Home » Computer & Software » Hardware » FireEye Outlines Distinctive National and Regional Characteristics of Nation-State Driven Cyber Attacks
Ihren XING-Kontakten zeigen

FireEye Outlines Distinctive National and Regional Characteristics of Nation-State Driven Cyber Attacks

MILPITAS, CA — (Marketwired) — 09/30/13 — FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today-s new breed of cyber attacks, today announced the release of a report titled, “World War C: Understanding Nation-State Motives Behind Today-s Advanced Cyber Attacks” that describes the unique international and local characteristics of cyber attack campaigns waged by governments worldwide.

“Cyber weapons are being used as an advantage in real-world conflict,” said Kenneth Geers, senior global threat analyst, FireEye. “Regions have their own set of cyber weapons, which they will use to their advantage when it comes to a conflict or to help their allies. The world is at cyber war with attacks in every direction and location. Cyber shots are fired in peacetime for immediate geopolitical ends as well as to prepare for possible future kinetic attacks. Since attacks are localized and idiosyncratic, understanding the geopolitics of each region can aid in cyber defense.”

“The biggest challenge to deterring, defending against, or retaliating for cyber attacks is the problem of correctly identifying the perpetrator. Ballistic missiles come with return addresses,” said Prof. John Arquilla of the Naval Postgraduate School. “But computer viruses, worms, and denial of service attacks often emanate from behind a veil of anonymity. The best chance to pierce this veil comes with the skillful blending of forensic -back hacking- techniques with deep knowledge of others- strategic cultures and their geopolitical aims.”

Cyber attacks have already proven themselves as a low-cost, high-payoff way to defend national sovereignty and to project national power. The key characteristics for some of the regions include:

Home to large, bureaucratic hacker groups, such as the “Comment Crew” who pursues targets in high-frequency, brute-force attacks.

. These cyber attacks are more technically advanced and highly effective at evading detection.

. These cybercriminals are dynamic, often using creativity, deception, and social engineering to trick users into compromising their own computers.

. The most complex, targeted, and rigorously engineered cyber attack campaigns to date.

In addition, the report speculates factors that could change the world-s cyber security landscape in the near- to medium-term, including:

Outage of national critical infrastructure that is devastating enough to force threat actors to rethink the power of cyber attacks.

A cyber arms treaty could stem the use of cyber attacks.

Privacy concerns from the PRISM could restrain government-sponsored cyber attacks in the U.S. and globally.

New actors on the cyber stage, most notably — Brazil, Poland, and Taiwan.

Increased focus on developing evasion methods that bypass detection.

“A cyber attack, viewed outside of its geopolitical context, allows very little legal maneuvering room for the defending state,” Prof. Thomas Wingfield of the Marshall Center. “False flag operations and the very nature of the Internet make tactical attribution a losing game. However, strategic attribution — fusing all sources of intelligence on a potential threat — allows a much higher level of confidence and more options for the decision maker. And strategic attribution begins and ends with geopolitical analysis.”

To download the full report, please visit:

has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors, including Web, email, and files and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 1,100 customers across more than 40 countries, including over 100 of the Fortune 500.

© 2013 FireEye, Inc. All rights reserved. FireEye is a registered trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.

Stephanie Sibal
Highwire PR for FireEye

415-963-4174 ext. 28

You must be logged in to post a comment Login


Blogverzeichnis - Blog Verzeichnis bloggerei.de Blog Top Liste - by TopBlogs.de Bloggeramt.de blogoscoop