{"id":42451,"date":"2020-07-16T15:56:15","date_gmt":"2020-07-16T11:56:15","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=42451"},"modified":"2021-01-19T14:14:38","modified_gmt":"2021-01-19T10:14:38","slug":"the-evolution-of-cyberwarfare","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/the-evolution-of-cyberwarfare\/","title":{"rendered":"Sam Bocetta: The Evolution of Cyberwarfare"},"content":{"rendered":"<p>Back in late April, with the world\u2019s media distracted by the COVID-19 pandemic and businesses desperately trying to <a href=\"https:\/\/www.msp360.com\/resources\/blog\/4-ways-to-improve-your-remote-desktop-security\/\">improve their remote desktop security<\/a>, a number of <a href=\"https:\/\/www.nytimes.com\/2020\/05\/19\/world\/middleeast\/israel-iran-cyberattacks.html\">cyberattacks in the Middle East<\/a> showed us what the future of cyberwarfare might be.<!--more--><\/p>\n<p>Up until now, states have consistently denied responsibility for such cyberattacks, no matter how transparent it was that they were the culprits. In addition, there appears to be a new willingness for states to use their cyberweapons to go after private businesses, rather than military targets.<\/p>\n<p>In this article, we\u2019ll look at what these new attacks mean for cybersecurity, and why they were so surprising to those of us who have spent <a href=\"https:\/\/www.msp360.com\/resources\/blog\/sam-bocetta-what-ive-learned-from-a-lifetime-in-cybersecurity\/\">a lifetime in the business<\/a>. We'll then share some tips on what you need to do to protect yourself against this new breed of attack -- not just in <a href=\"https:\/\/www.msp360.com\/resources\/blog\/social-engineering-prevention\/\">preventing social engineering<\/a>, but also in order to secure your <a href=\"https:\/\/www.msp360.com\/resources\/blog\/mixed-it-environment-security\/\">multi-OS environments<\/a> against intrusion.<\/p>\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-48232 size-thumbnail alignleft\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/06\/unnamed-150x150.png\" alt=\"Sam Bocetta for MSP360\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/06\/unnamed-150x150.png 150w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/06\/unnamed-300x300.png 300w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/06\/unnamed-250x250.png 250w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/06\/unnamed.png 400w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/strong><strong>About the author<\/strong><\/p>\n<p>Sam Bocetta is a <a href=\"http:\/\/assignyourwriter.co.uk\/\">cybersecurity coordinator<\/a> and a freelance journalist specializing in U.S. diplomacy and national security, with emphasis on technology trends in cyberwarfare, cyberdefense, and cryptography. (<a href=\"https:\/\/www.msp360.com\/resources\/wp-admin\/sbocetta@assignyourwriter.co.uk\">Email<\/a>, <a href=\"https:\/\/twitter.com\/sambocetta\">Twitter<\/a>)<\/p>\n<p><a href=\"https:\/\/www.msp360.com\/resources\/blog\/author\/sam-bocetta\/\">More articles by Sam<\/a><\/p>\n<h2>The Good Old Days<\/h2>\n<p>In order to understand why the recent attacks are so surprising, it\u2019s worth considering how cyberwarfare worked in \u201cthe good old days\u201d. Twenty years ago (or even a decade ago), there was a widespread view that the value of state-sponsored cyberattacks was their deniability. Even where it was obvious to everyone that an attack had been sponsored by a state, and directed against another, such states remained staunchly opposed to accepting responsibility for them. This approach was seen, for instance, in the attacks that Russia launched against the Ukrainian power grid <a href=\"https:\/\/www.wired.com\/story\/russia-ukraine-cyberattack-power-grid-blackout-destruction\/\" target=\"_blank\" rel=\"noopener noreferrer\">back in 2016<\/a>.<\/p>\n<p>This approach was informed by two interrelated factors. The first was that no one was sure whether the concept of \u201ccyber-deterrence\u201d was a safe one. While cyberattacks can be used to show the power and expertise of a state, and potentially dissuade other states from launching preemptive attacks, it was also feared that such \u201cdemonstrative\u201d displays of power would quickly lead to other forms of retaliation, <a href=\"https:\/\/global.oup.com\/academic\/product\/cross-domain-deterrence-9780190908645?cc=il&amp;lang=en&amp;\" target=\"_blank\" rel=\"noopener noreferrer\">including orthodox military force<\/a>.<\/p>\n<p>The second consideration, linked to the first, was that there remain <a href=\"https:\/\/ccdcoe.org\/uploads\/2018\/10\/Art-09-Is-the-International-Law-of-Cyber-Security-in-Crisis.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">no international rules<\/a> governing the legality of state-sponsored cyberattacks. This means that the cyber-theater is dangerously open to rogue states launching cyberattacks with no regard for the consequences. The fear of escalation meant that there was an unspoken agreement between states that attacks would be denied.<\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\" style=\"width: 50%; text-align: center;\">\n<p><img decoding=\"async\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/05\/IT-Security-Assessment-1.png\" alt=\"Whitepaper icon\" \/><\/p>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-6cae84c3-fb62-47b1-a1f2-6744125b00e5\" data-portal=\"5442029\" data-id=\"6cae84c3-fb62-47b1-a1f2-6744125b00e5\"><span class=\"hs-cta-node hs-cta-6cae84c3-fb62-47b1-a1f2-6744125b00e5\" id=\"hs-cta-6cae84c3-fb62-47b1-a1f2-6744125b00e5\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/6cae84c3-fb62-47b1-a1f2-6744125b00e5\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-6cae84c3-fb62-47b1-a1f2-6744125b00e5\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/6cae84c3-fb62-47b1-a1f2-6744125b00e5.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<div class=\"call-to-action__right\" style=\"width: 50%;\">\n<div class=\"call-to-action__title\">IT Security Assessment Checklist<\/div>\n<div class=\"call-to-action__text\">\n<p>Assess vulnerabilities and threats, network security, workspace and equipment security, documentation, and more. The pack includes:<\/p>\n<ul>\n<li>a ready-to-print PDF file<\/li>\n<li>an Excel file to help create a customizable assessment resource<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<h2>The Changing Face of Cyberwarfare<\/h2>\n<p>All of this appears to be changing. <a href=\"https:\/\/foreignpolicy.com\/2020\/06\/05\/israel-and-iran-just-showed-us-the-future-of-cyberwar-with-their-unusual-attacks\/\" target=\"_blank\" rel=\"noopener noreferrer\">The attacks launched in April by Iran and Israel<\/a> were surprising for a number of reasons, all of which indicate that the future of cyberwarfare will be different from the past.<\/p>\n<p>First is that responsibility for the attacks was (implicitly) claimed by the states involved. It seems, in other words, that we are now in a world where states no longer feel the need to hide their capabilities and intent when it comes to cyberwar.<\/p>\n<p>Second, there is the fact that both attacks were directed at commercial targets. For many years, there has been an unspoken agreement that the targets of state-sponsored attacks should be limited to governmental or military installations. It appears that this is no longer the case; apparently, commercial targets are now \u201cfair game\u201d.<\/p>\n<p id=\"last\">In some ways, this shift should not be surprising. When it comes to cyberwarfare, the line between \u201ccombatant\u201d and \u201cnoncombatant\u201d has been increasingly blurry for some time now. The most obvious example of this is the new techniques that have accompanied the rise of <a href=\"https:\/\/www.asiasentinel.com\/p\/defeating-the-hackers-in-asia\" target=\"_blank\" rel=\"noopener noreferrer\">hacking in Asia<\/a>. Instead of going for military targets, China appears to be taking advantage of the desire of citizens to <a href=\"https:\/\/surfshark.com\/use-cases\" target=\"_blank\" rel=\"noopener noreferrer\">use a VPN to hide their identity<\/a> and to turn this against them by <a href=\"https:\/\/fortune.com\/2020\/05\/26\/hong-kong-china-vpn-internet\/\" target=\"_blank\" rel=\"noopener noreferrer\">forcing VPN companies to share personal details<\/a>. For this reason, say some analysts,<a href=\"https:\/\/streetfightmag.com\/2020\/02\/06\/how-vpns-may-undermine-rather-than-protect-your-data-privacy\/#.Xj189DFKjIW\" target=\"_blank\" rel=\"noopener noreferrer\"> VPNs may undermine privacy<\/a> instead of protecting it.<\/p>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-e6824cd7-ceb3-465a-9f93-4509b71ce559\" data-portal=\"5442029\" data-id=\"e6824cd7-ceb3-465a-9f93-4509b71ce559\"><span class=\"hs-cta-node hs-cta-e6824cd7-ceb3-465a-9f93-4509b71ce559\" id=\"hs-cta-e6824cd7-ceb3-465a-9f93-4509b71ce559\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/e6824cd7-ceb3-465a-9f93-4509b71ce559\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-e6824cd7-ceb3-465a-9f93-4509b71ce559\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/e6824cd7-ceb3-465a-9f93-4509b71ce559.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<h2>What It Means for You<\/h2>\n<p>It might seem that the world of international cyberwarfare is quite distant from your own, but that is no longer the case. In its 2020 <a href=\"https:\/\/www.weforum.org\/reports\/the-global-risks-report-2020\" target=\"_blank\" rel=\"noopener noreferrer\">Global Risks Report<\/a>, for instance, the World Economic Forum ranked cyberattacks among the top 10 risks in terms of likelihood and impact for small businesses.<\/p>\n<p>In addition to the increased likelihood of attacks, cyberattacks will also come through new channels. Tom Steinkopf, writing in Forbes, has pointed out that <a href=\"https:\/\/healthitsecurity.com\/news\/ransomware-attacks-on-business-targets-increase-by-195-in-q1\" target=\"_blank\" rel=\"noopener noreferrer\">ransomware has risen sharply in the past year<\/a>, as governments use for-hire hackers to steal IP. The continued rise of the IoT also offers an opportunity for hackers, because the 20 billion devices that are now connected to the Internet now present a larger attack surface than human users.<\/p>\n<p>For most companies, protecting systems against cyberwarfare will mean returning to the principles, techniques, and tools that have long been the keystones of cybersecurity. Given that <a href=\"https:\/\/www.csoonline.com\/article\/3153707\/top-cybersecurity-facts-figures-and-statistics.html\" target=\"_blank\" rel=\"noopener noreferrer\">94% of malware is still delivered by email<\/a>, though, one factor should take precedence: staff training. Employees, particularly in companies dealing with high-value IP, should be taught to <a href=\"https:\/\/privacyaustralia.net\/hide-your-ip-address\/\" target=\"_blank\" rel=\"noopener noreferrer\">hide their IP address<\/a> whenever they are online and to <a href=\"https:\/\/www.csa.gov.sg\/gosafeonline\/go-safe-for-me\/homeinternetusers\/spot-signs-of-phishing\" target=\"_blank\" rel=\"noopener noreferrer\">spot the signs of a phishing attack<\/a> as soon as they appear.<\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\">\n<div class=\"call-to-action__tag\">FREE ASSETS<\/div>\n<div class=\"call-to-action__title\">MSP\u2019s Assets to Stay Safe from Phishing<\/div>\n<div class=\"call-to-action__text\">Check out our assets that will help you to minimize the risk of a phishing attack, reduce the possible damage, and increase security awareness.<\/div>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-a13a0279-a667-42d1-8ecd-608964d3c162\" data-portal=\"5442029\" data-id=\"a13a0279-a667-42d1-8ecd-608964d3c162\"><span class=\"hs-cta-node hs-cta-a13a0279-a667-42d1-8ecd-608964d3c162\" id=\"hs-cta-a13a0279-a667-42d1-8ecd-608964d3c162\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/a13a0279-a667-42d1-8ecd-608964d3c162\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-a13a0279-a667-42d1-8ecd-608964d3c162\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/a13a0279-a667-42d1-8ecd-608964d3c162.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<div class=\"call-to-action__right\"><img decoding=\"async\" style=\"max-width: 300px;\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/06\/Phishing_CTA-1.png\" alt=\"WP icon\" \/><\/div>\n<\/div>\n<h2>The Future<\/h2>\n<p>It might seem strange, in an article on international cyberwarfare, to end with a warning about <a href=\"https:\/\/www.msp360.com\/resources\/blog\/anti-phishing\/\">phishing<\/a>. But it is also worthwhile recognizing that not everything about the threat landscape has changed in the past few months. Governments seem more comfortable with admitting responsibility for attacks, and they seem more willing to target commercial businesses, but these attacks are still being deployed through the same methods they were back in \u201cthe good old days\u201d: tricking employees into giving access to malicious actors.<\/p>\n<p>For that reason, my advice for the coming year is not that different from the advice I\u2019ve been dispensing for decades: <a href=\"https:\/\/www.msp360.com\/resources\/blog\/anti-phishing-training-importance-explained\/\">educating your users<\/a> is still the best defense you have against cyberattacks, whether these are state-sponsored or not.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Back in late April, with the world\u2019s media distracted by the COVID-19 pandemic and businesses desperately trying to improve their remote desktop security, a number of cyberattacks in the Middle East showed us what the future of cyberwarfare might be.<\/p>\n","protected":false},"author":66,"featured_media":42462,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,885],"tags":[],"class_list":["post-42451","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-articles","category-other"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/42451","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/66"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=42451"}],"version-history":[{"count":0,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/42451\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/42462"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=42451"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=42451"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=42451"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}