cutting-edge program in San Antonio, home to the second-largest concentration of cybersecurity experts in the United States.

Accops Systems

Accops Systems

Accops enables secure and instant remote access to business applications from any device and network, ensuring compliant enterprise mobility.

Cyber Security Council UAE

Cyber Security Council UAE

The Cyber Security Council's vision is to protect UAE cyberspace, maintain confidence in our digital infrastructure and institutions, and build a cyber-resilient society.

Blue Bastion

Blue Bastion

Don’t give cybercriminals the chance to find weaknesses in your company’s cyber security system. Defend your institution from all attacks from all directions with Blue Bastion.

Genix Cyber

Genix Cyber

Genix Cyber provides world-class cybersecurity services that protect systems, cloud applications, infrastructure, critical data, and networks from evolving cyber threats.

Applaudo

Applaudo

Applaudo specializes in helping the world’s most admired brands optimize their IT solutions, reduce delivery costs, and accelerate their digital transformation.