Sie sind auf Seite 1von 7

Research Work

Cyber Espionage

Members
Juan Francisco Rivadeneyra Shimose
jf.rivadeneyra@gmail.com
993175945

Anthony Cesar Ortiz Arteaga


Research Work
Cyber Espionage

Rivadeneyra Shimose, Juan Francisco


Ortiz Arteaga, Anthony Cesar

San Ignacio de Loyola University, Systems Engineering Faculty

Abstract information. That is, of exposing to a


Today Internet connects millions of networks, phenomenon known as cyber espionage.
including those that operate infrastructure and
essential services. So the economy and national
Two headlines the Financial Times show
security depend heavily on information technology the magnitude of the overall problem of
and communications infrastructure. Hence the cyber security: "A simple bulb can become
issue of cyber defense and cyber-attack have a form of cyber-attack" and "Can hack into
emerged strongly on the political agenda of the US elections? The answer to this
governments, being these that are being released to
the network to monitor any possible criminal action
second question, posed after that Russian
against their interests. It is for this reason that in hackers agreed databases of Democratic
this article has discussed one of those criminal voters, is that, for now, does not seem
activities: cyber espionage. possible, though the mere fact that arises is
quite disturbing to one of the most
powerful countries in the world.
Background of the trend/prediction
However, these arguments are not based
Currently, some 3,000 million people surf solely on speculation about the future, the
the Internet (40% of the world population). problem is this: the American company
In the coming years it is estimated that not Yahoo revealed some months ago that 500
only billions more people, but things we million accounts were hacked in 2014,
use daily -cars, washing machines, although it took nearly two years to
factories, airplanes, televisions, houses, recognize looting.
but also medical devices like pacemaker-
be connected and depend on the Some time ago, cyber-attacks could
information provided by them Network to traditionally separate into two distinct
operate. categories: those that occur within the
network and jumping barriers to the
Under that scenario, as technology physical world. However, because of the
advances our societies have increasingly development of the digital world this
devices connected to the Internet, which division has increasingly less sense. Just
means, on the one hand, we have a for instance, are theft or manipulation of
growing ability to operate, communicate data to which companies and users are
and work remotely, but also to provide increasingly taking precautions, whether
more opportunities to exploit our SMEs, banks or large computer companies
vulnerabilities, steal, hijack or destroy
like Apple. In this case, it did after a the protection in the network is not very
massive theft of photographs of different from security in the physical
celebrities, which stored in their phones, world: everything is a matter of taking the
known as celebgate, forcing change and right precautions. Hence the reason this
harden all security protocols. article is to explain one of the most serious
threats to computer security: cyber
As a form of response to these events, espionage.
there has been a culture of protection
where not only companies but the users
themselves, advise other measures such as
the use of more complex passwords, Description of the trend/prediction
require systems dual authentication, There are several definitions, so we will
encryption or technologies that allow collect some definitions.
voice recognition, fingerprint or iris
(biometrics), among others. According Arreola, A. (2015), the cyber-
espionage is defined as:
However, ways to steal data also become
increasingly sophisticated: you can enter "It is that act with secrets which
programs that snoop what we do without are obtained without the permission of the
our knowledge or hijack data from your one who owns the information. It can be
computer to ransom, as the baleful crypto considered as an objective of cyber
locker, which they have become an espionage all personal information,
epidemic. This case can be catastrophic for classified, proprietary or sensitive sense
a small business that has not made a and can be membership of individuals,
backup of your information and you can competitors, groups, competitors and
see how seconds disappears after opening governments. The reasons why it takes
a seemingly innocuous mail. practice this act can be personal, political,
economic or defense or military
All analysts agree that both businesses and advantage
individuals need to be aware of the
problem. If we consider that The Technopedia describe cyber
cybercriminals spend many hours looking espionage as:
for vulnerabilities in operating systems, "A form of cybercrime in which
applications, networks, one should not be hackers have targeted computer networks
exposed on the Internet. The use of robust to gain access to classified information or
and different passwords is encouraged, other benefit that can produce that is
worry about the information shared on advantageous to the hacker"
social networks and it can be used to
impersonate, ask for safety when Given exposed appointments, Cyber
connected devices are acquired, a good espionage describes the stealing of secrets
antivirus, worry about encryption systems stored in digital formats or on computers
are used, make regular backups are tips and IT networks.
they repeated over and over again.
Over the past couple of years, cyber
Companies and countries that are best exploitation has established a reputation of
prepared will be those that recover faster, something more than mere nuisance. The
spend less money and continue operating repercussions of these acts are often
as if nothing had happened. In this context, severe; ranging from a great economic loss
to leaks of sensitive military information. specific time or until triggered by a certain
As a result, there is a growing widespread event, and IP Spoofing, where an attacker
concern about the solution to this problem. manages to disguise itself in order to gain
access to private information or secure
Clandestinely means that the perpetrator networks.
attempts to hide his identity, while the
under false pretenses phrase signifies
that his intention is to present himself as a
person entitled to certain rights and Reasons why is consider a
authorization to access the targeted trend/prediction (statistics, reports.
information. etc.)

Simply put, these acts are: We have made some statistical research on
cyber espionage and also have compiled
Between state nations, but they all news related to espionage. We have
may include non-state actors given that cyber espionage really is a threat
Consisting of information to all security. We believe that this is
gathering through computer means considered a trend for all organizations,
Not intending to cause death/injury governments and people around the world
or destruction/damage aware of this threat and begin to take steps
Conducted secretly to increase security measures.
Likely executed over lengthy Now, the following will explain the graph
periods of time and statistical data of cyber espionage
There are three main types of espionage: 2014 and 2015.

Economic/Industrial Espionage In general, 2015 has reported a more


Military Espionage sustained activity, and this is easily and
Political Espionage immediately visible from the Number of
Monthly Attacks Chart. During 2015, the
Today nation-states employ many level of activity has always been higher,
different types of cyber espionage tools. particularly in May, with the solely
Many of these are no different than attacks exception of October.
one might see against ones own home
computer, just applied on a much larger
scale. First there are DDoS attacks, which
are mainly used to disrupt the victim
nation-states communication systems.
DDoS attacks are preferred because an
attacker can implement them with very
limited resources against a larger, more
powerful victim. Malware, such as viruses, It is also interesting to compare the
worms, and Trojan horses, are also popular Motivations behind the attacks in 2014 and
tools for disrupting normal computer 2015. During 2015, the percentage of
operations, secretly collecting data, or events motivated by Cyber Crime has
destroying it entirely. Other kinds of raised from 62.3% to 67%, while
attacks include Logic Bombs, which are hacktivism has lost three points (20.8% in
malware designed to lie dormant until a 2015 vs. 24.9 in 2014). Cyber Espionage
reported a small growth, whereas Cyber Several groups have appeared in
Warfare is essentially stable. SurfWatch Labs data concerning
espionage in 2016. Group 27 a cyber-
espionage group linked with the Seven
Pointed Dagger malware campaign that
utilizes a remote access Trojan known as
Trochilus and has ties to Asia is the top
trending espionage actor in 2016.

It is also interesting to analyze the Drill


Down chart of the motivation on a monthly
basis.

After analyzing the statistics, we noticed


that the rate of cyber espionage is growing
but slowly. The reason is because they
could cover the evidence without leaving
The list of cases involving cyber espionage traces. Who knows if right now, someone
shown in the following table. can hear our conversations or reviewing
the valuable information? That can
2014 2015 damage the reputation of the organization
COSMIC DUKE Yihadist or government entities, and make every
Anonymous effort to hide security flaws. Perhaps to
EPIC TURLA US CENTCOM avoid fears or negative reviews.
SM
THE MASK Russian in White And besides, it can damage relationships
House with other organizations. In conclusion,
C. YETI APT30 we can say the reasons why it considers the
ENERGIC BEAR trend:
Privacy Violation
Theft of confidential information
In 2016, central government is the top
Damages the reputation of an
trending industry target of cyber-
organization
espionage.
Distrust

Technical solutions available for it.


There are methods to prevent
eavesdropping, these are:
a) Encryption:
Increase the security of information, espionage and maintain their competitive
messages or sensitive data using an edge.
encryption system that is to code the codes
so they cannot be deciphered by an 1. Identify Your Companies Trade
external attacker. Secrets
2. Identify the Threats
b) Viruses and Trojan Protection: 3. Ensure Physical Security
4. Establish Policies for Controlling
It is advisable to keep your computer and Information
Smartphone protected with an antivirus 5. Train the Workforce
device to detect and neutralize attacks 6. Compartmentalize Information
Trojans and other malicious attacks. 7. Conduct Background Checks and
c) Passwords: Monitoring
8. Establish Employee Exit
On this, it is not advisable to use Procedures
passwords excessive simplicity as 9. Ensure Cyber Security
"12345", "password", "date of birth" or 10. Establish Contingency and Crisis
"user name". Against this, it is Management Plans
recommended to use long passwords that
combine uppercase and lowercase letters
as well as numbers and punctuation marks. References
This increases the level of difficulty of an
external attacker to access our accounts or Clarke, R. (2008). Seven Questions: Richard
Clarke on the Next Cyber Pearl Harbor. Retrieved
databases. Another tip is to not use the on17/02/2013 from
same password for all accounts.
http://www.foreignpolicy.com/articles/2008/04/01
d) No access untrusted sources: /seven_questions_richard_clarke_on_the_next_cy
ber_pearl_harbor
Never open files or links sent by unknown
sources, otherwise some applications are Dell Sonic WALL, Inc. (2012). Anatomy of a
Cyber Attack. Retrieved on 17/02/2013 from
installed without user consent which may http://partnerdirect.dell.com/sites/channel/Docum
infect the computer with the purpose of ents/SonicWALL-Anatomy-of-a-Cyber-Attack-
observing and steal data information. Datasheet.pdf
Hersh, S. (2010). The Online Threat: Should We
Be Worried About a Cyber War?Retrieved on
Procedures/Policies/Positions required 17/03/2013 form
to implement it in a company [Cavelty] Dunn Cavelty, Myriam. The
Militarization of Cyberspace: Why Less May Be
The impact can vary significantly from
Better, IEEE Explore, 2012 4th International
monetary loss to physical infrastructure Conference on Cyber Conflict (CYCON), p 1-13
damage to civilian casualties, and the cost
can range from insignificant to [Watney] Watney, Murdoch. Challenges
Pertaining to Cyber War Under International Law,
devastating. IEEE Explore; 2014 Third International
Conference on Cyber Security, Cyber Warfare, and
That is why it is crucial for firms to adopt
Digital Forensics, p 1-5
a defensive posture against this ever-
persistent threat. The following are 10 [Kshetri] Kshetri, Nir. Cyberwarfare: Western and
simple strategies businesses can follow in Chinese Allegations, IEEE Explore, IT
Professional Vol. 16 Issue 1, p 16-19, 2014
order to reduce their risk of corporate
https://www.techopedia.com/definition/27101/cyb
erspying - Last date display: October 20, 2016
http://www.techopedia.com/definition/27101/cybe
rspying - Last date display: October 20, 2016
http://diplomacydata.com/wp-
content/uploads/2015/06/ciberseguridad-y-
ciberespionaje1.jpg
http://www.hackmageddon.com/2016/01/11/2015-
cyber-attacks-statistics/
https://blog.surfwatchlabs.com/2016/06/16/cyber-
espionage-making-headlines-over-past-couple-
weeks/

Das könnte Ihnen auch gefallen