Cyber Threat
If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in
every battle. – sun tzu
in the last few decades, the world's most valuable resource has been oil and that had greatly improved the economy of
oil-producing countries through revenues, aiding job creation and strengthening international bonds but today the world is looking for alternatives to fossil fuel and adopting renewable sources of energy like wind and solar. Now the world's most valuable resource is data, be it raw or refined. Data holds priceless details and information about an individual, organization, competitor and national government. Hence the quote "data is the new oil". Just as challenges like oil spillage and gas flaring occurs in
the oil and gas sector, there are certain challenges facing the digital world as well. The most challenging being data protection and privacy.
Cybercrime is a global problem that is almost as old as the internet itself. It poses a threat to individual's personal data and identity and even more threat to large corporations, governments, and institutions worldwide as single cyber-attack could send an organization into oblivion.Now with technology changing so fast, cybercrime and cyber-attacks are becoming more sophisticated than ever before with malicious hackers forming crime rings and creating stronger security-proof tools and techniques. These
cybercriminals attack individuals for different reasons be it for personal gain, to sell trade secret to competitors, protest
against the government actions or inactions or just for the fun of it and that's where cybersecurity comes in but before
going into cybersecurity, we need to understand what cyberthreats are.
What is cyber threat
a cyber threat is a malicious action attempted or carried out against an individual, government or organization in order to steal, damage, manipulate data or utilize the resources of such body in carrying out more attacks. Sources of cyber threats like any kind of attack, there is always a motive; either to settle old scores or for personal gains. Some of the most common sources of cyber-attacks are:
disgruntled employee (insider threat):
cyber-attacks that originates from an insider are far more devastating and severe as the attacker always know a lot about the internal operations of the organization. An employee with opinions or perceptions different from that of the organization can go rogue, attack the organization from the inside and sell trade secrets to competitors. The story of christopher grupe is a good example to cite. Talking about the danger of a disgruntled employee, grupe was a systems administrator for the canadian pacific railway (CPR). In december 2015, he was suspended for subordination and when he returned to work, was informed he's been fired, effective immediately. Convincing the boss to let him resign instead, he used the time frame to access the company's networks, delete essential files and removed some admins' accounts and changed the password of others. After he was gone, the network began acting erratically, and system admins found out they have been locked out and unable to attempt repairs. They eventually got in by rebooting and grupe got a year in prison.
Terrorists/hacktivist:
sometimes, cyber-attacks originate from terrorist groups, rebels or hacktivist who hack government facilities and public infrastructures such as power grids, power plants and websites to protest against certain action by the government and as a result persuade the government to do their bidding. A case study similar to this is that of 18-year-old kane gamble. By simple social
engineering, gamble gained access to data of top us intelligent officials including then-chief of the CIA, john brennan; then-director of national intelligence, james clapper; and obama's deputy national security adviser, avril haines. Gamble was sentenced to two years in prison by a UK court. The judge said gamble engaged in "politically motivated cyber terrorism" and this is just one of many cases of cyber hacktivism.
Cyber Crime groups:
These are organized cyber groups who hack for the financial benefit alone. These are the ones who majorly attack banks and other financial institutions. This group is also responsible for conniving with internet fraudsters in scamming individuals, performing identity theft and swindling companies. Comment Crew is a Chinese hacking group, also known as the Shanghai Group. Many believe they’re responsible for a number of China’s alleged cyber-attacks since 2006. One of their biggest, although not so well-known, successful hacking attempt was on the company Coca-Cola. They sent a malicious email from what looked like Coca-Cola’s CEO to the company’s deputy president. Once opened, malware smoothly downloaded onto his computer. Thus, giving the hackers full access to everything he typed, through the installation of a keystroke logger. The hackers had access to sensitive files for a whole month before the FBI informed Coca-Cola of the breach.
Competitors:
Competition may get so bitter that a company may launch a cyber-attack against a rival company, not necessary to kick them out of business but to either steal product blueprints or organizational secrets so as to have the upper hand in the market. A lot more was going on when Dejan Karabasevic left his job at clean-energy company AMSC to work for a Chinese wind- turbine company Sinovel. While at AMSC, Karabasevic has had access to company’s proprietary technology for wind turbine efficiency. Karabasevic didn’t just got a job offer from Sinovel, he was recruited by the company which was one of AMSC’s largest customers. He was asked to bring the software with him and when he left, he had secretly downloaded the code to an offsite computer. After implementing the code, Sinovel retrofitted its wind turbines with it, thereby saving itself $800 million price tag which would have otherwise been charged by AMSC. The theft was later detected and the estimated loss was more than $1 billion in shareholder equity and almost 700 jobs.
National Governments:
The act of a government launching a cyber-attack against the facilities of another government is referred to as cyber warfare. This could be as a result of a government finding the policies or actions of another government threatening. A good example of such cyber-attack is the Iran's Nuclear Centrifuge sabotage by the Stuxnet malware.
Effects of Cyber Attacks
There are many effects that cyber-attacks have on individuals, organizations and government bodies. Some may be harmless while most are life threatening.
Psychological:
One of the effects of a cyber-attack is that it leaves the victim psychologically imbalanced and exasperated. For instance, an individual whose bank account was hacked and had his credit card used in the purchase of firearms on the dark web. Apart from the financial crises, he could also be arrested if the transactions are traced back to his account. Another scenario is an individual having his/her identity stolen either by being impersonated or as a result of one of his/her social media accounts being hacked. This clone could use the victim's identity for malicious purposes such as tricking the victim's friends into making fund transfers to his account or posting socially unacceptable messages.
Economic:
The economic effects of cyber-attacks are always devastating either for individual, financial institutions or government. In late 2013, a large retailer store, Target, sustained a massive cyber-attack that led to the loss of almost 70 million customers' credit card information and other data. The aftermath was costly. On the day it went public with news of the breach, Target lost US$ 890 million in market value. The firm subsequently spent $100 million on improvements to its IT system and other tech upgrades. This doesn't include that fact that companies that get attacked faces sanctions by the government and are also fined as a result of the attack. When government infrastructures are attacked then it's not always business as usual as the effects are seen on the stock market as well as in the economic situation of the nation.
Reputation:
Trust is hard to earn, but easy to lose. When a financial establishment gets attacked then there is a high probability of it loosing not just its customers but also its reputation and reliability, and for this reason, most cyberattacks and data breaches are not reported and are only known by the concerned party.