1St CYBER SECURITY WORKSHOP

1St CYBER SECURITY WORKSHOP

1st CYBER SECURITY WORKSHOP “CYBER CAPABILITIES AND THEIR FUTURE USE: CHALLENGES AND STRATEGIC OUTLOOK ” KONRAD-ADENAUER- STIFTUNG TURKEY (KAS) in cooperation with THE CENTRE FOR ECONOMICS AND FOREIGN POLICY STUDIES (EDAM) Ankara, 04.12-06.09.2019 PANEL-1: Regional powers turn to cyber capabilities: The Case of the Middle East „The Stuxnet effect: Iran`s cyber-conflict conduct after 2010“ Kerstin Zettl, M.A. University of Heidelberg Institute of Political Science Stuxnet as the necessary cyber-„push“ to Iran? • Stuxnet became public in 2010 • Heavily disruptive malware • Alleged masterminds: USA & Israel • Target: Iranian nuclear facility in Natanz • Effect: Destruction of many thousand Source: Yahoo News photo illustration; photos: AP, Getty Images. Shutterstock centrifuges Question: How did Iran`s cyber-conflict-conduct evolve after Stuxnet? Kerstin Zettl - The Stuxnet Effect: Iran`s cyber-conflict conduct after 2010 2 Cyber-attacks attributed to Iran from 2009 to 2017 (N=58; Source: HD-CY.CON) 14 12 10 8 6 4 2 0 2009 2010 2011 2012 2013 2014 2015 2016 2017 Attack Number (Proxy; N=37) Attack Number (State; N=5)) Attack Number (Other/Unknown; N=16) Kerstin Zettl - The Stuxnet Effect: Iran`s cyber-conflict conduct after 2010 3 Mostly affected target countries Espionage (e.g. OilRig, APT33) 8 7 e.g. Operation Ababil vs. US 6 Shamoon vs. Saudi-Arabia 5 e.g. Sands Casino Hack vs. US 4 3 2 1 0 2009 2010 2011 2012 2013 2014 2015 2016 2017 USA (N=17) SAU (N=11) ISR (N=9) Other Countries Middle East (N=17) Kerstin Zettl - The Stuxnet Effect: Iran`s cyber-conflict conduct after 2010 4 Overall conflict-development after Stuxnet 250 200 150 100 50 0 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017* Number of Incidents with Attributed State-Involvement Total Incident Number *Preliminary Result Kerstin Zettl - The Stuxnet Effect: Iran`s cyber-conflict conduct 5 after 2010 Developments in Iranian Proxy-Landscape Professionalization: From patriotic hackers mostly conducting DDoS- attacks to espionage on behalf of the state (similar to developments in the chinese hacking community a decade before) Example: Ajax Security Team (aka Flying Kitten; before 2014 mostly defacement, afterwards malware-based-espionage; e.g. Operation Saffron Rose, targets: US-defense companies and Iranian users of anti- censorship technologies) Source: https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-operation-saffron-rose.pdf Kerstin Zettl - The Stuxnet Effect: Iran`s cyber-conflict conduct 6 after 2010 Conclusion/Questions for the future Iran`s cyber-conflict conduct originated and heavily increased after Stuxnet in 2010, but in the long-term mostly as a complementary strategy in regional offline-conflicts. • Iran`s reaction to US withdrawal from JCPOA (2018): Increased cyber-attacks against US-targets? • Disruptive attacks also against western or israeli targets, due to increased offensive capabilities? • Future integration of Iranian cyber-means in conventional conflicts? Kerstin Zettl - The Stuxnet Effect: Iran`s cyber-conflict conduct after 2010 7 Thank you very much for your attention! Kerstin Zettl - The Stuxnet Effect: Iran`s cyber-conflict conduct after 2010 8 Appendix Obfuscating Iranian government involvement in offensive campaigns. Source: https://www.recordedfuture.com/iran-hacker-hierarchy/ Kerstin Zettl - The Stuxnet Effect: Iran`s cyber-conflict conduct after 2010 9 (Non-exhaustive) list of Iranian Proxies • Cutting Kitten • Chafer • OilRig (aka APT34; aka Helix Kitten; aka Chrysene) • Copy Kittens • APT33 (aka Magic Hound) • Charming Kitten (aka APT35, aka Newscaster) • Domestic Kitten • Dark Hydrus • ... Kerstin Zettl - The Stuxnet Effect: Iran`s cyber-conflict conduct after 2010 10 US indictments against Iranian cyber-actors Source: https://www.lawfareblog.com/whats-point- charging-foreign-state-linked-hackers 11.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    11 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us