Cyberwarfare / Nation-State Attacks , Events , Fraud Management & Cybercrime
Is Cyber Becoming a Primary Domain of Warfare?
Adi Bleih and Daniel Pigeon on Evolving Cyberthreats in Modern ConflictsConflicts between nations are no longer restricted to physical battlegrounds. In the Ukraine-Russia and Israel-Hamas wars, cyber operations now have a heightened focus on critical infrastructure and supply chains. Wiper malware has become a common tool for disrupting targeted organizations, said Adi Bleih, security researcher at Cyberint.
See Also: OnDemand | Secure Your Vendor's Access from Attacks on Third-party Vulnerabilities
With their new tools and even greater capabilities, hacktivists are a bigger threat than ever before, marking a shift from a decade ago when they lacked the resources to attack large organizations. There is more of an overlap between nation-state actors, financially motivated cybercriminals and ideologically driven hacktivists, said Daniel Pigeon, senior product marketing manager at Cyberint. The blurred lines between these groups makes it harder to attribute attacks and understand their true motives.
"We see the combination of physical army and the use of cybersecurity teams. And even if the attack is not successful, sometimes the fear and the operation itself may harm the public safety psychologically," Bleih said.
In this video interview with Information Security Media Group at Infosecurity Europe 2024, Bleih and Pigeon discussed:
- The increased targeting of essential services and the challenges of defending these sectors;
- Takeaways from a modern cyberwarfare analysis conducted by Cyberint;
- The psychological component to cyberattacks in a conflict.
Bleih researches current and emerging ransomware groups and cybersecurity threats, trends and technologies, covering topics such as ransomware attacks and APT attacks. Previously, he worked as a threat intelligence researcher at Cybersixgill.
Pigeon is a technical product marketing professional with experience in cryptographic solutions, vulnerability management, threat intelligence and attack surface management. He helps security leaders find and deploy the solutions they need to keep their organizations secure.