Leap Year, Constant Threats: Protecting Critical Infrastructure from Nation-State Threat Actors

Leap Year, Constant Threats: Protecting Critical Infrastructure from Nation-State Threat Actors

Every four years, most humans acknowledge a shortcoming of our Gregorian calendar by adding a Leap Day. This cyclical tradition has been in place since 46 B.C. and was refined in 1582, per an Encyclopaedia Britannica, Inc. article on the matter , getting us to where we are today. As the precise rotation of the Earth was uncovered over the centuries, changes were made to various calendars to account for the extra fraction of a day in the solar year.

Ancient Egyptian Calendar

Just as it took trial, error, and innovation within human civilization to adopt a widely used and agreed upon calendar, a similar cycle of observing and reacting and technological progress seems to be unfolding regarding global cybersecurity threats and defenses. Recent news reports indicate a significant and rapidly intensifying threat to the U.S. economy and general infrastructure, as well as other countries, by way of nation-state threat actors, particularly those backed by the Chinese government. These reports echo those of a few years ago (2018), and of many years ago (2013), and many years before that (2008), when similar threats were revealed.

Between 2008, technology has improved significantly to repel and outmaneuver the threats of the time, which have also been intensified by this same tech. Finding ourselves at this similar inflection point once again, it is worth asking, 'what has changed?' and ‘how should we respond?’

Current Federal Bureau of Investigation (FBI) Director, Christopher Wray, put the threat this way : “China’s hackers are positioning on American infrastructure in preparation to wreak havoc and cause real-world harm to American citizens and communities…” If significant attacks against resources involved in energy production, communications, water treatment, or banking, for instance, are realized, it could—in the worst case—create an existential threat by inducing panic and devastating the day to day lives of millions of people. Given that most of our infrastructure is now accessed, maintained, and operated in interconnected cloud networks, the potential damage cannot be easily overstated.

Just over one week ago , anonymous leakers produced via GitHub numerous documents detailing the Chinese government’s current cyber espionage programs. Claims made in these documents include the development and deployment of spyware developed by a Taiwanese threat intelligence organization, I-Soon, for offensive purposes. In other words, various software and tools are designed with the intent of conducting unprovoked attacks against American critical infrastructure and organizations, as well as against other countries.

And if these threats, which seem to focus on potential future events, were not enough, additional indications point to nation-state threat actors actively lodging within U.S. infrastructure for at least five years already. A joint report from Cybersecurity and Infrastructure Security Agency , National Security Agency , and numerous additional American and foreign governmental agencies, “have recently observed indications of Volt Typhoon [a Chinese state sponsored threat group] actors maintaining access and footholds within some victim IT environments for at least five years” (emphasis present in the source document).

The goals of such actions include espionage, intelligence gathering, destabilization, and political disruption. While the objectives of groups like Volt Typhoon are certainly sophisticated and malicious, the tactics, techniques, and procedures used to conduct these operations are run-of-the-mill when it comes to adversarial threat operations. According to the joint release, “Volt Typhoon typically gains initial access to the IT network by exploiting known or zero-day vulnerabilities in public-facing network appliances” and from there can move laterally to gather intel and “wreak havoc”.

While this is by no means good news, the program businesses can implement to better protect their sensitive data and critical infrastructure is fairly standard and readily available.

A common reaction to this particular type of threat is to look to government entities to enact sanctions or implement an all-encompassing national program to largely prevent the attacks forecasted by these impending threats. Relying on another entity to protect your organization and its critical data, however, should not be the favored approach.

The best way to defend against state-sponsored attacks—which is the same for any threat group, with the only real difference here being the financial resources of nation-state actors—is with preparation and network visibility. These components of a robust security program, which were covered in a previous newsletter , require an organizational foundation of employee education and training, the development of proactive assessment cadence, enhanced visibility, preferably via a 24/7 Security Operations Center (SOC) and a well-practiced Incident Response (IR) plan.

The cyber threats facing individuals, businesses, critical infrastructure operations, and governments are neither new nor isolated. Fortunately, a blueprint exists for how to manage the gravity of the stated warnings. Protecting against even the most advanced cyber challenges present on today’s landscape does not require some societal altering advancement like we saw with the Julian and Gregorian calendars; focusing on basic cyber hygiene is what we need at every level.

?If your organization needs assistance in establishing a mature cybersecurity program, contact our team today.

The information in this newsletter publication was compiled from sources believed to be reliable for informational purposes only. This is intended as a general description of certain types of managed security services, including incident response, continuous security monitoring, and advisory services available to qualified customers through SpearTip, LLC, as part of Zurich Resilience Solutions, which is part of the Commercial Insurance Business of Zurich Insurance Group.? SpearTip, LLC does not guarantee any particular outcome. The opinions expressed herein are those of SpearTip, LLC as of the date of the release and are subject to change without notice. This document has been produced solely for informational purposes. No representation or warranty, express or implied, is made by Zurich Insurance Company Ltd or any of its affiliated companies (collectively, Zurich Insurance Group) as to their accuracy or completeness. This document is not intended to be legal, underwriting, financial, investment or any other type of professional advice. Zurich Insurance Group disclaims any and all liability whatsoever resulting from the use of or reliance upon this document. Nothing express or implied in this document is intended to create legal relations between the reader and any member of Zurich Insurance Group. Certain statements in this document are forward-looking statements, including, but not limited to, statements that are predictions of or indicate future events, trends, plans, developments or objectives. Undue reliance should not be placed on such statements because, by their nature, they are subject to known and unknown risks and uncertainties and can be affected by numerous unforeseeable factors. The subject matter of this document is also not tied to any specific service offering or an insurance product nor will it ensure coverage under any insurance policy. No member of Zurich Insurance Group accepts any liability for any loss arising from the use or distribution of this document. This document does not constitute an offer or an invitation for the sale or purchase of securities in any jurisdiction.

In the United States, Zurich Resilience Solutions managed security services are provided by SpearTip, LLC.

Copyright ? 2024 SpearTip, LLC





Troy Acord

Pit Floor Supervisor Beau Rivage Casino and Resort

8 个月

An interesting read!!

回复
Dan Ackerman

Cyber Resilience Architect

8 个月

Great reminder that good cyber hygiene is critical for every organization. Focus first on the “blockling & tackling”!!

回复

要查看或添加评论,请登录

社区洞察

其他会员也浏览了