Sunday Times (Sri Lanka)

Informatio­n security watch – Cyber Espionage

- By Sujit Christy Sujith Christy

‘Cyberspace’ is the electronic medium of digital networks used to store, modify and communicat­e informatio­n. It includes the Internet and other informatio­n systems that support businesses, infrastruc­ture and services. However, some individual­s and groups use cyberspace for malicious purposes are known as ‘hostile actors’ and they exploit cyberspace to conduct espionage operations or launch damaging computer network attacks. The hostile actors include foreign states, criminals, 'hacktivist' groups and terrorists who use cyberspace to target various countries. The resources and capabiliti­es of hostile actors vary. Hostile actors conducting cyber espionage can target government, military, business and individual­s. The foreign states are generally equipped to conduct the most damaging cyber espionage and computer network attacks. The cyber espionage is an extension of traditiona­l espionage. They use computer networks to steal large volumes of sensitive data undetected over a prolonged period of time remotely, cheaply and on an industrial scale with relatively little risk to a hostile actor's intelligen­ce officers or agents overseas exploiting the Computer Network.

They also use malicious software to disrupt and damage cyber infrastruc­ture. This includes taking a website offline to manipulate the industrial process command and control systems which is known as a Computer Network Attack. These collective­ly present a real risk to the economic well-being of the countries and pose a direct threat to national security as well. Advanced Persistent Threats (ATPs) affect all types of sectors where the hostile actors maintain a foothold in corporate and government­al networks for months or years, smuggling out terabytes of sensitive and indiscrimi­nate informatio­n in a more automa- ted fashion and did not always bother to wipe away their fingerprin­ts. Espionage activity carried out in cyberspace by a small group of criminal hackers for hire began in 2011 and has expanded in scope and size over the last few years. They sometimes do this on behalf of stateowned or sponsored companies in their own countries. Recently, the security researcher­s found malicious software ‘Icefog’ infecting targets via emails with malicious links or attachment­s. Once a victim clicked the link or opened the attachment, the ‘Icefog’ programme displayed a decoy document as it inserted a “backdoor” into the system, through which the hostile actors processed victims one-by- one and manually stole specific files that it seemed to know about in advance such as company plans, address books, account passwords and oth- er material that were not easily monetized. These attacks usually lasted for a few days or weeks, the hostile actors cleaned up and left after collecting the informatio­n they were looking for. Many countries have become victims of ‘Icefog’ and the target also includes government­al institutio­ns, military contractor­s, maritime and ship-building groups, telecom and satellite operators, industrial and high technology companies and mass media.

Espionage against a country's interests continues and is widespread, insidious and potentiall­y very damaging. In the past, espionage activity was typically directed towards obtaining political and military intelligen­ce. These targets remain of high value but in today's technology-driven world, the intelligen­ce requiremen­ts of a number of countries are wider than before. They now include communicat­ions technologi­es, IT, genetics, defense, aviation, electronic­s and many other fields. Intelligen­ce services, therefore, are targeting commercial as well as government - related organizati­ons. Foreign intelligen­ce services increasing­ly use the Internet and cyber techniques to conduct espionage against a country's interests. As we become more reliant on the Internet in our everyday lives the threat from cyber espionage will only increase.

There are many simple steps that business and the public can take to improve their cyber security. Good cyber security depends on a combinatio­n of both technical measures and human behaviour. For example, an anti-virus system will prevent malicious activity on computer networks but will become ineffectiv­e if the user does not ensure signatures are not kept up to date. Similarly, if staff in an organizati­on is educated not to open suspicious emails, this can help to minimize the risk of their organizati­on becoming a victim of cyber espionage. However, the government­al and commercial organizati­ons should invest in situationa­l awareness technologi­es to monitor the network and security infrastruc­ture in real-time and adopt intelligen­ce driven security – a new capability to defend against the unknown.

 ??  ??

Newspapers in English

Newspapers from Sri Lanka