Cyberweapon

Source: Wikipedia, the free encyclopedia.

Cyberweapons are commonly defined as malware agents employed for military, paramilitary, or intelligence objectives as part of a cyberattack. This includes computer viruses, trojans, spyware, and worms that can introduce malicious code into existing software, causing a computer to perform actions or processes unintended by its operator.

Characteristics

A cyberweapon is usually sponsored or employed by a

act of war if performed directly by a human agent of the sponsor during peacetime. Legal issues include violating the privacy of the target and the sovereignty of its host nation.[1] Example of such actions are surveillance, data theft and electronic or physical destruction. While a cyberweapon almost certainly results in either direct or indirect financial damages to the target group, direct financial gains for the sponsor are not a primary objective of this class of agent. Often cyberweapons are associated with causing physical or functional harm to the system which it attacks, despite being software.[2] However, there is no consensus on what officially constitutes a cyberweapon.[2]

Unlike malware used by script kiddies to organize botnets, where the ownership, physical location, and normal role of the machines attacked is largely irrelevant, cyberweapons show high selectivity in either or both of their employment and their operation. Before the attack, cyberweapons usually identify the target using different methods.[3] Likewise, malware employed by fraudsters for the theft of personal or financial information demonstrates lower selectivity and wider distribution.

Cyberweapons are dangerous for multiple reasons. They are typically difficult to track or defend against due to their lack of physical components.

NotPetya.[6]

While the term cyber weapon is frequently used by the press,[7][8] some articles avoid it, instead using terms such as "internet weapon", "hack", or "virus".[9] Mainstream researchers debate the requirements of the term while still referring to the employment of the agent as a "weapon",[10] and the software development community in particular uses the term more rarely.

Examples

The following malware agents generally meet the criteria above, have been formally referred to in this manner by industry security experts, or have been described this way in government or military statements:

History

Stuxnet was among the first and one of the most influential cyberweapons.[2][11] In 2010, it was launched by the United States and Israel to attack Iranian nuclear facilities.[11][12] Stuxnet is considered to be the first major cyberweapon.[11] Stuxnet was also the first time a nation used a cyberweapon to attack another nation.[13] Following the Stuxnet attacks, Iran used cyberweapons to target top American financial institutions, including the New York Stock Exchange.[14]

Stuxnet was subsequently followed by Duqu in 2011 and Flame in 2012.[11] Flame's complexity was unmatched at the time.[1] It used vulnerabilities in Microsoft Windows to spread.[3] It specifically targeted Iranian oil terminals.[7]

In 2017 data breaches showed that supposedly secure hacking tools used by government agencies can be obtained − and sometimes exposed − by third parties. Furthermore, it was reported that after losing control of such tools the government appears to leave "exploits open to be re-used by scammers, criminals, or anyone else − for any purpose".[15] Claudio Guarnieri, a technologist from Amnesty International states: "what we learn from the disclosures and leaks of the last months is that unknown vulnerabilities are maintained secret even after they've been clearly lost, and that is plain irresponsible and unacceptable".[15]

Also in that year

open source software) of patches. The exploitation of hacking tools by third parties has particularly affected the United States National Security Agency (NSA). In 2016, information about NSA hacking tools was captured by a Chinese hacking group, ATP3, that allowed them to reverse engineer their own version of the tool. It was subsequently used against European and Asian nations, though the United States was not targeted.[18][19] Later that year, an anonymous group called the "Shadow Brokers" leaked what are widely believed to be NSA tools online.[19][20] These two groups are not known to be affiliated, and ATP3 had access to the tools at least a year before the Shadow Brokers leak.[19] The leaked tools were developed by the Equation Group, a cyberwarfare group with suspected ties to the NSA.[19]

Among the tools leaked by the Shadow Brokers was

NotPetya,[6] respectively. NotPetya, which was initially launched in Ukraine but subsequently spread around the world, encrypted hard drives and forced users to pay a ransom fee for their data, despite never actually giving the data back.[6][9]

In September 2018, the United States Department of Defense officially confirmed that the United States uses cyberweapons to advance national interests.[14]

Potential Regulations

While there has been no full regulation of cyberweapons, possible systems of regulation have been proposed.[2] One system would have cyberweapons, when not being used by a state, subject to criminal law of the country and, when being used by a state, subject to international laws on warfare.[2] Most proposed systems rely on international law and enforcement to stop the inappropriate use of cyberweaponry.[2] Considering the novelty of the weapons, there has also been discussion about how previously existing laws, not designed with cyberweapons in mind, apply to them.[2]

See also

References

  1. ^
    JSTOR 26427378
    .
  2. ^ .
  3. ^ a b "Cyber Weapon Target Analysis". 2014-05-26.
  4. ^
    ISSN 0362-4331
    . Retrieved 2022-05-05.
  5. ^ a b c Nakashima, Ellen; Timberg, Craig (2017-05-16). "NSA officials worried about the day its potent hacking tool would get loose. Then it did". The Washington Post. Retrieved 2022-05-09.
  6. ^ a b c Brandom, Russell (2017-06-27). "A new ransomware attack is hitting airlines, banks and utilities across Europe". The Verge. Retrieved 2022-05-09.
  7. ^ a b "Powerful 'Flame' Cyberweapon Torching Mideast Computers : Discovery News". News.discovery.com. 2012-05-30. Archived from the original on 2012-06-01. Retrieved 2012-12-07.
  8. ^ a b "Infosecurity – 2012: The Year Malware Went Nuclear". Infosecurity-magazine.com. 5 December 2012. Retrieved 2012-12-07.
  9. ^ a b Perlroth, Nicole (2012-05-28). "Virus Infects Computers Across Middle East - NYTimes.com". Iran: Bits.blogs.nytimes.com. Retrieved 2012-12-07.
  10. ^ "Infosecurity – Kaspersky looks at the wreckage of Wiper malware". Infosecurity-magazine.com. 2012-08-29. Retrieved 2012-12-07.
  11. ^
    S2CID 153574044
    .
  12. .
  13. , retrieved 2022-05-05
  14. ^ a b "How Cyber Weapons Are Changing the Landscape of Modern Warfare". The New Yorker. 2019-07-18. Retrieved 2022-05-05.
  15. ^ a b Cox, Joseph. "Your Government's Hacking Tools Are Not Safe". Motherboard. Retrieved 15 April 2017.
  16. ^ Fox-Brewster, Thomas. "Julian Assange: Wikileaks May Have Evidence CIA Spied On US Citizens". Forbes. Retrieved 15 April 2017.
  17. ^ "WikiLeaks vows to disclose CIA hacking tools; CIA to investigate". SearchSecurity. Retrieved 15 April 2017.
  18. ISSN 0362-4331
    . Retrieved 2022-05-05.
  19. ^ a b c d Doffman, Zak. "China Set Traps To Capture Dangerous NSA Cyberattack Weapons: New Report". Forbes. Retrieved 2022-05-05.
  20. ^ Pagliery, Jose (2016-08-15). "Hacker claims to be selling stolen NSA spy tools". CNNMoney. Retrieved 2022-05-05.

External links