State-sponsored attack or not, that’s the question

The defense of cyberspace is becoming one the most concerning question to approach, governments all around the world are massively investing in cyber technology with the resultants that the number of cyber operations is increasing exponentially.

William J. Lynn, U.S. Deputy Secretary of Defense, states that:

“as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.“

The message launched by official demonstrates the high interest of government in the development of cyber warfare capabilities oriented to cyber espionage and cyber offensive.

Despite the potential effects of the use of cyber weapons and the damage caused by offensive operations represent major concerns for intelligence agencies, very frequently are discovered clues of cyber attacks that have the main purpose to steal sensible information and intellectual property from the victims.

Who is behind these cyber attacks?

Analyzing the statistics it is possible to note that the majority of attacks are related to hacktivism and cybercrime activities, the data demonstrate a growing trend for cyber warfare attacks but it is expected that they represent only the tip of the iceberg.


To identify a cyber attacks is becoming every day more and more difficult, in my previous post I presented a study released  by the security firm FireEye, named “Advanced Threat Report” related first half of 2012, that provides an overview of the current threat landscape, evolving advanced malware and advanced persistent threat (APT) tactics, and the level of infiltration seen in organizations’ networks today.

The document presents and alarming scenario, the organizations are assisting to an impressive increase in advanced malware that is bypassing their traditional security defenses.

It’s quite common to assist that a malicious agent is able to elude common defense mechanisms remaining stealth for long period in which it operates under coverage.

The problem is mainly related to cyber espionage activities and its impact in any sectors, from defense to communication, causing serious damages.

We are not able today to exclude that a cyber weapon is operating undetected and it is known that at least 140 countries are working on the development of new agents that will crowd cyber space soon.

The organization are facing with a dramatic explosion of the diffusion of advanced malware in terms of volume and also in effectiveness in bypassing traditional signature-based security mechanisms. Most of these attacks are considered as state-sponsored due the nature of the targets systems and the abilities of the malicious agents to exploit 0-days vulnerabilities.

Most state-sponsored malware are designed for activities such as data-gathering, cyber espionage or sabotage, we have a large casuistry on features identifies in the malicious agents, but the same scope are persecuted by cybercriminals and hacktivists.

Distinguish the origin of attacks is not simple, in many cases the cybercriminals operate exactly in the same way state-sponsored hackers do, selecting specific sector as privileged target and operating with malware that mainly act in stealthy mode.

We must consider also the cybercrime is not always considerable a totally separated cyber threats, cyber criminals operate in the name of business and they steal sensible information to sell them to hostile countries.

According Myla Pilao, director of core technology marketing at Trend Micro’s TrendLabs, the attacker’s intent is fundamental to discriminate a cyber attacks from a state sponsored operation, and let me add also that the context of operation and the real identity of the attacker have the same importance.

What make more hard the identification of the origin of attacks is the consideration that in the cyber space there are no boundaries and an offensive could be started from a domain associated to any countries.

Indications on the presence of a state-sponsored attack are related to the target addressed and the region where the agent has counted the greater number of infected host, let’s think for example to Flame that hit mainly Middle Eastern countries with cyber espionage intents or Stuxnet that concentrated its efficacy against Iranian nuclear plants.

The limited geographic area could highlight the presence of an ongoing intelligence campaign interested in gathering sensible information and conducting espionage.

Phil Lin, director of product marketing at FireEye, noted:

Still, all of these characteristics can also be found in advanced malware used by cybercriminals for regular attacks, which makes the geographical attribution of cyberattacks “the most difficult task”, Lin observed.

“Cybercriminals from one country can easily set up ‘command and control (C&C)’ servers used to store exfiltrated data in a different country leading to incorrect attribution of the nationality of the threat actors, not to mention their ultimate nation-state ties,”

The level of complexity of the agent used could be a condition necessary but not sufficient to qualify the product of a state sponsored project.

My opinion is that despite a deep analysis on the victims of the attacks in many cases it’s hard to find evidences of a state involvement due the increased sophistication of the malware, powerful agents that are able to destroy their tracks.

In the future the number of operations has will increase and it is “extremely unlikely” that in absence of an international regulatory in cyber warfare a country will openly admit sponsoring operation.

The only escape way that I see is the definition of a regulatory because I am convinced that, in the absence of strict rules, technical capabilities of the states will evolve in an unpredictable manner and it will impossible to qualify the nature of malicious code and to discover the identity of its creators.

Pierluigi Paganini

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Sweden’s liquor supply severely impacted by ransomware attack on logistics company

A ransomware attack on a Swedish logistics company Skanlog severely impacted the country's liquor supply. …

36 mins ago

CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog

CISA adds Cisco ASA and FTD and CrushFTP VFS vulnerabilities to its Known Exploited Vulnerabilities…

11 hours ago

CISA adds Microsoft Windows Print Spooler flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA added the Windows Print Spooler flaw CVE-2022-38028 to its Known Exploited Vulnerabilities catalog.…

18 hours ago

DOJ arrested the founders of crypto mixer Samourai for facilitating $2 Billion in illegal transactions

The U.S. Department of Justice (DoJ) announced the arrest of two co-founders of a cryptocurrency mixer…

18 hours ago

Google fixed critical Chrome vulnerability CVE-2024-4058

Google addressed a critical Chrome vulnerability, tracked as CVE-2024-4058, that resides in the ANGLE graphics…

23 hours ago

Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks

Nation-state actor UAT4356 has been exploiting two zero-days in ASA and FTD firewalls since November…

1 day ago

This website uses cookies.