News

12:19 PM
Connect Directly
RSS
E-Mail
50%
50%

Security Specialists Support Cyberwarfare

Two-thirds of information security aficionados back government-promulgated online spying, hacking, or surreptitious malware installs, finds Sophos.

"Nuke 'em."

That's the surprising -- albeit paraphrased -- finding of a recent survey conducted by Sophos, asking information security aficionados for their perspective on so-called cyberwarfare, and whether or not they think nation states have a right to spy on or attack each other online.

The survey results were detailed by Sophos Tuesday in a report outlining information security trends for the first half of 2010.

Interestingly, nearly two-thirds of the more than 1,000 people surveyed -- visitors to the Sophos website, all -- think that government-backed online spying, hacking, or surreptitious malware installs are acceptable.

In addition, 49% of respondents think that "crippling denial of service attacks against another country's communication or financial websites" is okay during wartime, and 7% think it's acceptable during peacetime, too. Furthermore, 9% say their country should be able to hack into foreign companies and spy -- for economic advantage -- during peacetime, jumping to 32% during wartime.

The Sophos survey theme was sparked by the prevalence of attacks in the first half of 2010 which may have been government-initiated, such as Operation Aurora, in which Google accused Chinese hackers of infiltrating its systems to hack the e-mail accounts of Chinese human rights activists.

A related trend has been "the actions of so-called hacktivists, who are sympathetic to the goals of certain nations, but who act semi-independently of them," said Richard Wang, manager of SophosLabs U.S. These groups' activities may include hacking into Twitter pages or defacing websites, which is what a group calling itself the Iranian Cyber Army did to a Chinese search engine in January. "Now, it's unclear whether that's directly related to the nation of Iran, or if it's just people sympathetic to their position," said Wang. Same goes for Aurora.

Popular opinion aside, that known unknown highlights the difficulty of any "strike back" cyberwarfare doctrine. Namely, correctly identifying an attacker is often impossible.

"Even if you can trace the machine attacking you, it's very likely not going to be owned by the person who's attacking you. No one's going to be using their own PC for this type of activity," said Wang. Indeed, why not just rent a botnet?

The same goes for malware distribution. Here, the United States leads the world, with 42% of all malware originating from the U.S., versus just 11% from the closest competitor, China, followed by Russia (6%), Germany (5%), and France (4%), according to Sophos.

Why does so much malware come from the United States? "If the hackers are trying to attack people for financial gain, then they want to be looking for people in the most affluent areas," said Wang. Furthermore, attackers often try to hack websites and PCs local to their targets. But most malware emanates from compromised PCs and servers, and while they may overwhelmingly target U.S. residents, they're also attacking PCs and servers outside the country.

Comment  | 
Print  | 
More Insights
Cartoon
Slideshows
Audio Interviews
Archived Audio Interviews
Jeremy Schulman, founder of Schprockits, a network automation startup operating in stealth mode, joins us to explore whether networking professionals all need to learn programming in order to remain employed.
White Papers
Register for Network Computing Newsletters
Current Issue
2014 State of Unified Communications
2014 State of Unified Communications
If you thought consumerization killed UC, think again: 70% of our 488 respondents have or plan to put systems in place. Of those, 34% will roll UC out to 76% or more of their user base. And there’s some good news for UCaaS providers.
Video
Twitter Feed