{"id":1534,"date":"2014-03-07T16:35:36","date_gmt":"2014-03-07T16:35:36","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=1534"},"modified":"2020-02-26T10:48:17","modified_gmt":"2020-02-26T15:48:17","slug":"cyber-espionage-the-scale-and-collateral-damage","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/cyber-espionage-the-scale-and-collateral-damage\/1534\/","title":{"rendered":"Cyber Espionage: the scale and collateral damage"},"content":{"rendered":"<p>Whenever one hears the words \u2018cyber espionage\u2019, large-scale campaigns affecting entire national states and transnational corporations such as Aurora, Flame or Duqu come to mind. Unfortunately, cyber espionage doesn\u2019t necessarily happen on a global scale, and larger companies are not the only organizations that may draw the attention of cyber spies.<\/p>\n<p>As we have written before many times, smaller companies often consider themselves immune to cyber criminals: why would hackers touch us if we are small\u2026 But actually a company\u2019s size means little, if anything at all. At the same time, products, technologies, finances and other data a targeted company works with does matter to criminals, whatever they are \u2013 real cyber spies working for hostile states or commercial competitors or plain and simple thieves, acting out of greed.<\/p>\n<p>Kaspersky Lab recently revealed a new paper <a href=\"https:\/\/www.kaspersky.com\/business-security\/cyber-espionage-report?cid=b2b_sm_Blog_ce\" target=\"_blank\" rel=\"noopener nofollow\">\u2018Who\u2019s Spying on You\u2019<\/a> which lists the types of cybercriminals according to their varying goals. For instance, \u2018common\u2019 cybercrooks are interested in any corporate data, since they fully understand its value: it may provide them the ability to blackmail and extort, or it can offer them something that can be sold on the black market. So-called \u2018hacktivists\u2019 usually don\u2019t care about money, but instead, they\u2019re always willing to \u2018punish\u2019 every company they have problems with (usually large corporations), by stealing and dispersing confidential data \u2013 such as the poorly preserved personal data of clients \u2013 which, in turn, leads to all-out scandals, losses and harsh legal consequences.<\/p>\n<p>There are also hackers-for-hire, seasoned professionals specializing in cyber espionage and stealing specific data on behalf of the highest bidder, whether it is a government or a competitor.<\/p>\n<div class=\"pullquote\">Collateral damage in real-world warfare is most likely casual. But in the case of cyber warfare, such damage may be well intended.<\/div>\n<p><span style=\"font-size: 14px;line-height: 1.5em\">Then there are special groups supported \u2013 directly or not \u2013 by state governments. These groups gather strategic data about other states and occasionally launch attacks on hostile states\u2019 infrastructures.<\/span><\/p>\n<p>No matter what cyber spies want, the consequences of their activities can be apparent (although the attack itself may be revealed years after it has actually started). Consequences can be evaluated in numbers: according to a Kaspersky Lab and B2B International survey, the estimated average financial damage from a targeted attack is about $2.4 million. An average loss from a data leak for an enterprise amounts to $649,000.<\/p>\n<p>Smaller companies lose less money, but they are at a larger risk.<\/p>\n<p>What we really need to touch on is collateral damage. In real-world warfare this is a euphemistic term to describe usually unintended civilian losses and non-military infrastructure. In cyber warfare \u2018collateral damage\u2019 may be intentional.<\/p>\n<p>In order to harm any large entity, such as a military contractor, frontal attacks are not quite necessary; they are most likely non-productive as well, since the big company\u2019s cyber defenses are very thorough and always on alert.<\/p>\n<p>But any such enterprise has a vast network of third-party contractors, large and small. The latter\u2019s defenses are often quite relaxed due to various reasons and, therefore, are penetrable.<\/p>\n<p>Recently, we have seen such supply-chain attacks: for instance, those who stood behind Icefog, before attacking their primary targets \u2013 industrial corporations, state agencies and military contractors \u2013 collected troves of data from third parties- from telecom and satellite operators to software developers and shipbuilding companies.<\/p>\n<p>More on these APTs and ways to ward them off in Kaspersky Lab\u2019s new whitepaper \u2018Who\u2019s Spying On You\u2019 is available <a href=\"https:\/\/www.kaspersky.com\/business-security\/cyber-espionage-report?cid=b2b_sm_Blog_ce\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whenever one hears the words \u2018cyber espionage\u2019, large-scale campaigns affecting entire national states and transnational corporations such as Aurora, Flame or Duqu come to mind. Unfortunately, cyber espionage doesn\u2019t necessarily<\/p>\n","protected":false},"author":209,"featured_media":16254,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[499,2035],"class_list":{"0":"post-1534","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-apt","10":"tag-cyber-espionage"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cyber-espionage-the-scale-and-collateral-damage\/1534\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cyber-espionage-the-scale-and-collateral-damage\/1534\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cyber-espionage-the-scale-and-collateral-damage\/1534\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/apt\/","name":"APT"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1534","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=1534"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1534\/revisions"}],"predecessor-version":[{"id":33070,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1534\/revisions\/33070"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/16254"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=1534"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=1534"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=1534"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}