{"id":36751,"date":"2022-06-20T06:25:00","date_gmt":"2022-06-20T06:25:00","guid":{"rendered":"https:\/\/cloudnewshub.com\/archives\/36751"},"modified":"2022-06-20T06:25:00","modified_gmt":"2022-06-20T06:25:00","slug":"complex-russian-cyber-threat-requires-we-go-back-to-basics","status":"publish","type":"post","link":"https:\/\/cloudnewshub.com\/?p=36751","title":{"rendered":"Complex Russian cyber threat requires we go back to basics"},"content":{"rendered":"<div><img decoding=\"async\" src=\"http:\/\/cloudnewshub.com\/wp-content\/uploads\/2022\/06\/complex-russian-cyber-threat-requires-we-go-back-to-basics.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Despite Russia\u2019s cyber threat understandably fading into the background amid the war in Ukraine, there is a longer-term strategy that governments, organisations and industry should be putting in place to prepare for the country\u2019s cyber actors.<\/p>\n<p>Note the word <a href=\"https:\/\/www.computerweekly.com\/news\/252512417\/Prepare-but-dont-panic-over-supposed-Russian-cyber-threat\">\u201cprepare\u201d, not \u201cpanic\u201d<\/a>. Despite Russia\u2019s very sophisticated cyber capabilities, there is still a common set of techniques and tactics used across its diverse actor matrix. At first glance, it is this variation that causes concern, alongside the general mystery of Russia as an entity. However, reassuringly, it also gives reason for governmental response teams, and cyber security specialists, to be optimistic about future resilience.<\/p>\n<p>If part of the attack strategy is to simply create a sense of fear or uncertainty, then focusing instead on the most rudimentary and robust protection protocols can take some of that indecision away. This is something that <a href=\"https:\/\/www.mandiant.com\/\">Mandiant<\/a>, a global cyber defence leader, has looked to encourage through its dedicated <a href=\"https:\/\/www.mandiant.com\/resources\/protect-against-destructive-attacks\">hardening guide<\/a>, which has sought to contextualise the real Russian threat.<\/p>\n<p>Jamie Collier, senior threat intelligence adviser at Mandiant, says: \u201cThe hardening guide essentially lays out some very common security controls by mapping the types of attack we have seen conducted by Russia in the past.<\/p>\n<p>\u201cIn that sense, it offers strategy to organisations. Russian state threats certainly require some specific planning, yet we should never forget how important security fundamentals are. Moreover, by focusing on common Russian attack techniques, security functions are able to significantly reduce their exposure. Ultimately, knowledge of prominent threats can, and should, empower network defenders.\u201d<\/p>\n<p>Collier\u2019s reason for optimism comes despite seeing the cyber landscape evolve during the pandemic, with cyber espionage usurped by ransomware as the most pressing challenge.<\/p>\n<p>He adds: \u201cWorld leaders and heads of state are now starting to intervene much more directly in tackling ransomware as a result of its proliferation, understanding that it now has a critical impact on not just network security, but national security as well.<\/p>\n<p>\u201cIn the context of Russia, this has actually helped organisations as they\u2019ve been forced into having these conversations and defence discussions.\u201d<\/p>\n<section class=\"section main-article-chapter\" data-menu-title=\"Threat variety\">\n<h3 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"><\/i>Threat variety<\/h3>\n<p>This isn\u2019t to downplay Russia\u2019s profile, of course. The war in Ukraine has served as a reminder \u2013 if ever it was needed \u2013 that the Russian threat isn\u2019t just talk. It isn\u2019t just creating a perception of potential threat. There is often a follow through, as we have seen with countless cyber examples in recent years, and are now seeing play out in a much more physical sense.<\/p>\n<p>From a digital standpoint, Mandiant has been able to generate a hardening guide, having watched and analysed the progression of Russia\u2019s state actor activity for decades. From this analytical starting point, the company\u2019s main aim is to translate this insight into an action plan or strategic blueprint for different segments of society to follow.<\/p>\n<p>\u201cIt is a complex process with Russia specifically, due to the sheer amount of variety we see in their cyber activities,\u201d says Collier.<\/p>\n<p>He immediately alludes to the different intelligence agencies involved in conducting cyber operations, including the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GRU), the Federal Security Service (FSB) and the Foreign Intelligence Service (SVR).<\/p>\n<p>\u201cThey all have quite different mandates, which are reflected in the types of cyber operations we see,\u201d he says. \u201cFor instance, the GRU tends to be more brazen or loud, which reflects a general reputation for disregarding international norms. This comes through in the form of actors such as <a href=\"https:\/\/www.wired.com\/story\/sandworm-cyclops-blink-hacking-tool\/\">Sandworm<\/a>, who continue to make the news to this day.<\/p>\n<p>\u201cThen you have <a href=\"https:\/\/www.computerweekly.com\/news\/252507279\/The-Security-Interviews-How-SolarWinds-came-through-its-darkest-hour\">something like SolarWinds<\/a>, which has been linked to the SVR by more than one international government. These types of operations showcase an impressive degree of stealth and operational discipline being used to make it as difficult as possible for incident responders.\u201d<\/p>\n<p>Adding a further layer of complexity to the situation is the fact that these various operations are not necessarily tied in together through collaboration or strategy. If anything, the general consensus points more towards a sense of competition among them to gain favour with Russia\u2019s governmental hierarchy.<\/p>\n<p>\u201cIt also leads to quite a potent blend of information operations, in addition to traditional cyber security actions,\u201d says Collier. \u201cWe\u2019ve seen it played out in the context of, say, the 2016 US election, but really this diverse mix of threats has been going on for decades, playing out in a variety of different areas. The overlap between information operations and cyber security is so interesting.\u201d<\/p>\n<p>In addition to the \u201cvariety\u201d box, the \u201cseverity\u201d box is also very much ticked, as evidenced by the US election example. The <a href=\"https:\/\/www.gov.uk\/government\/news\/uk-exposes-series-of-russian-cyber-attacks-against-olympic-and-paralympic-games\">Tokyo 2020 Olympics and Paralympics<\/a> are another frequently cited example that triggers reminders of the threat on one hand \u2013 but that perhaps also skews response plans on the other.<\/p>\n<p>Such high-profile events have given Russian state actors a persona and gravitas that doesn\u2019t always reflect true vulnerability levels. This often distracts organisations from focusing on what they actually need to protect \u2013 and, pivotally, how to protect it.<\/p>\n<p>Collier explains: \u201cAm I a foreign government where Russia will be interested in gathering intelligence? Am I a media organisation where a threat might come in the form of information operations? Am I a major sporting event? Am I an industry-leading organisation? Am I a key link in a supply chain?<\/p>\n<p>\u201cYes, there are elevated threats in different areas, so I think it\u2019s important that organisations focus a bit more on what is important to them, rather than on all the various Russian threats out there. We often look at Russian cyber capabilities as one holistic and all-encompassing threat, yet it may only be certain elements of the Russian intelligence apparatus that we need to focus on, depending on our sector and geography.\u201d<\/p>\n<\/section>\n<section class=\"section main-article-chapter\" data-menu-title=\"Uncertainty skews response\">\n<h3 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"><\/i>Uncertainty skews response<\/h3>\n<p>More than being just a technological exercise, the Russian state actor threat represents something of a psychological effort as a result. Knowing where the dangers lie, resisting the urge to over-react and cause panic, knowing that the threat is serious enough never to underestimate it, and then putting in place bespoke defence protocols, is a delicate tightrope to walk.<\/p>\n<p>It can perhaps even be mirrored with the war in Ukraine, where the response from the wider world, and in particular Nato countries, has been <a href=\"https:\/\/www.theguardian.com\/world\/live\/2022\/may\/25\/russia-ukraine-war-latest-russians-trying-to-destroy-donbas-says-zelenskiy-as-fighting-intensifies-live\">criticised in some parts for being too careful<\/a>. Russia\u2019s volatility, mystery and variety make any rash reactions a nervy prospect in any context. And those two worlds have even crossed in recent years, courtesy of a state actor operation impacting the Ukrainian financial services sector.<\/p>\n<p>Collier says: \u201cIt was an easy attack to almost ignore or overlook, given that DDoS [distributed denial of service] attacks are relatively unsophisticated, with mitigation steps well known. Yet, combined with the DDoS operation were actual text messages sent to Ukrainian citizens informing them that their bank was offline. This was purely to create a sense of personal unease, and to encourage them into frustrating situations to try to solve in person.<\/p>\n<p>\u201cCreating uncertainty is part of the process of being feared, which ultimately skews the required response or the creation of an effective defence.\u201d<\/p>\n<\/section>\n<section class=\"section main-article-chapter\" data-menu-title=\"Vigilance without panic\">\n<h3 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"><\/i>Vigilance without panic<\/h3>\n<p>So, what does an effective defence look like?<\/p>\n<p>Fortunately, in this regard, while many are scrambling or searching for the right answer, there are those who have been analysing the threat for so long that patterns have emerged, and a defence landscape is now evident.<\/p>\n<p>Collier calls it the \u201cattack lifecycle\u201d, which informs each stage of each method of attack, by way of techniques, controls, tactics and requisite response. Even with more complex attacks, such as SolarWinds, which are extremely difficult to detect, there are still familiar traits, which can be combated with the abovementioned basic defence protocols.<\/p>\n<p>It is here where a united approach works best. Collier notes that government networks are critical in terms of having overarching visibility of victim environments. Meanwhile, the private sector and cyber defence specialists offer more bespoke insight into specific networks and sector impacts.<\/p>\n<p>Merging the big picture with tailored insight forms the perfect, complementary platform for organisations to build a defence guided by strategy, not panic.<\/p>\n<p>Collier concludes: \u201cIt converts the outlook from one built around trying to prepare for every eventuality, to one built protecting what is most important and against the most relevant threats.<\/p>\n<p>\u201cThis should, of course, be the case in any context, but is especially important in the face of Russian state actors, given the unique variety of threat, and the psychological aspects involved.<\/p>\n<p>\u201cWe really can wipe out a lot of our attack exposure by just getting the basics right. And this pragmatism goes a long way to eradicating some of the broader fear.<\/p>\n<p>\u201cGiven the current climate, we have to be humble in terms of making grand strategic conclusions, or in escalating fear levels. Hopefully, this more sustainable and stripped-back overview of the threat landscape can achieve a balance between being vigilant, without causing panic.\u201d<\/p>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Despite Russia\u2019s cyber threat understandably fading into the background amid the war in Ukraine, there is a longer-term strategy that governments, organisations and industry should be putting in place to prepare for the country\u2019s cyber actors. Note the word \u201cprepare\u201d, not \u201cpanic\u201d. Despite Russia\u2019s very sophisticated cyber capabilities, there is still a common set of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":36752,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[533],"tags":[],"class_list":["post-36751","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it"],"_links":{"self":[{"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/posts\/36751","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=36751"}],"version-history":[{"count":0,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/posts\/36751\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/media\/36752"}],"wp:attachment":[{"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=36751"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=36751"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=36751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}