WITH RECENT NEWS stories involving serious attacks on Sony and its PlayStation Network, Microsoft’s Xbox Live network, alongside other high profile attacks on the Tor project and North Korea’s Websites, has cyber-terrorism become a very real and dangerous reality for enterprises to battle alongside other threats?
Let’s start from the beginning. What is the difference between cyber-terrorism, vandalism, or even war? Looking back to the 90s and early 2000s, websites were commonly defaced just to satisfy an attacker’s ego. Just like graffiti, this is a great example of vandalism. A more recent example of this sort of attack was the recent defacement of the U.S. Central Command’s Twitter page – a textbook example of vandalism.
If you consider malware like Stuxnet discovered in June 2010 and nicknamed the “world’s first digital weapon” things change drastically. Stuxnet had moved beyond the virtual world and was capable of causing physical destruction to computer equipment and possible large-scale destruction – or cyber-war. However, cyber-terrorism seems to have found a different niche where the destruction or disruption of service isn’t a military or state target, but that of a commercial entity or service – the businesses, services, or information that you and I often times depend upon.
In the case of the Sony attack, which saw the release of confidential data of employees and their families in November 2014, there are many potential suspects. Regardless of “who dun it”, the damage to Sony is very real. There has been a loss in revenue due to movies being leaked, sensitive employee information was disclosed (including salaries and social security numbers), and executive emails were publicised – shedding a disparaging light on Hollywood executives. With these leaks came brand and other collateral damage, resulting in a long road ahead for Sony to fully recover. As a result, Sony’s potential and current customers are likely to question purchasing Sony products, which could have a devastating long-term impact on the company.
Then, Lizard Squad – an organization that refers to itself as a cyber-terrorist – launched a massive DDoS attack against Sony’s PlayStation Network and Microsoft’s Xbox Live networks on Christmas Day, ruining holiday fun for millions in the process. Lizard Squad followed up these disruptions with an attack against the Tor Project, a network of virtual tunnels that allow people and groups to improve their privacy and security on the Internet, and have threatened many individuals and rival groups along the way.
Finally there is the North Korea attack, which saw the nation’s Web and Internet infrastructure go down for roughly 9 ½ hours, resulting in many thinking that the U.S. government was behind the attack. While extremely unlikely, cyber-terrorism can be an act of disruption in this way, even used primarily for propaganda purposes.