Malware attacks have taken on new meaning over the last few years. Businesses and consumers are more or less used to the day-in and day-out of Trojans, phishing scams, and such, but a new breed of much more complex and sophisticated threats has changed the game.
The Stuxnet and Duqu worms, as well as Flame, Gauss, and Red October malware all appear to have been developed by nation states or well-organized terrorist groups. Each has had specific goals and precise targets. Unless you're specifically in the crosshairs of one of these cyber espionage attacks, you have nothing to worry about, right? Not exactly.
[ Also on InfoWorld: Unseen, all-out cyber war on the U.S. has begun. | Security expert Roger A. Grimes offers a guided tour of the latest threats and explains what you can do to stop them in InfoWorld's "Fight Today's Malware" Shop Talk video and Malware Deep Dive Report. | Learn how to secure your systems with InfoWorld's Security Central newsletter. ]
There are three ways anyone will feel the consequences of cyber espionage or cyber warfare threats, even if they're not the intended target.
1. Critical infrastructure
A nation-state or terrorist organization using malware may be able to cripple the critical infrastructure of the target nation. That includes things like the electrical power grid, train and air transportation, traffic lights, natural gas pipelines, nuclear power facilities, water treatment plants, and more.
These things are called "critical infrastructure" for a reason--they're crucial elements required for basic survival, defense, transportation and communication. If an attack impacts the critical infrastructure of a nation, the fallout will be felt by all businesses that rely on those services.
2. Collateral damage
Despite the "good intentions" of the developers behind these sophisticated cyber-espionage attacks, businesses and consumers not intended as targets may be affected nonetheless. Collateral damage, after all, is calculated in pretty much any military or intelligence operation, and the same applies to strategic attacks by rogue groups.
An attack meant to cripple the PLCs (Programmable Logic Controllers) at an enemy nuclear facility may accidentally shut down similar model PLCs at an automobile manufacturing plant. The fact that the attack wasn't meant to impact the manufacturing facility is little consolation if you're affected.
3. Reverse engineering
In a presentation at the Kaspersky Cyber-Security Summit 2013 in New York this week, Costin Raiu, Kaspersky's director of global research and analysis, pointed out interesting data. Although the Duqu cyber-espionage threat was discovered and neutralized long ago, one of its core exploits showed up as the top, most prolific threat for two days in a row last December.