A surge in cyber attacks preceeded both the conflict in Ukraine and in Gaza,
new research has found - leading to suggestions that the technique could be
used to predict future fighting
Surges in cyber attacks could be used as an early warning system to predict
conflicts between countries, researchers from an internet security company
have found.
Before both the recent Gaza
conflict and the annexation of Crimea analysts noted a spike in "malware"
– malicious software – sending out messages.
"We can see the digital equivalent of troops on the border," said
Kevin Thompson, a threat analyst for FireEye – the security company which
carried out the research.
Many countries are now using malware to both gather intelligence and actively
attack targets in hostile countries.
"If the US, or Korea, or Japan was about to go to war, you would see a
bump in callbacks – it's just part and parcel of today's national security
undertakings," said Kenneth Geers, one of the researchers.
http://www.telegraph.co.uk/news/worldnews/middleeast/israel/11034421/Gaza-and-Crimea-conflicts-could-have-been-predicted-by-monitoring-cyber-attacks.html
FireEye analysed the amount of communications sent by malware programmes over
the past 18 months – using data collected from more than 5,000 corporate and
government clients around the world. They looked at the so-called "callback"
messages which malware sends once it is installed within a network, usually
to "phone home" and report its status to the controllers or
receive new commands.
And they discovered that, amid the millions of messages captured, there was a dramatic spike in malware signals in the lead-up to the conflict between Russia and Ukraine over the future of Crimea, and in the days before Israel's recent hostilities with Hamas in Gaza.
Now FireEye are hoping to extend their research to see whether there it still applies over a longer time frame.
"We'd like to look back at a whole year of data and try to correlate with all the world events in the same period," said Mr Thompson.
Stewart Rowles, assistant director for operations at KCS – a strategic intelligence firm – said that governments were increasingly monitoring surges in malware attacks to identify potential conflicts.
"Malware is not only used by fraudsters but also by governments and terrorist groups – who now devote significant resources to create legions of cyber warriors whose only function is to spy on rival powers," he told The Telegraph.
"Cyber espionage and, increasingly, cyber warfare are now such an integral part of any conflict that spikes in malware activity in a specific region are increasingly used by the world's intelligence services to identify 'hot spots' around the globe, which are likely to explode into conflict of some sort."
One of Israel's major infrastructure hubs was shut down by a cyber-attack last September, according to insiders. Haifa's Carmel Tunnels were targeted by a "Trojan" programme that nearly shut down the city, according to itproportal.com.
America has accused Iran of funding attacks on US energy infrastructure, and major energy companies.
Iran, in return, has accused the US and Israel of sending computer programmes to destroy their nuclear facilities.
And hackers based in or near Moscow have “systematically targeted” diplomats at embassies belonging to former Eastern Bloc countries around the world, according to internet security experts who have been tracking the activity for at least four years and recently revealed details.
And they discovered that, amid the millions of messages captured, there was a dramatic spike in malware signals in the lead-up to the conflict between Russia and Ukraine over the future of Crimea, and in the days before Israel's recent hostilities with Hamas in Gaza.
Now FireEye are hoping to extend their research to see whether there it still applies over a longer time frame.
"We'd like to look back at a whole year of data and try to correlate with all the world events in the same period," said Mr Thompson.
Stewart Rowles, assistant director for operations at KCS – a strategic intelligence firm – said that governments were increasingly monitoring surges in malware attacks to identify potential conflicts.
"Malware is not only used by fraudsters but also by governments and terrorist groups – who now devote significant resources to create legions of cyber warriors whose only function is to spy on rival powers," he told The Telegraph.
"Cyber espionage and, increasingly, cyber warfare are now such an integral part of any conflict that spikes in malware activity in a specific region are increasingly used by the world's intelligence services to identify 'hot spots' around the globe, which are likely to explode into conflict of some sort."
One of Israel's major infrastructure hubs was shut down by a cyber-attack last September, according to insiders. Haifa's Carmel Tunnels were targeted by a "Trojan" programme that nearly shut down the city, according to itproportal.com.
America has accused Iran of funding attacks on US energy infrastructure, and major energy companies.
Iran, in return, has accused the US and Israel of sending computer programmes to destroy their nuclear facilities.
And hackers based in or near Moscow have “systematically targeted” diplomats at embassies belonging to former Eastern Bloc countries around the world, according to internet security experts who have been tracking the activity for at least four years and recently revealed details.
http://www.telegraph.co.uk/news/worldnews/middleeast/israel/11034421/Gaza-and-Crimea-conflicts-could-have-been-predicted-by-monitoring-cyber-attacks.html