Share to: share facebook share twitter share wa share telegram print page

Cyberweapon

Cyberweapons are commonly defined as malware agents employed for military, paramilitary, or intelligence objectives as part of a cyberattack. This includes computer viruses, trojans, spyware, and worms that can introduce malicious code into existing software, causing a computer to perform actions or processes unintended by its operator.

Characteristics

A cyberweapon is usually sponsored or employed by a state or non-state actor, meets an objective that would otherwise require espionage or the use of force, and is employed against specific targets. A cyberweapon performs an action that would normally require a soldier or spy, and which would be considered either illegal or an act of war if performed directly by a human agent of the sponsor during peacetime. Legal issues include violating the privacy of the target and the sovereignty of its host nation.[1] Example of such actions are surveillance, data theft and electronic or physical destruction. While a cyberweapon almost certainly results in either direct or indirect financial damages to the target group, direct financial gains for the sponsor are not a primary objective of this class of agent. Often cyberweapons are associated with causing physical or functional harm to the system which it attacks, despite being software.[2] However, there is no consensus on what officially constitutes a cyberweapon.[2]

Unlike malware used by script kiddies to organize botnets, where the ownership, physical location, and normal role of the machines attacked is largely irrelevant, cyberweapons show high selectivity in either or both of their employment and their operation. Before the attack, cyberweapons usually identify the target using different methods.[3] Likewise, malware employed by fraudsters for the theft of personal or financial information demonstrates lower selectivity and wider distribution.

Cyberweapons are dangerous for multiple reasons. They are typically difficult to track or defend against due to their lack of physical components.[2] Their anonymity allows them to hide in systems undetected until their attack is unleashed.[4] Many of these attacks exploit "zero days" (vulnerabilities in software that companies have zero days to fix).[4] They are also significantly cheaper to produce than cyber defenses to protect against them.[4] Oftentimes, cyberweapons from one force are obtained by an opposing force and are then repurposed to be used against the original force, as can be seen with the cyberweapons WannaCry[5] and NotPetya.[6]

While the term cyber weapon is frequently used by the press,[7][8] some articles avoid it, instead using terms such as "internet weapon", "hack", or "virus".[9] Mainstream researchers debate the requirements of the term while still referring to the employment of the agent as a "weapon",[10] and the software development community in particular uses the term more rarely.

Examples

The following malware agents generally meet the criteria above, have been formally referred to in this manner by industry security experts, or have been described this way in government or military statements:

History

Stuxnet was among the first and one of the most influential cyberweapons.[2][11] In 2010, it was launched by the United States and Israel to attack Iranian nuclear facilities.[11][12] Stuxnet is considered to be the first major cyberweapon.[11] Stuxnet was also the first time a nation used a cyberweapon to attack another nation.[13] Following the Stuxnet attacks, Iran used cyberweapons to target top American financial institutions, including the New York Stock Exchange.[14]

Stuxnet was subsequently followed by Duqu in 2011 and Flame in 2012.[11] Flame's complexity was unmatched at the time.[1] It used vulnerabilities in Microsoft Windows to spread.[3] It specifically targeted Iranian oil terminals.[7]

In 2017 data breaches showed that supposedly secure hacking tools used by government agencies can be obtained − and sometimes exposed − by third parties. Furthermore, it was reported that after losing control of such tools the government appears to leave "exploits open to be re-used by scammers, criminals, or anyone else − for any purpose".[15] Claudio Guarnieri, a technologist from Amnesty International states: "what we learn from the disclosures and leaks of the last months is that unknown vulnerabilities are maintained secret even after they've been clearly lost, and that is plain irresponsible and unacceptable".[15]

Also in that year WikiLeaks released the Vault 7 documents series that contain details of CIA exploits and tools with Julian Assange stating that they are working to "disarm" them before publication.[16][17] Disarmament of cyber weapons may come in the form of contacting respective software vendors with information of vulnerabilities in their products as well as potential help with or autonomous development (for open source software) of patches. The exploitation of hacking tools by third parties has particularly affected the United States National Security Agency (NSA). In 2016, information about NSA hacking tools was captured by a Chinese hacking group, ATP3, that allowed them to reverse engineer their own version of the tool. It was subsequently used against European and Asian nations, though the United States was not targeted.[18][19] Later that year, an anonymous group called the "Shadow Brokers" leaked what are widely believed to be NSA tools online.[19][20] These two groups are not known to be affiliated, and ATP3 had access to the tools at least a year before the Shadow Brokers leak.[19] The leaked tools were developed by the Equation Group, a cyberwarfare group with suspected ties to the NSA.[19]

Among the tools leaked by the Shadow Brokers was EternalBlue, which the NSA had used to exploit bugs in Microsoft Windows.[5] This prompted Microsoft to issue updates to guard against the tool.[8] When the Shadow Brokers publicly released EternalBlue, it was quickly used by North Korean and Russian hackers, who formed it into the ransomware WannaCry[5] and NotPetya,[6] respectively. NotPetya, which was initially launched in Ukraine but subsequently spread around the world, encrypted hard drives and forced users to pay a ransom fee for their data, despite never actually giving the data back.[6][9]

In September 2018, the United States Department of Defense officially confirmed that the United States uses cyberweapons to advance national interests.[14]

Potential Regulations

While there has been no full regulation of cyberweapons, possible systems of regulation have been proposed.[2] One system would have cyberweapons, when not being used by a state, subject to criminal law of the country and, when being used by a state, subject to international laws on warfare.[2] Most proposed systems rely on international law and enforcement to stop the inappropriate use of cyberweaponry.[2] Considering the novelty of the weapons, there has also been discussion about how previously existing laws, not designed with cyberweapons in mind, apply to them.[2]

See also

References

  1. ^ a b Downes, Cathy (2018). "Strategic Blind–Spots on Cyber Threats, Vectors and Campaigns". The Cyber Defense Review. 3 (1): 79–104. ISSN 2474-2120. JSTOR 26427378.
  2. ^ a b c d e f g h Stevens, Tim (2017-01-10). "Cyberweapons: an emerging global governance architecture". Palgrave Communications. 3 (1): 1–6. doi:10.1057/palcomms.2016.102. ISSN 2055-1045. S2CID 55150719.
  3. ^ a b "Cyber Weapon Target Analysis". 2014-05-26.
  4. ^ a b c Tepperman, Jonathan (2021-02-09). "The Most Serious Security Risk Facing the United States". The New York Times. ISSN 0362-4331. Retrieved 2022-05-05.
  5. ^ a b c Nakashima, Ellen; Timberg, Craig (2017-05-16). "NSA officials worried about the day its potent hacking tool would get loose. Then it did". The Washington Post. Retrieved 2022-05-09.
  6. ^ a b c Brandom, Russell (2017-06-27). "A new ransomware attack is hitting airlines, banks and utilities across Europe". The Verge. Retrieved 2022-05-09.
  7. ^ a b "Powerful 'Flame' Cyberweapon Torching Mideast Computers : Discovery News". News.discovery.com. 2012-05-30. Archived from the original on 2012-06-01. Retrieved 2012-12-07.
  8. ^ a b "Infosecurity – 2012: The Year Malware Went Nuclear". Infosecurity-magazine.com. 5 December 2012. Retrieved 2012-12-07.
  9. ^ a b Perlroth, Nicole (2012-05-28). "Virus Infects Computers Across Middle East - NYTimes.com". Iran: Bits.blogs.nytimes.com. Retrieved 2012-12-07.
  10. ^ "Infosecurity – Kaspersky looks at the wreckage of Wiper malware". Infosecurity-magazine.com. 2012-08-29. Retrieved 2012-12-07.
  11. ^ a b c d Farwell, James P.; Rohozinski, Rafal (2012-09-01). "The New Reality of Cyber War". Survival. 54 (4): 107–120. doi:10.1080/00396338.2012.709391. ISSN 0039-6338. S2CID 153574044.
  12. ^ Farwell, James P.; Rohozinski, Rafal (2011-02-01). "Stuxnet and the Future of Cyber War". Survival. 53 (1): 23–40. doi:10.1080/00396338.2011.555586. ISSN 0039-6338. S2CID 153709535.
  13. ^ Dooley, John F. (2018), Dooley, John F. (ed.), "Cyber Weapons and Cyber Warfare", History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms, History of Computing, Cham: Springer International Publishing, pp. 213–239, doi:10.1007/978-3-319-90443-6_13, ISBN 978-3-319-90443-6, retrieved 2022-05-05
  14. ^ a b "How Cyber Weapons Are Changing the Landscape of Modern Warfare". The New Yorker. 2019-07-18. Retrieved 2022-05-05.
  15. ^ a b Cox, Joseph (14 April 2017). "Your Government's Hacking Tools Are Not Safe". Motherboard. Retrieved 15 April 2017.
  16. ^ Fox-Brewster, Thomas. "Julian Assange: Wikileaks May Have Evidence CIA Spied On US Citizens". Forbes. Retrieved 15 April 2017.
  17. ^ "WikiLeaks vows to disclose CIA hacking tools; CIA to investigate". SearchSecurity. Retrieved 15 April 2017.
  18. ^ Perlroth, Nicole; Sanger, David E.; Shane, Scott (2019-05-06). "How Chinese Spies Got the N.S.A.'s Hacking Tools, and Used Them for Attacks". The New York Times. ISSN 0362-4331. Retrieved 2022-05-05.
  19. ^ a b c d Doffman, Zak. "China Set Traps To Capture Dangerous NSA Cyberattack Weapons: New Report". Forbes. Retrieved 2022-05-05.
  20. ^ Pagliery, Jose (2016-08-15). "Hacker claims to be selling stolen NSA spy tools". CNNMoney. Retrieved 2022-05-05.

External links

Read more information:

Alexander Stephen and SonsCompany typePrivateIndustryShipbuilding & EngineeringFounded1750Defunct1982FateLiquidatedHeadquartersLinthouse, Glasgow, Scotland Alexander Stephen and Sons Limited, often referred to simply as Alex Stephens or just Stephens, was a Scottish shipbuilding company based in Linthouse, Glasgow, on the River Clyde and, initially, on the east coast of Scotland. History The red brick former offices of Alexander Stephen and Sons are situated on Holmfauld Road adjacent to the…

Liga Champions Wanita UEFA 2020–21Tempat pertandingan final di Gamla Ullevi, GothenburgInformasi turnamenJadwalpenyelenggaraanBabak kualifikasi:3–19 November 2020Babak gugur:8 Desember 2020 – 16 Mei 2021Jumlahtim pesertaBabak gugur: 32Total: 62 (dari 50 asosiasi)Hasil turnamenJuara Barcelona (gelar ke-1)Tempat kedua ChelseaStatistik turnamenJumlahpertandingan89Jumlah gol318 (3,57 per pertandingan)Jumlahpenonton2.576 (29 per pertandingan)Pemain terbaik Kiper: Sandra Paños (B…

Questa voce o sezione sull'argomento tennisti tedeschi non cita le fonti necessarie o quelle presenti sono insufficienti. Puoi migliorare questa voce aggiungendo citazioni da fonti attendibili secondo le linee guida sull'uso delle fonti. Michael Stich Nazionalità  Germania Altezza 193 cm Peso 79 kg Tennis Termine carriera 1997 Carriera Singolare1 Vittorie/sconfitte 385 - 176 (68.63%) Titoli vinti 18 Miglior ranking 2º (22 novembre 1993) Risultati nei tornei del Grande Slam  Aust…

  هذه المقالة عن تنظيم الإخوان المسلمين. لحركة الإخوان في السعودية، طالع إخوان من أطاع الله. لعناوين اخرى، طالع الإخوان (توضيح). الإخوان المسلمونالشعارالعلمالتأسيسالنوع منظمة دينية — منظمة دولية — حزب سياسي — حركة إسلامية المقر الرئيسي غير مركزي التأسيس 22 مارس 1928 الش…

Partai Rakyat Malaysia Nama dalam bahasa MalayParti Rakyat Malaysiaڤرتي رعيت مليسياNama dalam bahasa Chinese馬來西亞人民黨马来西亚人民党Mǎláixīyǎ rénmín dǎngNama dalam bahasa Tamilமலேசிய மக்கள் கட்சிMalēciya makkaḷ kaṭciSingkatanPRMPresidenRohana AriffinSekretaris JenderalRN RajahDeputi PresidenMohd Ezam Mohd NorWakil PresidenTan Chow Kang S. Manikavasagam Sarah Afiqah Zainol AriffKetua InformasiTan Kang YapPendiriAhmad Bo…

Sebuah netsuke Jepang abad ke-19 dalam bentuk monyet berdansa Monyet dan Rubah adalah salah satu Fabel Aesop dan bernomor 81 dalam Perry Index.[1] Cerita dan persebarannya Para hewan berkumpul untuk memilih raja dan terkagum oleh kemampuan loncat dari monyet sehingga mereka memahkotainya. Rubah menjadi salah satu kontestannya dan sekarang menjadi salah satu abdinya. Saat menghadap monyet, rubah berkata bahwa ia menemukan suatu hal untuk santapan kerajaan dan membawanya ke sebuah perangka…

Way of categorizing the ethical and moral perspective of characters in various role-playing games This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages) This article possibly contains original research. Please improve it by verifying the claims made and adding inline citations. Statements consisting only of original research should be removed. (February 2010) (Learn how and when to remove this temp…

Artikel ini sebatang kara, artinya tidak ada artikel lain yang memiliki pranala balik ke halaman ini.Bantulah menambah pranala ke artikel ini dari artikel yang berhubungan atau coba peralatan pencari pranala.Tag ini diberikan pada Januari 2023. SD Budhaya II Santo AgustinusSekolah Dasar Budhaya II Santo AgustinusInformasiJenisSwastaNomor Statistik Sekolah20109124Nomor Pokok Sekolah Nasional100105135Jumlah siswa533 2010StatusAktifAlamatLokasiJl. Perumnas Raya Buaran, Duren Sawit, Jakarta Tim…

Tour de Lombardie 2017 GénéralitésCourse111e Tour de LombardieCompétitionUCI World Tour 2017 1.UWTDate7 octobre 2017Distance247 kmPays ItalieLieu de départBergameLieu d'arrivéeCômeÉquipes25Partants199Arrivants100Vitesse moyenne39,469 km/hRésultatsVainqueur Vincenzo Nibali (Bahrain-Merida)Deuxième Julian Alaphilippe (Quick-Step Floors)Troisième Gianni Moscon (Sky) ◀20162018▶Documentation La 111e édition du Tour de Lombardie a lieu le 7 octobre 2017. Elle fait partie du c…

العلاقات الوسط أفريقية الناميبية جمهورية أفريقيا الوسطى ناميبيا   جمهورية أفريقيا الوسطى   ناميبيا تعديل مصدري - تعديل   العلاقات الوسط أفريقية الناميبية هي العلاقات الثنائية التي تجمع بين جمهورية أفريقيا الوسطى وناميبيا.[1][2][3][4][5] مقارنة …

Head of government of the Philippines from 1978 to 1986 Prime Minister of the PhilippinesPunong Ministro ng PilipinasSeal of the prime minister (1981–1986)Salvador LaurelLast prime minister of the PhilippinesStylePrime Minister(informal)The Honourable(formal)His Excellency(formal, diplomatic)StatusHead of government (abolished)Member ofCabinetNominatorThe PresidentAppointerThe President(1899)Batasang Pambansawith members' advice and consent (1978-1986)PrecursorOffice established (pre-1899)Pres…

Indian film director Sooraj R. BarjatyaBorn (1965-02-22) 22 February 1965 (age 59)Mumbai, Maharashtra, IndiaOccupationFilmmakerYears active1979–presentSpouse Vineeta Barjatya ​(m. 1986)​Children3ParentRajkumar Barjatya (father)RelativesTarachand Barjatya (grandfather) Kavita K. Barjatya (cousin) Sooraj R. Barjatya (born 22 February 1965) is an Indian filmmaker who works in Hindi cinema.[1] He has directed and produced some of the most commercially…

Neighborhood in Manhattan, New York City For the hamlet in upstate New York, see Rose Hill, New York. 40°44′31″N 73°58′59″W / 40.742°N 73.983°W / 40.742; -73.983 The 69th Regiment Armory on Lexington Avenue between 25th and 26th Streets Location in New York City Rose Hill is a neighborhood in the New York City borough of Manhattan,[1] between the neighborhoods of Murray Hill to the north and Gramercy Park to the south,[2] Kips Bay to the east, …

American baseball player (born 1984) Baseball player Nate SchierholtzSchierholtz with the San Francisco GiantsRight fielderBorn: (1984-02-15) February 15, 1984 (age 40)Reno, Nevada, U.S.Batted: LeftThrew: RightProfessional debutMLB: June 11, 2007, for the San Francisco GiantsNPB: April 19, 2015, for the Hiroshima Toyo CarpLast appearanceMLB: October 7, 2014, for the Washington NationalsNPB: September 12, 2015, for the Hiroshima Toy…

Breast ornament worn in Ancient Egypt Senusret II's pectoral, by 1878 BC. Hieroglyphs: Ankh, Huh (god)-(=millions), Shen ring, scarab, Ra, Water Ripple, Sun-rising hieroglyph, uraeus The pectorals of ancient Egypt were a form of jewelry, often in the form of a brooch. They are often also amulets, and may be so described. They were mostly worn by richer people and the pharaoh. One type is attached with a nah necklace, suspended from the neck and lying on the breast. Statuary from the Old Kingdom …

Serie D 2022-2023 Competizione Serie D Sport Calcio Edizione 75ª Organizzatore Lega Nazionale DilettantiDipartimento Interregionale Date dal 3 settembre 2022al 7 maggio 2023 Luogo  Italia Partecipanti 166 Formula 9 gironi con play-off Sito web http://seried.lnd.it/it/serie-d Risultati Vincitore Sestri Levante(1º titolo) Altre promozioni LumezzaneLegnagoGiana ErminioArezzoPinetoSorrentoBrindisiCataniaCasertana Retrocessioni Castanese, Stresa Vergante, Casale, Fossano; Seregno, Citt…

Ираклеониты — ученики гностика Ираклеона (II век). Упоминаются как особая секта Епифанием и Августином; при крещении и миропомазании они соблюдали обряд помазания елеем и при этом произносили воззвания на арамейском языке, которые должны были освободить душу от власти …

Drinking game This article possibly contains original research. Please improve it by verifying the claims made and adding inline citations. Statements consisting only of original research should be removed. (October 2018) (Learn how and when to remove this message) Beer DieOther namesSnappaPlayersTwo vs. twoSetup time2 minutesPlaying time30 minutes to 2 hoursSkillsaccuracy, hand–eye coordination, reaction timeMaterials requiredPlywood table, pint glasses or solo cups, diceAlcohol usedBeer Beer…

Welsh socialite (1946–2009) For other people named David Llewellyn, see David Llewellyn (disambiguation). SirDai LlewellynBtLlewellyn at the Cardiff North election count in 2007Born(1946-04-02)2 April 1946Died13 January 2009(2009-01-13) (aged 62)Spouse Vanessa Hubbard ​(m. 1980)​Children2, including Olivia LlewellynParentsHarry Llewellyn (father)Christine Saumarez (mother) Sir David St Vincent Dai Llewellyn, 4th Baronet (2 April 1946 – 13 January 2009), was …

1964 film directed by Stanley Kubrick Dr. Strangelove or: How I Learned to Stop Worrying and Love the BombTheatrical release poster by Tomi UngererDirected byStanley KubrickScreenplay by Stanley Kubrick Terry Southern Peter George Based onRed Alertby Peter GeorgeProduced byStanley KubrickStarring Peter Sellers George C. Scott Sterling Hayden Keenan Wynn Slim Pickens Tracy Reed CinematographyGilbert TaylorEdited byAnthony HarveyMusic byLaurie JohnsonProductioncompanyHawk FilmsDistributed byColumb…

Kembali kehalaman sebelumnya