According to Jing Xie, senior threat intelligence analyst for Venafi, this explosive development in data exfiltration will continue: “In 2017, attackers working for nation-states focused on efficiency and return on investment, and they were very successful. As a result, we should expect to see escalations and variations of similar attack vectors this year.”
We asked Jing to examine the current arena of nation-state sponsored cyber warfare and she offered these predictions on how attacks will evolve in 2018:
Elections will face escalating attacks and threats. We saw numerous state-sponsored social media campaigns that concentrated on fostering public doubt - and fear - during the 2016 U.S. presidential elections. Due to the success of these campaigns, we should expect additional attacks against local and national elections. Some attacks can even utilize fraudulent identities of both humans and machines to steal and leak sensitive nation-state data. Distressingly, these attacks are occurring in elections aroundtheglobe.
Nation-state attackers will maintain their focus on keys and certificates. The ongoing wrestling match between super powers will move from clandestine programs that are largely carried out behind the scenes to more public attacks aimed at critical infrastructure and services. Because vital security assets control encrypted communication between machines, many cyber attacks will leverage compromised or rogue keys and certificates. A nation-state with this power can bombard critical infrastructure through increasingly sophisticated variations of attacks. This type of sabotage of core services was successfully demonstrated using malware such as Stuxnet and Duqu.
Certificate Authorities may be used as cyber weaponry. Cyber criminals sponsored by nation-states may find ways to exploit the trust models used to control communication between machines. The easiest way to accomplish this would be to attack or manipulate Certificate Authorities and the keys and certificates they issue. If successful, this exploit vector would allow cyber criminals to eavesdrop on a wide range of confidential communications, intercept and redirect encrypted traffic, and target government watchdogs and human rights activists.
“With every major nation-state expanding both offensive and defensive cyber war spending, public and private critical infrastructure and communication providers should expect to be caught in the crosshairs of cyber warfare. As a result of the cumulative impact of powerful spending and attack trends, we should expect to see at least one act of nation-state sponsored cyber warfare that directly impacts citizens this year,” concluded Jing.