Ed. note: This is the first in a three-part series on CyberWars that will explore what is happening, why businesses should be concerned, and what they should do.
In the last five years the first shots in a new kind of conflict, dubbed CyberWars by the press but more accurately “advanced persistent threats” by data security experts, have been fired. The revelations of Operation Aurora, the 2009 penetration of Google, Jumiper Networks, Rackspace and probably several other technologically sophisticated companies; Night Dragon, the penetration of the major oil and gas companies; Shady Rat; the RSA penetration; and, of course, Stuxnet, revealed a new kind of cyber threat. And these are only the cases that have been reported publicly. In a highly secret environment, where both the perpetrators and victims have strong reasons to keep their activities secret, the question is: What don’t we know?
All this may sound inflammatory, but the fact is that businesses worldwide are caught in the crossfire. Dmitri Alperovitch, who lead the team at McAfee that identified and investigated several of these incursions and who last year co-founded a new security company, CrowdStrike, to develop software and services to counter them, warns that “all the companies that I investigated had antivirus, they all had firewalls, they all had prevention systems and a variety of other security technologies, and they all got hacked. The existing models of building better walls and try to keep the adversary from getting in are not going to work” against these highly sophisticated, targeted attacks. “They’ll use insiders, they’ll bribe people, they’ll find weaknesses in these programs, & they’ll leverage them successfully & repeatedly. That’s exactly what’s been happening over the last decade or so.”
This threat has several important characteristics that make it very different from what companies have been used to, say the experts. These include:
The data system virtualization trend is rendering companies more vulnerable, warns Eric Chiu, co-founder and president of HyTrust, a security startup focused on securing the virtualization layer. Basically in a virtualized environment anyone who gains access to the virtualization management system can control everything in the environment, from accessing any data to shutting down virtual machines completely.
“People are using advanced persistent threats and social engineering to gain access to these privileged accounts and the credentials of IT admins,” Chiu warns. “In the case of the RSA they targeted the seed records for secure ID. They could just as easily target your credit card information or, in a healthcare provider, your patient health information.”
“Valuable intellectual property is being literally vacuumed off from Western companies, Western governments by the truck load in an unprecedented fashion, says Alperovitch. “What we are witnessing is the greatest transfer of wealth in history in the form of this intellectual property theft that is going on, with China being the major beneficiary.”
Support our mission to keep content open and free by engaging with theCUBE community. Join theCUBE’s Alumni Trust Network, where technology leaders connect, share intelligence and create opportunities.
Founded by tech visionaries John Furrier and Dave Vellante, SiliconANGLE Media has built a dynamic ecosystem of industry-leading digital media brands that reach 15+ million elite tech professionals. Our new proprietary theCUBE AI Video Cloud is breaking ground in audience interaction, leveraging theCUBEai.com neural network to help technology companies make data-driven decisions and stay at the forefront of industry conversations.