The rise of nation-state attacks

1 September 2019 News & Events

A new phase of cyber warfare has begun. Hackers acting on behalf of nation-state powers are no longer just out to disrupt critical infrastructures – they’re also actively seeking trade secrets. New battle lines have been drawn across the world, and organisations need to tool up accordingly.

The recently released Verizon Data Breach Investigations Report (VDBIR) is an eye-catching case in point, noting a sharp uptick in nation-state attacks, rising from 12% of all analysed breaches to 23% in the past year. 25% of breaches are currently influenced by cyber espionage, rising from 13%.

Hackers’ goals

Further research compiled by the Swedish Security and Defence Industry Association (SOFF) echoes VDBIR’s 25% espionage figure, but also breaks the issue down by sector.

Remarkably, 94% of all attacks currently aimed at the manufacturing industry are motivated by espionage, usually with the intent to steal trade secrets or sabotage plants. As an example – and a mere tip of the iceberg – Norwegian software firm Visma recently revealed that it had been targeted by hackers from the Chinese Ministry of State Security attempting to steal trade secrets. In another notable instance, Boeing revealed that, between 2009 and 2014, Chinese hackers were able to gain network access to steal 65 gigabytes of data on military aircrafts. The nature and style of the attack come as no surprise. Manufacturing – along with public administration and educational services – tend to aggregate large volumes of attractive, highly sensitive data.

SOFF predicts that security researchers now spend 90% of their time looking into espionage-based targeted attacks. Ten years ago, they would spend similar amounts of time focusing on criminal campaigns.

The financial impact associated with data breaches, espionage-based or not, are too consequential for organisations to ignore. SOFF also adds that it is worth understanding how 90% of the impacts caused by a cyberattack tend to be hidden (beyond the obvious outlay for mitigation, customer notification or legal action).

The techniques

In the last year alone, recent Infosec analysis shows an explosion of underground hacker marketplaces on the dark web. There are at least 300 hacker communities in existence, some with as many as half a million registered users, all packed to the gills with resources and disruptive tips.

In another alarming trend, hackers acting on behalf of nation-states are also increasingly carrying out zero-day attacks. Cybersecurity Ventures research predicts there will be one zero-day attack a day by 2021. Unfortunately, a zero-day attack is the first instance of a vulnerability being exploited so, if adequate defences aren’t in place, organisations will have a messy clean-up operation on their hands.

Another favoured technique is phishing, whereby attackers trick employees into providing their credentials and log-in details via fraudulent emails and communication. Recent analysis from PhishMe found that phishing emails are responsible for 91% of cyber-attacks – a concerning trend, but one that could soon be reversed with adequate training mechanisms.

How to stay one step ahead

The number of state sponsored attacks is only going to rise with the imminent impacts of trends like 5G and IoT. New attack surfaces are always expanding for switched on cybercriminals.

As you’d expect, a range of new technologies are emerging to aid the fightback. For example, AI solutions are being developed that can analyse all traffic in real-time to spot unusual behaviours and anomalies previously out of sight. These types of AI are explicitly designed to understand how traffic is meant to function, automatically flagging problems as they occur.

Whatever the technology mix looks like, both now and into the future, there will always be a need to apply security at every level and on every surface: endpoint, application, and infrastructure. Applications require consistent, intelligent and adaptable policies wherever they reside (on-premises, in the cloud or in a multi-cloud environment). Protecting perimeters is no longer enough.

Modern authentication techniques, such as the principle of least privilege and two-factor authentication, should become the norm. As ever, organisations should constantly review and update security settings and tools, running regular penetration tests to monitor and improve staff behaviour. Organisations also need to control wayward BYOD activity and ensure all staff are equipped with the tools they need to do they jobs safely. It is a dangerous world out there. Pre-emption, prevention and continuous education are the ways ahead.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

From prevention to protection
News & Events Fire & Safety
The Western Cape’s varied landscapes and rapid urban development present a range of fire safety challenges, from densely populated city centres to remote industrial sites, and from heritage buildings to new high-rise developments.

Read more...
ProtecLink 2025 spotlights industry tensions and transformation
Security Services & Risk Management News & Events
ProtecLink 2025, created and hosted by Ithegi Electronics, brought together key stakeholders from the security, finance, and innovation sectors under the theme "Connecting Security, Finance, and Innovation: Inspiring Transformation in the Industry."

Read more...
SSG Holdings acquired by Fidelity Services Group
News & Events Security Services & Risk Management
Fidelity Services Group has successfully acquired a majority shareholding in SSG Holdings. The acquisition builds on Fidelity’s track record of strategic expansion, including previous high-profile acquisitions.

Read more...
SafeQuip issues certification update notice
Fire & Safety News & Events
SafeQuip has confirmed that the Lith-Ex range of fire extinguishers is the only certified lithium-ion battery fire extinguisher range in South Africa.

Read more...
Securex South Africa offers tailored solutions
News & Events
Cape Town’s thriving tech ecosystem makes it the ideal host for the inaugural Securex South Africa Cape Town event, taking place from 21 to 23 October 2025 at the Cape Town International Convention Centre (CTICC).

Read more...
AttackIQ enters South Africa with key appointment
Information Security News & Events
AttackIQ, a provider of continuous security validation and exposure management, has announced its entry into the South African market with the appointment of Luke Cifarelli as its country manager.

Read more...
Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
From the Editor's desk: The good, the bad, and the victims
News & Events
When the Internet first arrived, everyone was expecting amazing things from it, well, everyone who knew what it was and how it worked. We had the dotcom boom and bust, and it’s fair to say that if we ...

Read more...
Carrier rebranded Kidde Global Solutions
News & Events Fire & Safety
From July 2025, the former Carrier Fire & Security South Africa will operate under its new name, Kidde Fire & Security South Africa, as part of the global realignment of the commercial and residential fire and security business.

Read more...
Facilities Management Expo brings smart, secure operations to the Cape
News & Events Facilities & Building Management
As organisations across South Africa navigate the challenges of ageing infrastructure and increased cyber-physical risks, integrated facilities management (FM) solutions have become critical to ensuring operational resilience.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.