Chapter 5: Cyberwarfare and How
to Defend Against It?
Cyberwarfare alludes to the use of
technology for launching attacks on governments, corporations, and
citizens of a country to inflict significant harm. There are
generally no weapons involved in the warfare, and all this happens
in the cyber world. There has been much talk about cyberwarfare
across the globe but the fact remains that there is not a single
cyberwar that has declared antagonists. Still, there is no shortage
of incidents that have caused somewhat serious disruption to the
infrastructure and that experts suspect have been perpetrated by a
state.
The Oxford English dictionary’s definition
of cyberwarfare is: "The use of computer technology to disrupt the
activities of a state or organization, especially the deliberate
attacking of information systems for strategic or military
purposes."
Cyberwarfare is tricky because at the time
of the incident, people have no idea who has started the attack and
what the intentions are.
Sometimes there are no reasons at all. This
creates a giant web of confusion among people; that’s why the very
first reaction to this kind of situation is silence. In a majority
of cases, no one steps up to claim responsibility for the attack.
Countries can open the doors of speculation on the basis of raw
guess and current geopolitical situation, but there are no concrete
accusations. The reason behind the absence of any tracks is that
the states are quite deft at brushing them off on the back of
enormous resources and availability of expert talent. Also, you
cannot prove that a state is directly involved in the attack, even
if you can track down the perpetrators.
The hackers can be individual contractors that have been hired by a
state on the condition that they will not disclose who had hired
them for the job.
Still, some stories keep circulating across
the states about cyberwarfare, and some of them are quite scary.
What will happen if state-sponsored hackers will have enough power
to blackout an entire country by executing multiple cyber-attacks
across the country? What if they will infiltrate banks and freeze
different ATM machines across countries to jam the flow of cash?
Perhaps they will succeed in shutting down the airports and
shipping firms. Ports will be closed and factories will be put
under lockdown because hackers will take control of the power
plants. They will go on to paralyze airports as well as hospitals.
All these scary stories start proliferating whenever a major cyber
attack occurs.
Once, it was a thought or a mere fantasy
that hacking could disrupt entire systems of the state rather than
being just a tool for plunder and loot, but now we see that hacking
can really disrupt states’ operations.
A good news is that so far, cyberwarfare has not resulted in
any kind of direct loss of life, but it is a truth that
cyberwarfare has shown us that it can inflict significant financial
loss. Cyberwarfare has been used to create panic among the
industrial sector. Up till now, it has been used to deny civilians
access to some basic services such as power and heat. With changing
geopolitical scenario, it has been observed that smaller countries
that feel being bullied by the bigger powers seem to be trying out
cyber warfare to flex their muscles in this realm. Iran, Russia and
North Korea seem to be keen on using cyberwarfare to equal the
power of mighty countries such as the United States because they
know that they cannot match her in the traditional warfare. Still,
it is a fact that the United States has the most advanced cyber warfare capabilities in the
world, but is focused primarily on defense of American
networks.
A Brief History of
Cyberwarfare
If we want to understand what cyberwarfare
is and how it started, we should give a brief read to its origins.
It is worth understanding how the world is defining this. The term
itself is decades old and was first chronicled in Thomas Rid’s
history Rise of the Machines .
There were talks of automatic weapons and flying cars. Then came
the idea of robotic warfare with the concept of a terminator who
goes on a killing spree. In 1993 the think tank RAND floated the
idea of how military hackers would be used in future for attacking
the computers of the enemy that they were using for command-and-control.
The prospect of a full-on cyber war evolved
with the rise in IT power of China, the United States, and Russia.
There are lots of other countries such as North Korea, Iran and
Saudi Arabia that have already hopped on the bandwagon.
Cyberweapons are getting more sophisticated
with the dawn of each day. They are now more aggressive and fast as
states have been backing them with huge resources. So far, a mega
cyber-attack on critical infrastructures of countries has not
happened but the possibility of an attack in the near future cannot
be ruled out.
Russian, China and Iran are seen as making
considerable progress in the field of cyberwarfare to break the
hegemony of the United States in the world. They are now inching
toward challenging the status of the United States by defeating her
in the cyber world, knowing that the United States leads the world
in the domain of cyberwarfare. Where these three countries are
moving toward fulfilling their designs, the United States is also
creating a robust and offensive-oriented cyber doctrine that would
turn out to be a super tough shield in
the wake of an attack, and would also prepare a powerful response
in a short span of time. This competition
tells us that cyber warfare is going to change its way and become
more aggressive and destructive in the near
future.
There have been numerous conflicts of
interests and an enormous difference of opinion among world powers.
Russia dislikes the policies of the United States and she has been
pushing forward the idea of the so-called national sovereignty. The
Kremlin is frustrated because the United States is ever ready to
combat any plan to challenge its writ. In addition, Russia hates
freedom of speech and dislikes the meddling of the United States to
support freedom of speech across the world. Russia has gone to the
extent of saying that it would cut off itself from the global
internet and form its own national Internet if the United States
didn’t stop.
Russia and the United States have also been
engaged in probing each other’s power sectors. Experts suspect that
they might have succeeded in planting malicious codes into the
systems so that they can control the power sectors if an all-out
war breaks out. China is not lagging behind in the cyber world.
China harbors the same ambitions as Russia and appears to be fed up
with the unilateralism of the United States. China, just like
Russia, loves the idea of state censorship. China is blocking
access to lots of international websites, and also wants to follow
the idea of a national internet. It has executed multiple
crackdowns on anti-government speeches on the internet.
There is a third factor that has
significantly changed the equation of cyberwarfare. Iran is also
fed up with the hegemony of the United States, and she wants to
inflict damage on the United States from behind the
scenes.
An Overview of Weapons Used in
Cyberwarfare
Russian and China are on their way to
developing sophisticated cyber weapons for future usage. Similarly,
the United States, Israel, and France are also very active among
the nation-states in leading the way in the cyber world. Well, this
doesn’t prove that all these countries have started using
cyberweapons against other countries, but they can use them if they
get caught in a conflict with one another. If we can recall,
Stuxnet was a joint venture of the United States and Israel to
reverse the progress of the nuclear program of Iran.
Cyberweapons used by the state are no
different than the weapons used for criminal attacks by hackers.
Social engineering already has a dedicated a chapter in this book
and one of the many cyber weapons to be used.
Stuxnet was a perfect example of a cyber
weapon. It was discovered in 2010 and was made of multiple layers
of attack to ensure maximum loss on the part of the enemy. The
manner it happened is still a matter of debate among cybersecurity
experts, but a majority of them agree that it was a USB that
someone either knowingly or unknowingly inserted into an air-gapped
system and it infected the Iranian nuclear power programmer pushing
it decades behind from where it has reached. The malware in the USB
drive made use of multiple zero-day exploits and was made as such
to hunt down the software that ran and controlled the centrifuges.
Once it had located the software of centrifuges, it spans them
faster than its normal speed and that too in an undetected manner.
The speed of the centrifuges remained faster than normal for a
period of several months and eventually, the centrifuges broke.
Stuxnet affected around 1000 machines.
No one officially claimed
responsibility for the attack but people across the world believe
that it was a state-sponsored program and a joint venture by the
United States and Israel. The interesting thing is that no country
that was accused denied the attack. Stuxnet is an all-time famous
example of a lethal cyberweapon that silently killed the nuclear
power programmer of Iran inflicting a loss of millions of dollars
on Iran.
Another example comes from Russia that
remains accused of several state-sponsored cyberattacks. Russia has
faced accusations of designing and mounting some pretty grave
cyberattacks against Ukraine. The most notorious of the attacks is
the BlackEnergy attack that resulted in rendering around 700,000
houses without power in 2015. Another one is the NotPeya malware
that turned out to be ransomware but in reality, it was made as
such to destroy the computer systems it infected.
North Korea has also been in the news for
its cyberattacks. It has a turbulent relationship with the United
States at the diplomatic especially because the latter is an
adamant opponent of its nuclear programmer. North Korea doesn’t
have the power to compete in the United States at the economic and
even the nuclear level so it has taken this new approach of
competing in cyberspace. Cyber experts say that North Korea has
been involved in some pretty dangerous cyberattacks. They have
tried to form a link between North Korea and the Lazarous Group.
The most notorious of the attacks that had generated news headlines
for the days to come was the attack on Sony Pictures
entertainment.
Hackers broke into the network of Sony
Pictures Entertainment and stole a huge amount of confidential
documents from their office and afterward posted them online in the
coming weeks. This exposed the documents to the masses from
journalists and common people to
cybercriminals who could possibly use the information to maximize
their financial gains. Journalists poured through the huge amount
of documents and reported almost everything the papers contained.
Most of the documents carried details of a recent film by Sony
Pictures Entertainment but there were plenty of papers that exposed
the data of the employees.
There were more than one report by the US
government that linked the cyberattack to North Korea, and there
were pretty solid reasons to think so because North Korean
government had shown displeasure toward Sony Pictures because of a
film it had produced. The film, named The Interview, was an
action-comedy that revolved around an assassination plot of Kim
Jong Un, the ruler of North Korea.
What actually happened in Sony Pictures was
peculiar, to say the least. The employees of Sony Pictures reached
their office one Monday morning and tried to log into their
computer. They were taken aback from what they had seen on the
screen. There was a picture of a neon red skeleton that greeted
them. The screen showed them the following words: #Hacked by #GOP.
The group threatened Sony Pictures to release a huge amount of data
if the company officials didn’t accept their request. There was
more than one statement from the GOP group.
Each message from the Guardian of Peace
group accompanied links to download the data that they had stolen
from Sony Pictures networks. The day the attack happened, the FBI
released a memo warning companies about the entry of a new kind of
malware. Even after the passage of days and weeks, the employees at
Sony Pictures couldn’t log into their old computers because the
company officials were not sure if they had completely removed the
malware from the system or not.
The government of North Korea didn’t claim the
attack and that’s why attribution to a specific group or individual
was tough, but officials and the vast majority of cybersecurity
experts linked the attack to the North Korean government. North
Korean officials denied the responsibility for the attack but
dubbed it as a righteous deed and cherished it. It also alluded to
the fact that the group that committed the act might have been
among the group of supporters of the regime. The responsibility
couldn’t be imposed on a specific person or government but North
Korea gave an indication that it supported the act of the hacking
group.
Defending Against
Cyberwarfare
Cyberwarfare has considerably evolved over
the past few years from being a theoretical concept to a practical
thing. The destructive nature of cyberweapons has been growing at a
lightning-fast pace, thanks to the rising ace of cyberattack tools
and cyber mercenary groups.
Cyberweapons can inflict unprecedented
damage to the economic infrastructure of a country. Now the warfare
has changed its shape and it is being conducted in the cyber realm.
Military leaders are now brainstorming to create new lines of
defense against the attacks in cyberspace. They are now developing
intelligent systems to safeguard their assets that remain in the
cyberspace.
There has been a significant rise in the
number of cyberattacks, and now hackers have access to an arsenal
of powerful and automated cyber weapons. The weapons range from
denial of service attacks to dictionary attack weapons that are
designed as such to try out a wide range of password combinations
to log into a network system. Another method is social engineering
that revolves around harvesting key information from the employees
of a government or a
corporation.
The scale of the destruction of a cyber
weapon is so wide that it is pretty hard to calculate what amount
of loss it is capable of inflicting. For example, the WannCry
ransomware infected around 300,000 computers in around 150
countries. The number of affected computers was great and the
radius it covered was amazing, to say the least.
The enormity and vastness of the attack have
made defenses against these kinds of attacks a matter of great
concern. Militaries around the world are now preparing themselves
for a new battlefront. They have started to understand by now that
it is not just a matter of technological race but a question of how
much resources do you have and how brilliant is your manpower. It
requires considerable time and hours long coding to assess the
source of an attack and the solution to prepare a solid defense to
the attack. That’s where the problem lies. Militaries around the
world have hardly the manpower that is required to carry out such
kind of attacks. In fact, there has been a serious shortfall of
cybersecurity workers around the world.
From the Sony Pictures attack, we can deduce
the fact that it is not easy to respond to a cyberattack right
away. In fact, it is difficult to guess the timing of the attack.
When Sony Pictures employees saw the screen created by the hackers,
all the documents had already been stolen and uploaded on the
internet. The screen was just a kind of intimation that they had
been attacked. They might not have known about the attack had the
hackers not displayed the message on the screens.
The first problem is the detection of the
attack. In some cases, the attack is visible. For example, if the
cyberattack is made on a power plant, it is easier to detect.
Still, it takes considerable time and effort to locate the origin of the attack and even if
you find out the origin of the attack, it is hard to fix
responsibility on a government if the latter doesn’t claim it or
outright deny it.
There have been attempts by countries to
beef up defenses against a potential cyberattack. One such example
of preparation for cyberwarfare is the Locked Shields exercise that
NATO has been running for quite some time. There is a country named
Berylia in the scenario that is a fictional member state of NATO
and has been floating in the North Atlantic. This state has a
somewhat tough relationship with Crimsonia, the rival state.
Crimsonia is supposed to be located near the eastern side of
Europe. The project is being operated by the Cooperative Cyber
Defense Center of Excellence of NATO and is currently the largest
and one of the most complex international technical defense
exercises that involve around 900 participants from a total of 25
nations.
Each year a bunch of national teams
participates in the games, out of which one is from NATO itself.
NATO has been conducting this kind of exercise for the past few
years and this has made it crystal clear that cyberwarfare is no
more a fantasy and it has moved from the theoretical realm to the
practical realm. Not just NATO, individual countries are also
spending a huge amount of sum on improving their capacity to defend
themselves in the wake of cyberwarfare and also to come back with
an overwhelming response to deter and defeat the enemy. The United
States, China and Russia top the list of the nations that boast of
some pretty advanced capabilities in the field.
The 2015 hacking attack on the power sector
of Ukraine that had left hundreds of thousands without power turned
out to be a wakeup call for governments around the world. The
attack showed the potential of a cyber weapon and its importance in
a traditional warfare. Just imagine if a
country loses all its power amidst a traditional attack by its
neighbor. It means complete annihilation or surrenders in a matter
of hours before the enemy. The country that has the most
sophisticated cyber technology can wipe out the other countries
using the Internet.
Since the attack on Ukraine’s power sector,
countries have started giving full attention to the importance of
the development of cyber weapons and defenses. Just like every
year, this year the teams were given the task to protect Berylia’s
major military airbase from any kind of cyberattacks. The
contending teams have to defend everything thing on the base such
as the main office, the personal computers that had Windows
operating systems, Mac operations system, Linux operations system,
email accounts and all the major or minor servers. The teams were
also given the task to defend the systems that controlled the power
sector and the office that controlled military air traffic. Other
facilities that came under the defense were military surveillance
drones and the control offices that directed the fuel of supply to
and from the airbase. The basic idea behind the exercise was to
reinforce the concept that all individual systems and offices that
are inside or outside of the facility but are somehow linked to it
should be protected as they can be a potential target of the
hackers.
The Locked Shields exercises have expanded
their realm and have turned into a sort of communications game. The
teams have started to respond for certain interviews to update the
people about how their response to a certain attack went. It has
become a kind of game in which participants have to deal with a
pack of threats and neutralize them in a short amount of time. Each
team has a different set of threats and it depends on its decisions
on how well it will protect the state of Berylia.
The teams are assigned
different colors and different PCs. Red denotes the attackers while
green denotes the infrastructure team that has the responsibility
to keep the game in the running mode. White is the color given to
the team responsible for the communications as well as legal teams
and others that are running inside the scenarios.
There is a bunch of people who are
encouraged to act as naïve people who unsuspectingly click on
suspicious links and welcome all kinds of viruses into their system
that allows the attackers to initiate a lethal cyberattack against
the defenders.
So the defenders are deliberately put in a
difficult situation so that their skills can be tested. The users
who have suffered from a cyberattack have the facility to file a
complaint with the blue team that they are unable to access their
email and other services because they have just clicked on a
ransomware and are now unable to open anything on their own
computer. This creates another hassle for the defending team to
deal with and resolve.
The games are designed as such to introduce
a new set of viruses and a unique kind of threat each time it
starts to give participants a taste of how a real cyberattack
happens and what should be their response to it. That’s how they
are able to develop a unique strategy each time to deal with the
threat. The environment is just so real that everyone is greatly
involved in what is happening. This makes these games efficient
when it comes to create a defense shield against a
cyberattack.
This kind of exercises will enable countries
to respond to a cyberattack in real-time and also to neutralize an
attack right at the source or at least right after it has been
triggered. The main objective is to
minimize the amount of time that was earlier spent on detecting the
nature of the threat and then creating a response to deal with it.
(Ranger, 2017)