Nation-State Threat Actors & Consumer Protection
By Trellix · March 28, 2022
Today, Trellix released a new report: In the Crosshairs: Organizations and Nation-State Cyber Threats. This report takes a deep look into how organizations across sectors prepare for and respond to cybersecurity activity from cybercriminals and attacks sponsored by governments from all over the world.
To produce this report, Trellix worked with two great teams. Vanson Bourne conducted a detailed survey of 800 IT decisions makers in Australia, France, Germany, India, Japan, the United Kingdom and the United States, from a variety of industries. The Center for Strategic and International Studies (CSIS) then partnered with Trellix to distill the data collected from Vanson Bourne into this rich report which spans from organization and government needs to concrete cyber recommendations, and everything in between..
Nation-State Actors and Proxies
Trellix Threat Labs includes elite researchers who have been studying cybercriminal groups and nation-backed cyber activity for years, independently and in collaboration with global government agencies. When our Threat Labs leaders consider nation-state actors, they’re defined as:
Traditionally when we talk about threat actors, we first need to make the split between cybercrime and nation-state sponsored operations. Where cybercrime is mostly focused on financial gain, nation-state operations are often conducting strategic attacks to disrupt an adversary or in it for the long run, conducting intelligence operations to gain intellectual property to serve an economic or military goal.
As organizations prepare their cybersecurity strategies, risks to reputation and trust are at stake and consumer privacy should not be ignored. That said, this report found that only a third or organizations communicate with their customers about cyber incidents and that while 92 percent of respondents were willing to share information about an attack, they’re not always open to communications the full details, leaving potential gaps for consumer awareness and privacy issues.
Consumer Impact of Nation-State Cyber Actors
While Trellix sought to understand how organizations prepare to defend against nation-state backed cyberthreats and what improvements were needed, it also found that there is tangible impact to consumers – the everyday people using services and sharing their personally identifiable information (PII) online.
The report found that:
- Access to consumer data was the motive for state-backed cyber incidents for 48 percent of respondents who believe they have been the victims of a state-backed incident
- Only 33 percent of organizations reported reaching out to their customers to disclose a cybersecurity incident
- Forty-six percent of respondents believe the personally identifiable information (PII) they hold from their customers is one of the main factors for which they would be targeted in a future cyber attack
- Forty-one percent of respondents believe the PII they hold from their employees is one of the main factors for which they would be targeted in a future cyber attack
Organizations need to prepare to defend against nation-state backed cyberthreats, and improvement is needed in terms of how most organizations – regardless of sector – do this and ultimately ensure the safekeeping of consumer data.
While consumers on their own have limited ways to defend from nation-state and advanced cyber actors, using two-factor authentication and completing software updates on devices as soon as possible are important measures to take. Every connected device introduced into our homes increases the attack surface of our towns, cities and countries.
Sep 28, 2022
Trellix Empowers Next Generation of Cybersecurity Talent at Xpand Live
Sep 28, 2022
Trellix Accelerates Channel Success Through Unified Partner Program and Expanded Security Innovation Alliance
Sep 28, 2022
Trellix Expands XDR Platform to Transform Security Operations
Sep 26, 2022
60% of Cybersecurity Professionals Feel They Are Losing Ground Against Cybercriminals
Sep 21, 2022
Trellix Launches Advanced Research Center, Finds Estimated 350K Open-Source Projects at Risk to Supply Chain Vulnerability
By Britt Norwood · August 30, 2022
Our team understands the critical role organizations like AWS play in efforts to drive premium threat detection no matter a customer’s security architecture. We continuously look for partners with a similar desire to grow and innovate to relieve pain points for SecOps teams.
This blog is the third and final of a multi-part series focused on vulnerability discovery in a widely used access control system and describes our research journey from target acquisition all the way through exploitation, beginning with the vendor and product selection and a deep dive into the hardware hacking techniques.
Get the latest
We’re no strangers to cybersecurity. But we are a new company.
Stay up to date as we evolve.