Page 57 - Cyber Defense eMagazine June 2024
P. 57

This support may take the form of financial backing, be it funding for attackers or the development of
            tools. Alternatively, it may be training and resources, or simply offering a combination of sanctuary and
            cover by ignoring the cyberoperations originating within those borders.

            The attacks are linked to the political or economic goals of the ‘sponsoring state.’ The most common
            objective is the theft of intellectual property from businesses in a different country, or simply to influence
            public opinion.

            However, in more extreme cases, state-sponsored attacks can aim to disrupt critical infrastructure like
            power grids or communication systems, or even gain military advantage by stealing information – as
            cyberattacks become cyberwarfare.



            State-sponsored techniques

            With such a strong set of resources, state-sponsored groups often have access to a sophisticated arsenal
            of  techniques  and  tactics.    However,  when  compared  to  isolated,  lone  wolf  actors,  or  indeed,  small
            organised criminal gangs, one aspect that characterises state-sponsored groups, is the alignment of
            these tools to a particular objective.

            For example, if espionage or the theft of sensitive data is a primary objective, state-sponsored groups
            have been seen to use:

               •  Spear phishing: Crafting emails that appear legitimate, tricking targets into revealing information
                   or clicking malicious links.
               •  Watering hole attacks: Compromising websites frequented by the target, infecting their computers
                   with malware when they visit.
               •  Zero-day exploits: Utilizing previously unknown vulnerabilities in software, often acquired through
                   targeted attacks on software developers.
               •  However, elsewhere, when trying to cripple critical infrastructure, these groups have employed:
               •  Denial-of-service (DoS) attacks: Flooding a system with traffic, making it inaccessible to legitimate
                   users.
               •  Malware: Destructive software that can delete data, encrypt files for ransom, or disrupt operations.
               •  Supply chain attacks: Targeting software providers to inject malicious code into their products,
                   impacting users unknowingly.
               •  Lastly, there has also been an array of techniques used to influence and manipulate public opinion
                   (typically around political discourse) such as:
               •  Social engineering: Using social media platforms to spread disinformation, propaganda, or incite
                   unrest.
               •  Hacking and leaking: Stealing and releasing sensitive information to discredit opponents or sway
                   public opinion.
               •  Botnets: Networks of compromised devices used to amplify fake news and manipulate online
                   conversations.
               •  As a mark of the sophistication of the thinking behind these techniques, they are even deployed
                   in different contexts.




            Cyber Defense eMagazine – June 2024 Edition                                                                                                                                                                                                          57
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   52   53   54   55   56   57   58   59   60   61   62