• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cybersecurity • Government  /  State-sponsored cyber attacks: New-age warfare
27 February 2018

State-sponsored cyber attacks: New-age warfare

Written by Seqrite
Seqrite
Cybersecurity, Government
  • 16
    Shares
Estimated reading time: 3 minutes

The latest form that war between two countries has taken is cyber attacks. Simply put, a cyber attack is a deliberate exploitation of computer systems, technology-dependent enterprises and networks. While, no clear definition of cyber attack has yet been adopted internationally, it mostly refers to actions by a nation-state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption. The impact of these kinds of attacks is only growing – according to former CIA director Leon Panetta, the next form of war the US could face was a “Cyber-Pearl Harbor“.

The origins

There is no single incident which triggered cyber warfare internationally. North Atlantic Treaty Organization (NATO) considers the Morris worm to be one of the first recognized worms to affect the world’s nascent cyber infrastructure in 1988. However, ‘Stuxnet’ is widely considered to be the world’s successful first digital weapon. In September, 2010, Iran’s nuclear enrichment facility at Natanz fell prey to what is believed to have been a joint attack by Israel and the United States, dubbed “Operation Olympic Games“. The mission involved the depositing of a computer virus known as Stuxnet into the site via an infected USB stick. The malicious code reportedly crippled software and hardware for many of the sites’ centrifuges disrupting Tehran’s nuclear bomb program.

Even before this, in 2007, Russia had launched a massive DDoS attack on Estonia that had shut down service to major websites and disrupted communication across the country. Many other such incidents have taken place since then and there is no indication that they will cease to occur in the near future.

Read more: What makes the Government vulnerable to hackers?

Different types of cyber attacks

Cyber attacks can be of different types. According to the context in which it takes place, it can be labelled as cyber campaign, cyber warfare or cyber terrorism. Cyber campaign alone is generally used by a state to influence the perception of the citizens of another country regarding to the policies or actions of the former. This is not usually considered to be harmful or dangerous as it is little more than mere propaganda.

Cyber warfare, however, utilizes techniques of defending and attacking information and computer networks that inhabit cyberspace, often through a prolonged cyber campaign or a series of related campaigns. It denies an opponent’s ability to do the same, while employing technological instruments of war to attack an opponent’s critical computer systems.

Cyber-terrorism, on the other hand, is “the use of computer network tools to shut down critical national infrastructures (such as energy, transportation, government operations) or to coerce or intimidate a government or civilian population”. That means the end result of both cyber-warfare and cyber-terrorism is the same; to damage critical infrastructures and computer systems linked together within the confines of cyberspace.

Read more: Impact of malware/ransomware attacks on Government data

Recent attacks

The three major powers which have used cyber-attacks on other countries are USA, Russia and China. Accusations that Russia had influenced the US Presidential elections of 2016 have created a storm worldwide and have plagued the presidential office from the outset. But China too does not lag far behind. One of the most well-known cases of Chinese cyber espionage was “Titan Rain“, which began in 2003. It refers to the wave of attacks on United States defence networks that targeted confidential national security information.

The US has also been involved in many similar attacks. In 2013 Edward Snowden’s revelations that the US government had hacked into Chinese mobile phone companies and on Tsinghua University created a global stir. In fact, numerous countries have complained about US hacking and interfering in their internal affairs.

Possible counter measures

There are very few counter-measures available in case of cyber-attacks. Deterrence (when a nation convinces its enemy that it is willing and able to respond to cyber intrusions using military force) is possibly the only sensible method which a nation state might adopt.

Perhaps the most effective solution that will be implemented in the future is international cooperation and treaties. Similar to the nuclear arms race, major world powers may eventually recognize that cyber-war is a race without an end and may choose to simply put a stop to it peacefully. However that possibility looks unlikely and it is clear that national governments must start seriously prioritizing cybersecurity in this age of information warfare.

As an IT security partner for your business, Seqrite provides comprehensive endpoint security from advanced cyber threats. To know more, visit our website or

seqrite_cta1

 Previous PostSecuring Your Endpoint in the Age of Ransomware Attacks
Next Post  Are we ready for Amazon’s automated grocery store?
Seqrite
About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • Seqrite UTM : Security Weapon Against Man In The Middle Attacks

    December 3, 2019
  • Wondering-how-to-build-your-cybersecurity-framework

    The burning issue of building a cybersecurity framework

    December 3, 2019
  • Building-a-cybersecurity-roadmap

    Crucial aspects CISOs should look at while building a businesses’ cybersecurity roadmap

    November 27, 2019

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • BlueKeep Attacks seen in the wild! BlueKeep Attacks seen in the wild! November 8, 2019
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Will Automation be the next big weapon against cyber threats?

    Will Automation be the next big weapon against cyber threats?

    December 5, 2019
  • Leveraging security analytics to bolster enterprise cybersecurity

    Leveraging security analytics to bolster enterprise cybersecurity

    December 4, 2019
  • Seqrite UTM : Security Weapon Against Man In The Middle Attacks

    Seqrite UTM : Security Weapon Against Man In The Middle Attacks

    December 3, 2019
Tweets by @Seqrite

Stay Updated!

Follow Us On

Topics

Antivirus For Linux (10) Antivirus For Server (9) BYOD (9) CISO (8) Cyber-attack (30) cyber-attacks (55) cyberattacks (11) cyber security (25) Cybersecurity (207) Cyber threat (29) cyber threats (44) data breach (49) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (14) endpoint security (99) Enterprise security (14) Exploit (12) firewall (10) GDPR (9) hackers (9) incident response plan (9) IoT (8) malware (49) malware attack (20) malware attacks (12) MDM (25) mobile device management (9) Network security (17) Patch Management (12) phishing (16) Ransomware (47) ransomware attack (29) ransomware attacks (29) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (33) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2019 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.