WORLD WAR C : Understanding Nation-State Motives Behind Today’S Advanced Cyber Attacks
Total Page:16
File Type:pdf, Size:1020Kb
REPORT WORLD WAR C : Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks Authors: Kenneth Geers, Darien Kindlund, Ned Moran, Rob Rachwald SECURITY REIMAGINED World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks CONTENTS Executive Summary ............................................................................................................................................................................................................................................................................................................... 3 Introduction ............................................................................................................................................................................................................................................................................................................................................... 4 A Word of Warning ................................................................................................................................................................................................................................................................................................................. 5 The FireEye Perspective ............................................................................................................................................................................................................................................................................................ 5 Asia-Pacific ................................................................................................................................................................................................................................................................................................................................................... 6 Russia/Eastern Europe ............................................................................................................................................................................................................................................................................................ 12 Middle East ............................................................................................................................................................................................................................................................................................................................................. 14 The West ....................................................................................................................................................................................................................................................................................................................................................... 18 Conclusion ................................................................................................................................................................................................................................................................................................................................................ 21 About FireEye .................................................................................................................................................................................................................................................................................................................................. 22 2 www.fireeye.com World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks Executive Summary between the means chosen and their goals will Cyberspace has become a full-blown war zone as look rational and reasonable to them if not governments across the globe clash for digital necessarily to us.” supremacy in a new, mostly invisible theater of operations. Once limited to opportunistic criminals, Just as each country has a unique political cyber attacks are becoming a key weapon for system, history, and culture, state-sponsored governments seeking to defend national sovereignty attacks also have distinctive characteristics, and project national power. which include everything from motivation to target to type of attack. From strategic cyber espionage campaigns, such as Moonlight Maze and Titan Rain, to the destructive, This report describes the unique characteristics of such as military cyber strikes on Georgia and Iran, cyber attack campaigns waged by governments human and international conflicts are entering a new worldwide. We hope that, armed with this knowl- phase in their long histories. In this shadowy edge, security professionals can better identify their battlefield, victories are fought with bits instead of attackers and tailor their defenses accordingly. bullets, malware instead of militias, and botnets instead of bombs. Here is a quick overview: These covert assaults are largely unseen by the • Asia-Pacific. Home to large, bureaucratic public. Unlike the wars of yesteryear, this cyber hacker groups such as the “Comment Crew” war produces no dramatic images of exploding who pursue many goals and targets in warheads, crumbled buildings, or fleeing civilians. high-frequency, brute-force attacks. But the list of casualties—which already includes some of the biggest names in technology, financial • Russia/Eastern Europe. These cyber attacks services, defense, and government —is growing are more technically advanced and highly larger by the day. effective at evading detection. A cyber attack is best understood not as an end in • Middle East. These hackers are dynamic, itself, but as a potentially powerful means to a wide often using creativity, deception, and variety of political, military, and economic goals. social engineering to trick users into com- promising their own computers. “Serious cyber attacks are unlikely to be motiveless,” said Martin Libicki, Senior Scientist • United States. The most complex, targeted, at RAND Corp. “Countries carry them out to and rigorously engineered cyber attack achieve certain ends, which tend to reflect their campaigns to date. broader strategic goals. The relationship 3 www.fireeye.com World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks Introduction everything a user does on a computer. A software World War Z—a bestselling book and Holly- program that steals data from any nearby device wood movie—detailed a global pandemic in that has Bluetooth connectivity. Encrypted code which politics and culture deeply influenced that decrypts only on one specific, target device. how the public—and by extension, govern- Such sophistication speaks volumes about the ments—reacted to a zombie plague. In one maturity, size, and resources of the organizations passage, for example, an Arab boy refused to behind these attacks. With a few rare exceptions, believe that the disease was real, suspecting these attacks are now in the exclusive realm of that Israel had fabricated the story. The nations nation-states. described in World War Z—the United States, China, Russia, South Korea, Israel, and many “The international community has developed a others—are involved in a very different type of solid understanding of cyber technology,” said conflict, but one with real and growing national Prof. Michael N. Schmitt of the U.S. Naval War security impact: World War C, where “C” College, in an email interview. “What is missing stands for “Cyber”. However, the same rule is a grasp of the geopolitical context in which applies: each country has a unique political such technology operates. Attribution determi- system, history, language, culture, and under- nations made without sensitivity to the geopolit- standing of human and international conflict. ical surroundings are seldom reasonable.” Cyber conflict often mirrors traditional conflict. World War C, like any analogy, has its limits. For example, China uses high-volume cyber Cyber war has been compared to special attacks similar to how it used infantry during the operations forces, submarine warfare, missiles, Korean War. Many Chinese soldiers were sent assassins, nuclear weapons, Pearl Harbor, 9/11, into battle with only a handful of bullets. Given Katrina, and more. Even our zombie analogy is their strength in numbers, they were still able to not new. Often, any compromised computer, if achieve battlefield victories. On the other end of it is actively under the surreptitious control of a the spectrum lie Russia, the U.S., and Israel, whose cybercriminal, is called a zombie, and botnets cyber tactics are more surgical, reliant on are sometimes called zombie armies. Also, advanced technologies and the cutting-edge work compared to stockpiling tanks and artillery, of contractors who are driven by competition and writing cyber attack code, and compromising financial incentives. thousands if not millions of computers, is easy. Moreover, malware often spreads with the We are still at the dawn of the Internet Age. But exponential growth of an infectious disease. cyber attacks have already proven themselves as a low-cost, high-payoff way to defend national This report examines many publicly known sovereignty and to project national power. Many cyber attacks. By exploring some of the of today’s headlines seem to be pulled from the distinctive national or regional characteristics pages of a science fiction novel. Code so sophisti-