Cyber warfare is evolving as nations like Russia and China increasingly target critically sensitive infrastructure such as energy systems and communications networks. Strengthening cybersecurity measures across these sectors is crucial to building a resilient and secure future as the threat of cyber sabotage continues to grow.
The NSA recently released guidance on the importance of data analytics and visibility in the context of Zero Trust as cyber conflicts from China and Russia have intensified. An article in The Economist highlights that data analytics and visibility are crucial as Russian and Chinese threats gear up for wartime sabotage.
The Economist notes, “For many years, Sino-American skirmishing in the cyber domain was largely about stealing secrets. ... In recent years, this dynamic has changed. Chinese cyber espionage has continued, but its operations have grown more ambitious and aggressive. Russia, too, has intensified its cyber activities in Ukraine, with Russia-linked groups also targeting water facilities in Europe.”
Lt. General Robert Skinner, head of the Defense Information Systems Service Agency in NextGov, explains that China is seeking to disrupt daily life during a potential conflict. These campaigns hint at a new era of cyber sabotage. The idea of cyber sabotage is not new; however, “Stuxnet,” an Israeli-American attack, disrupted Iran’s nuclear enrichment facilities in the late 2000s.
The NSA’s guidance emphasizes the growing recognition of the importance of capturing insight logs and tracing of activities inside networks. The Economist explains that “the Chinese and Russian campaigns also break with the past in another way. Traditional cyberattacks would be associated with a distinctive signature, such as a particular malware or a suspect server. A diligent defender could spot these. Both [China’s] VoltTyphoon and the [Russia’s] GRU have used stealthier methods. They have made the connection look legitimate by directing attacks through ordinary routers, firewalls, and other equipment used in homes and offices.” This shift to stealthier methods requires enhanced data analytics and visibility to detect these sophisticated threats.
So, what does all this mean to CISOs seeking to protect enterprises? Two points stand out:
While some might assume that attacks would primarily focus on bigger corporations. Think again. The Economist points out that attackers often focus on a "broad swath" of small and medium-sized companies. Disrupting these smaller targets can cause outsized effects. ExecutiveGov provides a clear description based on NSA guidance, stating that organizations should perform activity logging, regularly use security and risk analytics, centralize security information and event management, develop user and entity behavior analytics, automate dynamic policies, and integrate threat intelligence.
To protect your organization from cyber sabotage, stay vigilant, maintain comprehensive visibility, and leverage advanced analytics to identify potential threats. Implementing these practices can help you stay ahead of cyber attacks and keep your organization secure.
Keep your cybersecurity strategies fresh by subscribing to the Perspectives blog. Receive regular updates and expert insights tailored to those looking to enhance their security posture.
The world’s leading organizations rely on Splunk, a Cisco company, to continuously strengthen digital resilience with our unified security and observability platform, powered by industry-leading AI.
Our customers trust Splunk’s award-winning security and observability solutions to secure and improve the reliability of their complex digital environments, at any scale.