Nations that want to disrupt their enemies’ banking, media and government resources don’t need their own technical skills; they can simply order botnet attack services from cybercriminals.
That’s a point made in McAfee’s new report “Virtually Here: The Age of Cyber Warfare,” which draws from the opinions of about 20 experts, including William Crowell, former deputy director of the U.S. National Security Agency.
There have been several larger denial-of-service attacks over the past few years that raised suspicions about whether they were initiated by nations in conflict against their adversaries. Such incidents include cyberattacks that hit Estonia and Georgia, which some viewed as traceable to Russia. More recently, many were tempted to blame North Korea for this year’s July 4th cyberattacks on South Korea and U.S. resources (though others disagreed).
The McAfee report, prepared by Paul B. Kurtz, an analyst at Good Harbor Consulting, presents the opinions of diplomats, researchers and others about the nature of cyberattacks that seem concentrated on a specific country but where it’s hard, if not impossible, to determine whether or not another nation-state initiated the attack.
One reason it may be hard to tell is simply because a nation state may go to the criminal underground to secretly pay for a massive botnet attack against its enemy. In this case, it’s conceivable that the criminals themselves would not fully understand what they’re being asked to do since the request and payment of botnet attack services are typically carried out as anonymously as possible, says Dmitri Alperovitch, vice president of threat research at McAfee.
“There is an overlap between cyberwar and cybercrime,” former NSA official William Crowell points out in the report. “For instance, anyone can go to a criminal group and rent a botnet. We’ve reached a point where you only need money to cause disruption, not know-how, and this is something that needs to be addressed.” The hacking skills of a criminal group may make them natural allies for nation states looking for a way to deny involvement in cyberattacks, it’s noted.
The cyber warfare report points out that this year’s July 4th cyberattacks against South Korea and the United States., in which North Korea was the suspected aggressor, showed that high-profile cyber events can have significant political repercussions. The report notes that by the end of that week, Rep. Peter Hoekstra (R-Mich.) “was stating publicly that the U.S. should conduct ‘a show of force or strength’ against North Korea for its alleged role in the attacks.” The congressman expressed concern that unless the United States and allies “stood up to North Korea” there could be a next time when “they will go in and shut down a banking system or they will manipulate financial data” or that people could even get killed.
McAfee’s Alperovitch says there is “no absolute proof” that North Korea had anything to do with the cyberattacks, but notes it was odd that the botnet was entirely concentrated in South Korea, something of a technical feat. Another unusual aspect of the situation with North Korea is that it gets its Internet link from China, Alperovitch points out, because North Korea never took ownership of the top-level domains assigned to it by ICANN.
Though no one seems to know for sure, the report concludes that if the attacks did originate with North Korea, one motivation could have been to test the impact of flooding South Korean networks and the transcontinental communications between the U.S. government and South Korea to disrupt military communications.
Meanwhile, some nations are known to be developing their own cyber defense and offense capabilities. According to the report, the nations that have the most sophisticated cyberwar capabilities are the United States, France, Israel, Russia and China. If a cyber conflict of real consequence heats up, businesses and individuals can be expected to be caught in the middle of it — which suggests there should be much more open and public discussion about the issues around the world.