Cyber Espionage Investigations

CYBER ESPIONAGE

INVESTIGATION

[ Cyber Espionage ] [ Cyber Espionage Targets ] [ Espionage Methodology ] [ Spy-Operators ] [ Red Flags for Espionage ] [ Cyber Espionage Indicators ] [ Cyber Espionage Counter Measures ] [ Risks of Cyber Espionage ] [ Cyber Espionage Asssesment ]

What is Cyber Espionage?

Cyber Espionage is one of the biggest threats to your economic security. Cyberspies have been hacking into corporations’ computer networks for many decades now. Cyber Criminals & Hackers are stealing your valuable trade secrets, intellectual property data and confidential business strategies. You could be drained of your wealth and losing your competitive advantage as we speak, under your very nose and you would not notice it until it’s done. It’s worth taking note that it happened on your watch. The accountability issues are huge. You will need to conduct a Cyber Espionage Investigation to understand what is going on.

Corporations & organizations need to wake up and build a strong cyber defence strategy before it’s too late.

This cloak-and-dagger activity is part of undercover work. Cyberspies are sometimes after secret government data or will try to breach the security of big corporations in order to steal other confidential info. The exfiltrated information is gathered to obtain a personal, economic, political or military-strategic or tactical advantage, other commercial strategic advantages.

The intelligence gathered by spies can also be used for psychological, political and physical subversion or even acts of sabotage. OSINT & SOCMINT became a substantial tool in this perspective since data analysts will analyze the activity of specific subjects or groups on social networking channels.

This is why you need to invest in cybersecurity since all our research data and events show that cyberespionage is an increasingly imminent threat. The detrimental effects of Industrial espionage are not to be underestimated.

Cyber Spying is closely associated – but not exactly the same – with undercover surveillance, data exfiltration, data theft, intelligence gathering, eavesdropping, infiltration, counterintelligence, counter-espionage, ninjutsu, bugging, TSCM, wiretapping, reconnaissance (recon).

What and who are the targets of cyber espionage?

  • secret & private data from individuals
  • large corporations
  • government agencies
  • academic institutions
  • think tanks
  • organizations, NGO, not for profits
  • journalists
  • government officials
  • business executives
  • security officers
  • technology service providers – supply chaing attack – hijacking devices and modifying hardware
  • intellectual property and commercial data from competitors
  • plans and confidential data from rivals, adversary groups
  • government intelligence
  • national security related info
  • critical infrastructre sectors (electrity, water, nuclear, energy, oil & gas, pipelines, etc..)
  • hospitals and medical facilities (obtain medical records and other data)
  • military intelligence
  • police, security forces and law enforment
  • law firms
  • essential any secure facility or non-public, yet protected data-pocket

Espionage Methods and Spy Operators:

  • hacking methods using the internet & networks
  • cracking & hacking methodology
  • use malicious software (trojan horses, spyware)
  • remote hacking tools
  • closeby infiltration (on site) – water hose technique
  • conventional espionage
  • insertion of moles
  • use of hired criminals or malicious hackers
  • software programmers providing backdoors into systems
  • advanced persistent threats (APT) – APT groups
  • infiltration of organizations & companies
  • social engineering methods
  • malware atacks
  • ransomsware attacks
  • insider threat
  • spy bugs, electronic equipment tapping your communciations
  • eavesdropping

RED FLAGS

What are the Red Flags or indicators that you are being spied upon?

  • previously confidential documents leak out (online or selectively)
  • identical products & services developed by competitors
  • theft of trade secrets leading to simular patents being filed
  • suspicious activity on your computer network
  • increased activity on your website hosting
  • suspicous IP numbers connecting to your network
  • malware and other suspicious software on your devices
  • unauthorized resets of systems
  • unscheduled backups, repairs and maintenance
  • unauthorized persons accessing secure premises
  • social engineering attacks (phishing emails, strange phonecalls…)
  • tricking people to give out confidential information
  • trick people into installing malicious software
  • telephone scams
  • fake emails
  • infected attachement sent via emails
  • suspicious links in emails
  • sender of email which are not a recognized person or properly identiable organization
  • fake social media accounts requesting to connect to your company ID
  • irrelevant requests being made via email or phone
  • people suddenly wanting to access certain places or data without clear reason or authorization
  • messages with spelling and grammatical errors, wrong phrases

Actions to take against cyber espionage – Counter Measures

  • do social engineering phishing tests to identify vulnerabilities and solutions
  • zero tolerance for security breaches
  • train staff, workforce and vendors to detect the signs
  • hire professionally trained people who can do this for you
  • Counter-Espionage
  • Cyber Espionage Investigiation
  • Security Awareness Training
  • establish an Incident Response Center with real operators

What are the Risks of Cyber Espionage for your organization?

  • reputational harm
  • leak of private information via databreach
  • loss of shareholder & customer trust in your brand
  • loss of tactical or strategic intelligence in cyber terrorism & cyber warfare by cyber espionage
  • electionhacking
  • disruption of public services
  • attack on (critical) infrastructure facilities (the soft underbelly of society)
  • leak of salary information and finanical data

Cyber Espionage Investigation

Currently, we live in an extremely complex ecosystem of cyber espionage, nation-state hacking, APTgroups, ransomware, data breaches & cyber attacks that have regularly compromised governments, government agencies, health care services, businesses, corporations, academic and educational institutions, critical infrastructure and other connected computer network systems.

Hence the need for professional Cyber Espionage Investigations has increased. Every different sector requires a specific approach. Over the years we have developed relevant cyber insights & threat intelligence in the threats that are facing these industries or regulators. The following elements (this is a forensic process) are addressed in such types of investigations:

  • analysis of stolen data
  • enumeration of the sensitive targets & attack vectors
  • Investigation of a Cyber Espionage Network requires at least 12 months of focus
  • 1st an analysis is done on the allegations at hand
  • enumeration of the network of compromised computers (the spread)
  • list of the high value targets
  • cloud connectivity investigation – what is connected to the cloud?

The main stages in the Cyber Spy Investigation process are:

  • Technical interrogation (Sinkhole – DNS Sinkhole Server)
    • collect intelligence on attack method
  • Boots on the ground / field investigation
  • Analysis of Data Acquired
  • Understanding the Geopolitical or other relevant context
  • Malware analysis
    • which type, which template
    • exploits
    • command & control servers
    • which file-types sent? (PPT DOC PDF EXR)
  • Document the Cyber Kill Chain (methods used)
    • understand the capabilities of the attackers and their targets
    • command and control servers
    • which data was exfiltrated
    • who was compromised & how
    • description of botnet used
  • time of the attacks
  • type of exploitation – what kind of malicious activities?
  • what type of social engineering was used?
  • identitify the perpetrators
  • understand the motivation of the attackers
  • document links to criminal networks
  • determine the fall-out and spread of the attack
  • which domain names, URLs and IP addresses were used by the attackers
  • retrieve & decrypt the stolen documents
  • list of compromised login credentials, email-accounts, VPN-accounts, passwords, etc..
  • list of confidential information stolen – which data was exfiltrated
    • documents
    • presentations
    • login credentials
    • pictures
    • configuration settings
  • level of confidentiality of these documents (how secret)
  • list of email addresses used by the attackers
  • reporting process to the relevant authorities
  • potential of simular attacks in connected entities (lateral movement)
  • determine the extent of the dammage – including collateral damage
  • in depth study & analysis of the correlations in order to to determine the motivation and attribution (who did what, how, when, how, to what end, why, what instructions received ,etc…)
  • what type of cyber espionage was at play?
    • nation-state cyber espionage
    • localized incident
    • script kiddies?
    • corporate espionage?
  • recommendations for the future (prevention, resilience, risk analysis)

Do contact us for a free Cyber Espionage Assessment

Cyber Warfare

CYBER WARFARE

The amount of ongoing cyber attacks (many types) could be compared to a relentless assault with millions of arrows on a given target. Just take a look at the different live Cyber War maps and Cyber Attack or Cyber Threat maps.

Live Cyber Threat Map | Check PointFireEye Cyber Threat MapCyber-attack Map (httpcs.com)

Cyber Warfare activity is aggressive in nature and is conducted by different entities. It is not reserved to governments and military entities or security forces only. This makes the cyber landscape a threatening and complex combat theatre with multiple attack vectors. After land, sea, air and space, Cyber Space is now recognized as the fifth domain. It is in this 5th domain that Cyber Warfare, Cyber Defense and Cyber Offense are conducted.

Spear Phishing Risk Assessment & Investigation

What is spear phishing?

It is the sending of fraudulent emails from a known or trusted sender (in the eyes of the receiver) with the malicious purpose to get the targeted person to reveal confidential information because they think they can trust you. But in fact, they are emailing to an imposter or a conman.

This activity is closely related to phishing.

Social Engineering Attack – Social Engineering Investigation

SOCIAL ENGINEERING ATTACK

What is social engineering – social engineering attack

This is the use of deceptive tools and methods on you the human mind in order to manipulate you into divulging confidential or personal information. Once obtained this data will be used for fraudulent purposes. Especially today social engineers attack users with online accounts via chatting and email or calls. Phishing attacks are a form of social engineering.

Types of social engineering attacks

  • phishing
  • spear phishing
  • whaling
  • vishing
  • smishing
  • pretexting
  • baiting
  • tailgating
  • piggybacking
  • quid pro quo

How to detect social engineering? Red flags.

How to protect yourself from social engineering?

Social Engineering Investigation