More than 90 percent of respondents in a Tripwire survey in Europe expect attacks by state-sponsored threat actors to increase in the next 12 months.
Incidents like last year’s WannaCry attacks by suspected North Korean threat actors and the more recent news about Russian hackers taking control of hundreds of thousands of network routers worldwide have clearly spooked the enterprise infosec community.
Security vendor Tripwire surveyed attendees at Infosecurity Europe 2018 in London earlier this month and found 83% of the 416 respondents saying they expected nation-state attacks against critical infrastructure targets in Europe to increase in the next 12 months.
The same proportion of respondents expected the attacks would go beyond espionage and cause service disruptions and actual physical harm to the victim organizations. Recent news about malware campaigns like Triton/Trisis and Industroyer/CrashOverride appear to be feeding those fears, Tripwire said in a blog announcing survey results.
More than 9-in-10 of the respondents—93%—expected an overall increase in attacks led by state-sponsored actors.
The results are unsurprising considering all the recent attacks and news worldwide involving state-sponsored threats, says Tim Erlin, vice president of product management and strategy at Tripwire.
Just in May for instance, the FBI disclosed that Russian persistent threat actor, the Sofacy group, had managed to infect more than 500,000 home-office routers and network attached storage devices worldwide with malware for remotely controlling them. Many security experts have expressed concern that infected devices could be used to launch DDoS and other attacks against organizations worldwide.
Similarly, last December’s news that a threat actor had used a highly sophisticated malware tool dubbed Triton/Trisis to disrupt operations at a critical infrastructure facility in the Middle East, has stoked widespread concern about cyberattacks causing massive physical damage. In a survey that Dimensional Security conducted for Tripwire earlier this year, 70% of 151 respondents from energy and oil and gas companies expressed worry about cyberattacks causing catastrophic physical harm, such as explosions, at their facilities.
“The main takeaway from these survey results is that organizations are increasingly concerned about nation-state attacks,” Erlin says. Many are making specific investments to defend against the growing threats, he says. Forty-four percent of the respondents in Tripwire’s survey for instance said that malware like Triton/Trisis and Industroyer/Crashoverride used in attacks against Ukraine’s electric grid, had driven increases in ICS security spending.
Concerns over nation-state attacks are certainly not limited to Europe. A similarly high degree of apprehension over the threat exists among US companies and organizations elsewhere. “Many of them have been affected by notable attacks, and many more by less well-known or public incidents,” Erlin says. “Nation-state cyberattacks are not a geographically limited problem.”
Expectedly, critical infrastructure organizations are more concerned about the threat because of the potential impact of a successful attack, he says. “Other industries are also concerned, but their concerns are centered more around operational impact than safety,” Erlin notes.
Tripwire’s survey at Infosecurity Europe 2018 showed that many organizations are not just cognizant about the heightened threat activity but are responding to it as well. More than two-thirds, or 69%, said their organizations had stepped up efforts to defend against nation-state attacks over the past 12 months. The results also revealed a somewhat surprisingly high degree of confidence among respondents, with 22% saying they felt “very prepared” and 60% saying they felt “fairly prepared” to defend against nation-state attacks. A bare 18% said they were unprepared.
“It’s common for individuals to express confidence in their own defensive capabilities, while simultaneously expressing a lack of confidence in everyone else,” Erlin says. “The fact is that successful attacks continue to take place. Consistently and comprehensively implementing foundational security controls is the best way to reduce your risk.”