近期网络事件和对武装部队可能产生的影响#3

ID:25584

大小:0.15 MB

页数:6页

时间:2022-12-01

金币:15

上传者:战必胜
Recent Cyber Events and Possible
Implications for Armed Forces
#3 June 2020
About this paper
This paper is the collaborative view of NATO CCDCOE researchers highlighting the potential effects
on the military of current events and of developments in cyberspace during the previous month,
based on publicly available information. It does not set out to be exhaustive. While the authors have
made every effort to describe events from a perspective relevant to NATO and partner nations, there
may be national and regional differences which this paper does not address.
The authors of this paper are independent researchers at the NATO CCDCOE; they do not represent
NATO, nor does this paper reflect NATO’s position. The aim of the paper is not to replace information
about vulnerabilities and incidents provided by CSIRTs and providers of CIS products and services.
1. Targeted threats against the
military and national security
APT uses one breached government
organisation to attack others
After five years under the radar, the Naikon
APT group has been unmasked in a long-term
espionage campaign against several
governments in the Asia-Pacific region. […]
Specifically targeted are government minis-
tries of foreign affairs, science and tech-
nology, and government-owned companies.
(Threatpost, 7 May 2020)
Interestingly, the group has been observed
expanding its footholds on the various
governments within APAC by launching
attacks from one government entity that has
already been breached, to try and infect
another. (Check Point Research, 7 May
2020).
The modus operandi of this APT is interesting
and clearly shows how defence in depth is
important and how even otherwise trusted
parties can pose a risk of malware infections.
For example, the Check Point report mentions
an embassy unknowingly sending malware-
infected documents back to its home country.
1
Air-gapped refers to a computer or network of
computers with no network connection to any
other systems. The lack of network connections
makes such systems more difficult to reach for an
attacker.
Since the cybersecurity posture of different
organisations can vary a great deal, this tactic
may be effective in reaching targets that may
otherwise be difficult to breach.
Air-gapped systems not as secure as
one may believe
Cybersecurity researcher Mordechai Guri
from Israel's Ben Gurion University of the
Negev recently demonstrated a new kind of
malware that could be used to covertly steal
highly sensitive data from air-gapped and
audio-gapped systems using a novel acoustic
quirk in power supply units that come with
modern computing devices. (The Hacker
News, 4 May 2020)
Air-gapped
1
systems are common in military
installations and national security systems
and are generally considered much more
secure than systems connected to the internet
or other public networks.
The article quoted above is one example of
how information may be exfiltrated from an air-
gapped system. Over the years, researchers
have presented several similar techniques
using radio waves, light or sound generated
by malware. Even though not all these
techniques are practical in every situation,
2
2
The methods generally have low bandwidth and
require relative physical proximity of the
equipment receiving the data.
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭