Cyber Crime

Nation-state malware could become a commodity on dark web soon, Interpol warns

Interpol Secretary warns that nation-state malware will become available on the cybercrime underground in a couple of years.

Interpol Secretary General Jurgen Stock declared that nation-state malwre will become available on the darknet in a couple of years.

In the ongoing conflict between Russia and Ukraine, the malware developed by both nation-state actors and non state actors represents a serious risk for critical infrastructure and organizations worldwide.

Threat actors could perform reverse engineering of military-made malicious code and use their own versions in attacks in the wild. The scenario also opens the doors to false flag operations, nation-state actors could have access to cyber weapons used in the conflict and use them in attacks in the wild making the attribution impossible.

“That is a major concern in the physical world — weapons that are used on the battlefield and tomorrow will be used by organized crime groups,” said Jurgen Stock, the Interpol secretary general during a CNBC-moderated panel at the World Economic Forum in Davos, Switzerland, Monday.

“The same applies for the digital weapons that, maybe today are used by the military, developed by military, and tomorrow will be available for criminals,” he explained.

During the first couple of months after the Russian invasion of Ukraine, security firms have observed multiple attacks against Ukrainian government entities and organizations. Russia-linked APT groups used wipers to destroy the target systems, in some cases, these attacks hit companies operating in other regions, such as VIASAT.

Early this month, the European Union accused Russia of the cyberattack that hit the satellite KA-SAT network in Ukraine, operated by Viasat, on February 24.

This cyberattack caused communication outages and disruptions in Ukraine, it also impacted several EU Member States. 5,800 Enercon wind turbines in Germany were unreachable due to the spillover from this attack. Security researchers at SentinelLabs who investigated the attack spotted a previously undetected destructive wiper, tracked as AcidRain, that hit routers and modems

Stock urged strong cooperation between governments and law enforcement authorities to prevent nation-state malware will proliferate on the dark web.

“On the one hand, we are aware of what’s going on — on the other hand, we need the data, which are in the private sector,” Stock said. “We need your [cyber breach] reports. Without your reports, we are blind.”

“That is a gap we need to close together, not just law enforcement that require that we build bridges between our siloes, the islands of information.”

More exposed are critical infrastructure and supply chain, it is essential to increase their level of security.

Security Affairs is one of the finalists for the best European Cybersecurity Blogger Awards 2022 – VOTE FOR YOUR WINNERS. I ask you to vote for me again (even if you have already done it), because this vote is for the final.

Please vote for Security Affairs and Pierluigi Paganini in every category that includes them (e.g. sections “The Underdogs – Best Personal (non-commercial) Security Blog” and “The Tech Whizz – Best Technical Blog”)

To nominate, please visit: 

https://docs.google.com/forms/d/e/1FAIpQLSdNDzjvToMSq36YkIHQWwhma90SR0E9rLndflZ3Cu_gVI2Axw/viewform

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, nation-state malware)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Eurail data breach impacted 308,777 people

Hackers breached Eurail in Dec 2025, stole names and passport data, and exposed over 300,000…

4 hours ago

Malicious PDF reveals active Adobe Reader zero-day in the wild

Hackers used an Adobe Reader zero-day for months. Researcher Haifei Li found a malicious PDF…

5 hours ago

Masjesu botnet targets IoT devices while evading high-profile networks

Masjesu is a stealthy DDoS-for-hire botnet targeting IoT devices, active since 2023 and designed to…

10 hours ago

The alleged breach of China’s National Supercomputing Center can have serious geopolitical consequences<gwmw style="display:none;"></gwmw>

A hacker allegedly stole 10+ PB of sensitive military and aerospace data from China’s National…

15 hours ago

Internet-Exposed ICS Devices Raise Alarm for Critical Sectors<gwmw style="display:none;"></gwmw>

Exposed ICS devices and insecure protocols like Modbus increase risks to critical infrastructure, enabling disruption,…

17 hours ago

U.S. CISA adds a flaw in Ivanti EPMM to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in Ivanti EPMM to…

1 day ago

This website uses cookies.