{"id":178365,"date":"2021-02-01T12:00:47","date_gmt":"2021-02-01T12:00:47","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=178365"},"modified":"2021-01-31T04:35:39","modified_gmt":"2021-01-31T04:35:39","slug":"nation-state-attacks","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2021\/02\/nation-state-attacks\/","title":{"rendered":"Nation-State Attacks"},"content":{"rendered":"<p style=\"text-align: center;\"><em>Intelligent Preparation of the Battle-Space<\/em><\/p>\n<div class=\"row article-cover-image\">\n<div class=\"col-12 mb-2\">\n<div class=\"image-new-container\">\n<div class=\"image\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/media.wsimag.com\/attachments\/6690e9a2c22d522076ef2571aa4cfc8244e207e8\/store\/fill\/1090\/613\/af66f4bd2011bb423284a5cebaca20e67b59da28de9626a80eedf9051bb4\/Sophisticated-nation-state-cyber-attacks-involved-US-federal-agencies.jpg\" alt=\"Sophisticated nation-state cyber-attacks involved U.S. federal agencies \" width=\"428\" height=\"241\" \/><\/div>\n<\/div>\n<\/div>\n<div class=\"col-12 image_caption\" style=\"text-align: center;\"><em><strong>Sophisticated nation-state cyber-attacks involved U.S. federal agencies<\/strong><\/em><\/div>\n<div class=\"col-12 image_caption\" style=\"text-align: center;\"><em><strong> | Image from <a target=\"_blank\" href=\"https:\/\/wsimag.com\/science-and-technology\/64698-nation-state-attacks\" >Wall Street International<\/a>.<\/strong><\/em><\/div>\n<\/div>\n<div class=\"row mb-4 justify-content-center\">\n<div class=\"col-lg-10 col-xl-8 col-hd-7\">\n<div class=\"article-body\">\n<blockquote><p><em>&#8220;You\u2019ve been hacked. It was by a nation-state.&#8221;<\/em><\/p><\/blockquote>\n<p><em>27 Jan 2021<\/em> \u2014\u00a0 The latest example of this type of cyber attack involved U.S. federal agencies and high-profile companies that were breached via a compromised and weaponized version of a software update from a connected third party.<\/p>\n<p>Publicly reported information indicates that a vendor was infiltrated by a sophisticated nation-state cyber attack, which allowed for malware to be embedded and hidden in software updates that were legitimate, creating an entry point to any machine that installed the updates.<\/p>\n<p>The case on software company SolarWinds is especially devastating and concerning. The malicious actors in this case compromised SolarWinds\u2019 infrastructure via a method that puts the broader online environment at risk. As FireEye discovered and SolarWinds reports, the attackers incorporated their malware into an upgrade of the company\u2019s Orion product that may have been installed by more than 18,000 customers, including government agencies.<\/p>\n<p>Cyberwarfare and in general cyber offensive capabilities are reshaping the conception we have about IT Security and geopolitical power, enabling a different subset of impacts in economical and social arrays we haven\u2019t seen before.<\/p>\n<p>To be concise and clear, nation-state attacks are extremely powerful and sophisticated cyberthreats from adversaries working directly or indirectly for their own government. Of course, this kind of serious cyber attacks are unlikely to be motiveless; the nations may strategize cyberattacks with the intention to damage or destroy another\u2019s IT critical infrastructure: the nation\u2019s economy, state infrastructure, trade, business, communication, transportation, and so on are primarily based on IT and IT-enabled services and attacking these services can disrupt the entire country and weaken their power, and finally this is achieved by using advanced cybercriminal tools, tactics, and procedures (TTPs) which evolve so quickly that cyber defense, legislation, and law enforcement remain behind the attacker\u2019s curve.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-198929 aligncenter\" src=\"https:\/\/menareport.files.wordpress.com\/2021\/01\/solarwinds-orion-may-have-been-installed-by-more-than-18000-customers-including-government.jpg\" sizes=\"auto, (max-width: 374px) 100vw, 374px\" srcset=\"https:\/\/menareport.files.wordpress.com\/2021\/01\/solarwinds-orion-may-have-been-installed-by-more-than-18000-customers-including-government.jpg?w=374&amp;h=281 374w, https:\/\/menareport.files.wordpress.com\/2021\/01\/solarwinds-orion-may-have-been-installed-by-more-than-18000-customers-including-government.jpg?w=150&amp;h=113 150w, https:\/\/menareport.files.wordpress.com\/2021\/01\/solarwinds-orion-may-have-been-installed-by-more-than-18000-customers-including-government.jpg?w=300&amp;h=225 300w, https:\/\/menareport.files.wordpress.com\/2021\/01\/solarwinds-orion-may-have-been-installed-by-more-than-18000-customers-including-government.jpg 410w\" alt=\"SolarWinds-Orion-may-have-been-installed-by-more-than-18000-customers-including-government\" width=\"374\" height=\"281\" data-attachment-id=\"198929\" data-permalink=\"https:\/\/human-wrongs-watch.net\/2021\/01\/30\/nation-state-attacks\/solarwinds-orion-may-have-been-installed-by-more-than-18000-customers-including-government\/\" data-orig-file=\"https:\/\/menareport.files.wordpress.com\/2021\/01\/solarwinds-orion-may-have-been-installed-by-more-than-18000-customers-including-government.jpg\" data-orig-size=\"410,308\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"SolarWinds-Orion-may-have-been-installed-by-more-than-18000-customers-including-government\" data-image-description=\"\" data-medium-file=\"https:\/\/menareport.files.wordpress.com\/2021\/01\/solarwinds-orion-may-have-been-installed-by-more-than-18000-customers-including-government.jpg?w=300\" data-large-file=\"https:\/\/menareport.files.wordpress.com\/2021\/01\/solarwinds-orion-may-have-been-installed-by-more-than-18000-customers-including-government.jpg?w=410\" \/><\/p>\n<p style=\"text-align: center;\"><em><strong>SolarWinds\u2019 Orion may have been installed by more than 18,000 customers, including government agencies | Image from <a target=\"_blank\" href=\"https:\/\/wsimag.com\/science-and-technology\/64698-nation-state-attacks\" >Wall Street International<\/a>.<\/strong><\/em><\/p>\n<p>Here we must address the following concepts for clarifying the concerns about nation-state attacks:<\/p>\n<p>Cyberwarfare is a form of series of related campaigns that are similar to prolonged cyber campaigns. It utilizes methodologies of attack and defense that inhabit cyberspace. With the help of technical instruments, a nation attacks the opponent\u2019s critical IT systems.<\/p>\n<p>A cyber campaign is not harmful or meant to disrupt another nation\u2019s technical infrastructure. It is mere propaganda or promotional act to influence the perception of the targeted country\u2019s citizens about the policies or actions of the former.<\/p>\n<p>Cyberterrorism stands for initiating a cyberattack to shut down prominent national infrastructure, such as transportation, energy, government websites, and so on. It involves using computer network tools to intimidate a civilian population. Cyberwarfare and cyberterrorism are similar as they both aim the disruption of infrastructure linked within the confines of cyberspace.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-198926 aligncenter\" src=\"https:\/\/menareport.files.wordpress.com\/2021\/01\/malicious-actors-compromised-solarwinds-infrastructure-via-a-method-that-puts-the-broader-online.jpg\" sizes=\"auto, (max-width: 371px) 100vw, 371px\" srcset=\"https:\/\/menareport.files.wordpress.com\/2021\/01\/malicious-actors-compromised-solarwinds-infrastructure-via-a-method-that-puts-the-broader-online.jpg?w=371&amp;h=279 371w, https:\/\/menareport.files.wordpress.com\/2021\/01\/malicious-actors-compromised-solarwinds-infrastructure-via-a-method-that-puts-the-broader-online.jpg?w=150&amp;h=113 150w, https:\/\/menareport.files.wordpress.com\/2021\/01\/malicious-actors-compromised-solarwinds-infrastructure-via-a-method-that-puts-the-broader-online.jpg?w=300&amp;h=225 300w, https:\/\/menareport.files.wordpress.com\/2021\/01\/malicious-actors-compromised-solarwinds-infrastructure-via-a-method-that-puts-the-broader-online.jpg 410w\" alt=\"Malicious-actors-compromised-SolarWinds-infrastructure-via-a-method-that-puts-the-broader-online\" width=\"371\" height=\"279\" data-attachment-id=\"198926\" data-permalink=\"https:\/\/human-wrongs-watch.net\/2021\/01\/30\/nation-state-attacks\/malicious-actors-compromised-solarwinds-infrastructure-via-a-method-that-puts-the-broader-online\/\" data-orig-file=\"https:\/\/menareport.files.wordpress.com\/2021\/01\/malicious-actors-compromised-solarwinds-infrastructure-via-a-method-that-puts-the-broader-online.jpg\" data-orig-size=\"410,308\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Malicious-actors-compromised-SolarWinds-infrastructure-via-a-method-that-puts-the-broader-online\" data-image-description=\"\" data-medium-file=\"https:\/\/menareport.files.wordpress.com\/2021\/01\/malicious-actors-compromised-solarwinds-infrastructure-via-a-method-that-puts-the-broader-online.jpg?w=300\" data-large-file=\"https:\/\/menareport.files.wordpress.com\/2021\/01\/malicious-actors-compromised-solarwinds-infrastructure-via-a-method-that-puts-the-broader-online.jpg?w=410\" \/><\/p>\n<p style=\"text-align: center;\"><em><strong>Malicious actors compromised SolarWinds\u2019 infrastructure via a method that puts the broader online environment at risk | Image from <a target=\"_blank\" href=\"https:\/\/wsimag.com\/science-and-technology\/64698-nation-state-attacks\" >Wall Street International<\/a>.<\/strong><\/em><\/p>\n<h3><strong><em>Why this matters to you<\/em><\/strong><\/h3>\n<p>But how can we defend against this type of super-advanced attacks? Is it possible with the current security postures and programs we develop with our organizations and vendors?<\/p>\n<p>To summarize and keep this in the \u201ccontext of cybersecurity\u201d, a nation-state attack is still catalogued by many as a threat (this is true in fact, but\u2026), which at the same time it is an event that has the potential to adversely impact an organization. Is this what our security operations are defending against? Perhaps, but consider also including the term threat-actor when defining this kind of threat. A threat-actor is the person or group of people behind an attack.<\/p>\n<p>A solid defensive strategy must defend against the intelligent threat-actor bent on causing damage to an organization, and not just a potential event. People are behind cyber-attacks. When the defense considers the tactics, techniques, and procedures (TTPs) of intelligent threat-actors, they begin to truly understand the real threat, no matter if it\u2019s a nation-state attack.<\/p>\n<p>Defenders can then implement security defenses that directly impact the ability a threat-actor has to perform negative actions. Shifting security operations from the mindset of \u201cvulnerable\u201d or \u201cnot vulnerable\u201d and adopting an approach that focuses on threat actions will significantly improve the ability an organization has to not only prevent but also detect and respond to real complex threats. This is the beginning of understanding security through the eyes of a nation-state attack.<\/p>\n<p>Organizations who use threat actions to drive their defensive TTPs can make life very difficult for threat-actors and even protect themselves against nation*state attacks or zero days.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-198922 aligncenter\" src=\"https:\/\/menareport.files.wordpress.com\/2021\/01\/solarwinds-reports-the-attackers-incorporated-their-malware-into-an-upgrade-of-the-companys.jpg\" sizes=\"auto, (max-width: 372px) 100vw, 372px\" srcset=\"https:\/\/menareport.files.wordpress.com\/2021\/01\/solarwinds-reports-the-attackers-incorporated-their-malware-into-an-upgrade-of-the-companys.jpg?w=372&amp;h=280 372w, https:\/\/menareport.files.wordpress.com\/2021\/01\/solarwinds-reports-the-attackers-incorporated-their-malware-into-an-upgrade-of-the-companys.jpg?w=150&amp;h=113 150w, https:\/\/menareport.files.wordpress.com\/2021\/01\/solarwinds-reports-the-attackers-incorporated-their-malware-into-an-upgrade-of-the-companys.jpg?w=300&amp;h=225 300w, https:\/\/menareport.files.wordpress.com\/2021\/01\/solarwinds-reports-the-attackers-incorporated-their-malware-into-an-upgrade-of-the-companys.jpg 410w\" alt=\"SolarWinds-reports-the-attackers-incorporated-their-malware-into-an-upgrade-of-the-companys\" width=\"372\" height=\"280\" data-attachment-id=\"198922\" data-permalink=\"https:\/\/human-wrongs-watch.net\/2021\/01\/30\/nation-state-attacks\/solarwinds-reports-the-attackers-incorporated-their-malware-into-an-upgrade-of-the-companys\/\" data-orig-file=\"https:\/\/menareport.files.wordpress.com\/2021\/01\/solarwinds-reports-the-attackers-incorporated-their-malware-into-an-upgrade-of-the-companys.jpg\" data-orig-size=\"410,308\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"SolarWinds-reports-the-attackers-incorporated-their-malware-into-an-upgrade-of-the-companys\" data-image-description=\"\" data-medium-file=\"https:\/\/menareport.files.wordpress.com\/2021\/01\/solarwinds-reports-the-attackers-incorporated-their-malware-into-an-upgrade-of-the-companys.jpg?w=300\" data-large-file=\"https:\/\/menareport.files.wordpress.com\/2021\/01\/solarwinds-reports-the-attackers-incorporated-their-malware-into-an-upgrade-of-the-companys.jpg?w=410\" \/><\/p>\n<p style=\"text-align: center;\"><em><strong>SolarWinds reports the attackers incorporated their malware into an upgrade of the company\u2019s Orion product | Image from <a target=\"_blank\" href=\"https:\/\/wsimag.com\/science-and-technology\/64698-nation-state-attacks\" >Wall Street International<\/a>.<\/strong><\/em><\/p>\n<p>But SolarWinds was compromised via an exploit in their Orion system, isn\u2018t the identification and mitigation of vulnerabilities good enough? Isn\u2018t a good SDLC enough for this at the end for example?<\/p>\n<p>In order to have an answer, you must understand how a threat-actor thinks and acts. Remember, a threat is really an intelligent person bent on causing harm. It is <em>not<\/em> an exploit of a vulnerability, <em>not<\/em> a piece of malware, or <em>not<\/em> a phishing attack.<\/p>\n<p>These are mere means a threat-actor may choose to use to achieve their end goal. The threat-actor knows the target has a comprehensive security program. A suite of security tools (firewalls, intrusion detection systems, anti-virus, EDR, etc) is deployed with the intent of stopping cyber-attacks. A good threat-actor knows this and will most likely assume patches are deployed and vulnerability assessments, penetration tests, even adversarial engagements are performed.<\/p>\n<p>This understanding can significantly change the actions taken by a threat-actor compared to the actions taken by a traditional security tester. Does the threat-actor fire up a port scanner and enumerate an entire network? Does a threat-actor fire up a vulnerability scanning tool to find and exploit?<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-198924 aligncenter\" src=\"https:\/\/menareport.files.wordpress.com\/2021\/01\/nation-state-attacks-are-extremely-powerful-and-sophisticated-cyberthreats-from-adversaries.jpg\" sizes=\"auto, (max-width: 373px) 100vw, 373px\" srcset=\"https:\/\/menareport.files.wordpress.com\/2021\/01\/nation-state-attacks-are-extremely-powerful-and-sophisticated-cyberthreats-from-adversaries.jpg 340w, https:\/\/menareport.files.wordpress.com\/2021\/01\/nation-state-attacks-are-extremely-powerful-and-sophisticated-cyberthreats-from-adversaries.jpg?w=150&amp;h=113 150w, https:\/\/menareport.files.wordpress.com\/2021\/01\/nation-state-attacks-are-extremely-powerful-and-sophisticated-cyberthreats-from-adversaries.jpg?w=300&amp;h=225 300w\" alt=\"Nation-state-attacks-are-extremely-powerful-and-sophisticated-cyberthreats-from-adversaries\" width=\"373\" height=\"280\" data-attachment-id=\"198924\" data-permalink=\"https:\/\/human-wrongs-watch.net\/2021\/01\/30\/nation-state-attacks\/nation-state-attacks-are-extremely-powerful-and-sophisticated-cyberthreats-from-adversaries\/\" data-orig-file=\"https:\/\/menareport.files.wordpress.com\/2021\/01\/nation-state-attacks-are-extremely-powerful-and-sophisticated-cyberthreats-from-adversaries.jpg\" data-orig-size=\"340,255\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Nation-state-attacks-are-extremely-powerful-and-sophisticated-cyberthreats-from-adversaries\" data-image-description=\"\" data-medium-file=\"https:\/\/menareport.files.wordpress.com\/2021\/01\/nation-state-attacks-are-extremely-powerful-and-sophisticated-cyberthreats-from-adversaries.jpg?w=300\" data-large-file=\"https:\/\/menareport.files.wordpress.com\/2021\/01\/nation-state-attacks-are-extremely-powerful-and-sophisticated-cyberthreats-from-adversaries.jpg?w=340\" \/><\/p>\n<p style=\"text-align: center;\"><em><strong>Nation-state attacks are extremely powerful and sophisticated cyberthreats from adversaries working directly or indirectly for their own government<\/strong><\/em><\/p>\n<p style=\"text-align: center;\"><em><strong> | Image from <a target=\"_blank\" href=\"https:\/\/wsimag.com\/science-and-technology\/64698-nation-state-attacks\" >Wall Street International<\/a>.<\/strong><\/em><\/p>\n<p>Attacks by threat-actors do not follow the models adopted by traditional security testing. An attack (while many vendors tend to believe) is not scan -&gt; exploit -&gt; profit. An intelligent threat-actor evaluates what a target presents and uses weakness not always discovered through the day to day security tests.<\/p>\n<p>The threat-actor will take a number of controlled steps to gain access to a target, establish command and control, establish persistence, and ultimately achieve their desired goal. The people charged with defending an organization often ignore or misunderstand the steps taken by a threat-actor. This often leads to focusing on prevention, not detection.<\/p>\n<p>Defenders who do focus on detection may drown themselves in un-actionable default or vendor generate logs and alerts. Have you ever heard from the defending team \u201cWe have too many logs and alerts to respond!??\u201d Why do organizations log what they log? Compliance? In case they are needed? Does the vendor advise? Organizations are still missing a key piece to all threats; understanding their actions and TTPs.<\/p>\n<p>Do not allow your assets to enter a battlefield relying on the wrong (and highly proliferated) security mindset. Give them complete protection\/training against an adversary, not only a security flaw.<\/p>\n<p>_____________________________________________<\/p>\n<p><em>More articles by <a target=\"_blank\" href=\"https:\/\/wsimag.com\/authors\/390-fernando-velazquez\" class=\"first-highlight-color\" >Fernando Vel\u00e1zquez: <\/a><\/em><\/p>\n<ul>\n<li><a target=\"_blank\" href=\"https:\/\/human-wrongs-watch.net\/2020\/11\/30\/why-they-would-spy-on-me-if-am-nobody\/\" title=\"Permalink to Why They Would Spy on Me If Am\u00a0Nobody?\"  rel=\"bookmark\"><strong>Why They Would Spy on Me If Am\u00a0Nobody?<\/strong><\/a><\/li>\n<li><strong><a target=\"_blank\" href=\"https:\/\/human-wrongs-watch.net\/2020\/10\/27\/artificial-intelligence\/\" title=\"Permalink to Artificial Intelligence\"  rel=\"bookmark\">Artificial Intelligence<\/a><\/strong><\/li>\n<li><strong><a target=\"_blank\" href=\"https:\/\/human-wrongs-watch.net\/2020\/08\/05\/fade-to-black-dark-hackers-at-a-glance\/\" title=\"Permalink to Fade to Black \u2013 Dark Hackers at a\u00a0Glance\"  rel=\"bookmark\">Fade to Black \u2013 Dark Hackers at a\u00a0Glance<\/a><\/strong><\/li>\n<li><strong><a target=\"_blank\" href=\"https:\/\/human-wrongs-watch.net\/2020\/06\/30\/warning-you-may-be-having-a-private-conversation-with-satan\/\" title=\"Permalink to Warning \u2013 You May Be Having a Private Conversation with\u00a0Satan\"  rel=\"bookmark\">Warning \u2013 You May Be Having a Private Conversation with\u00a0Satan<\/a><\/strong><\/li>\n<li><strong><a target=\"_blank\" href=\"https:\/\/human-wrongs-watch.net\/2020\/05\/28\/brief-anatomy-of-a-hacker\/\" title=\"Permalink to Brief Anatomy of a\u00a0Hacker\"  rel=\"bookmark\">Brief Anatomy of a\u00a0Hacker<\/a><\/strong><\/li>\n<li><strong><a target=\"_blank\" href=\"https:\/\/human-wrongs-watch.net\/2020\/04\/30\/corona-fakes-beware-the-quarantine-scams\/\" title=\"Permalink to Corona-Fakes \u2013 Beware the Quarantine\u00a0Scams\"  rel=\"bookmark\">Corona-Fakes \u2013 Beware the Quarantine\u00a0Scams<\/a><\/strong><\/li>\n<li><strong><a target=\"_blank\" href=\"https:\/\/human-wrongs-watch.net\/2020\/03\/27\/counteroffensive-against-cyber-covid-19\/\" title=\"Permalink to Counteroffensive Against Cyber\u00a0COVID-19\"  rel=\"bookmark\">Counteroffensive Against Cyber\u00a0COVID-19<\/a><\/strong><\/li>\n<li><strong><a target=\"_blank\" href=\"https:\/\/human-wrongs-watch.net\/2020\/02\/28\/red-rooms-deep-web\/\" title=\"Permalink to Red Rooms Deep\u00a0Web\"  rel=\"bookmark\">Red Rooms Deep\u00a0Web<\/a><\/strong><\/li>\n<li><strong><a target=\"_blank\" href=\"https:\/\/human-wrongs-watch.net\/2020\/01\/30\/think-on-your-sins\/\" title=\"Permalink to Think On Your\u00a0Sins\"  rel=\"bookmark\">Think On Your\u00a0Sins<\/a><\/strong><\/li>\n<li><strong><a target=\"_blank\" href=\"https:\/\/human-wrongs-watch.net\/2020\/01\/01\/what-if-gay-sex-caused-malware\/\" title=\"Permalink to What If Gay Sex Caused\u00a0Malware?\"  rel=\"bookmark\">What If Gay Sex Caused\u00a0Malware?<\/a><\/strong><\/li>\n<li><strong><a target=\"_blank\" href=\"https:\/\/human-wrongs-watch.net\/2019\/11\/29\/robots-will-dream-of-electric-sheep\/\" title=\"Permalink to Robots Will Dream Of Electric\u00a0Sheep\"  rel=\"bookmark\">Robots Will Dream Of Electric\u00a0Sheep<\/a><\/strong><\/li>\n<li><strong><a target=\"_blank\" href=\"https:\/\/human-wrongs-watch.net\/2019\/10\/13\/are-we-ready-to-fight-an-a-i\/\" title=\"Permalink to Are We Ready to Fight an\u00a0A.I.?\"  rel=\"bookmark\">Are We Ready to Fight an\u00a0A.I.?<\/a><\/strong><\/li>\n<li><strong><a target=\"_blank\" href=\"https:\/\/human-wrongs-watch.net\/2019\/08\/30\/digital-hell\/\" title=\"Permalink to Digital Hell\"  rel=\"bookmark\">Digital Hell<\/a><\/strong><\/li>\n<li><strong><a target=\"_blank\" href=\"https:\/\/human-wrongs-watch.net\/2019\/08\/19\/prisoners-of-the-cyber-space-click-delete-to-save-your-mind\/\" title=\"Permalink to Prisoners Of The Cyber Space \u2013 Click Delete to Save Your\u00a0Mind\"  rel=\"bookmark\">Prisoners Of The Cyber Space \u2013 Click Delete to Save Your\u00a0Mind<\/a><\/strong><\/li>\n<li><strong><a target=\"_blank\" href=\"https:\/\/human-wrongs-watch.net\/2019\/06\/29\/matrix-detox-digital-disconnection-as-a-necessity\/\" title=\"Permalink to Matrix Detox \u2013 Digital Disconnection as a\u00a0Necessity\"  rel=\"bookmark\">Matrix Detox \u2013 Digital Disconnection as a\u00a0Necessity<\/a><\/strong><\/li>\n<li><strong><a target=\"_blank\" href=\"https:\/\/human-wrongs-watch.net\/2019\/05\/28\/ctrl-digital-harassment\/\" title=\"Permalink to Ctrl: Digital Harassment\"  rel=\"bookmark\">Ctrl: Digital Harassment<\/a><\/strong><\/li>\n<li><strong><a target=\"_blank\" href=\"https:\/\/human-wrongs-watch.net\/2019\/04\/28\/the-volcano-that-speaks-to-mankind\/\" title=\"Permalink to The Volcano that Speaks to\u00a0Mankind\"  rel=\"bookmark\">The Volcano that Speaks to\u00a0Mankind<\/a><\/strong><\/li>\n<li><strong><a target=\"_blank\" href=\"https:\/\/human-wrongs-watch.net\/2019\/03\/28\/ctrl-so-many-evil-things-over-the-internet\/\" title=\"Permalink to Ctrl \u2013 So Many Evil Things over the\u00a0Internet\"  rel=\"bookmark\">Ctrl \u2013 So Many Evil Things over the\u00a0Internet<\/a><\/strong><\/li>\n<\/ul>\n<p class=\"font-15 tall-line-height mb-2\" style=\"padding-left: 40px;\"><em><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2021\/01\/Fernando-Velazquez.jpg\" ><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-178366 size-full\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2021\/01\/Fernando-Velazquez-e1612067031849.jpg\" alt=\"\" width=\"100\" height=\"100\" \/><\/a>Fernando Vel\u00e1zquez is a cryptographer, cybersecurity professional, privacy consultant and writer. He is the author of several articles on general Information Security topics. He is the founder and Chief Technology Officer of Shield CyberSpace Boundaries (S.C.B) an organization specialized in Digital Rights Management, Online Privacy, Malware Analysis, Security and Computer Science. <\/em><em><a target=\"_blank\" href=\"https:\/\/wsimag.com\/authors\/390-fernando-velazquez\" class=\"btn btn-outline-first-highlight-color btn-slightly-sm\" role=\"button\" >Author profile<\/a><\/em><\/p>\n<p><a target=\"_blank\" href=\"https:\/\/human-wrongs-watch.net\/2021\/01\/30\/nation-state-attacks\/\" >Go to Original &#8211; human-wrongs-watch.net<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>27 Jan 2021 \u2014 &#8220;You\u2019ve been hacked. It was by a nation-state.&#8221; The latest example of this type of cyber attack involved U.S. federal agencies and high-profile companies that were breached via a compromised and weaponized version of a software update from a connected third party.<\/p>\n","protected":false},"author":4,"featured_media":178366,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[216],"tags":[2269,1751,1760,1282,1109,911,461],"class_list":["post-178365","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","tag-cybercrime","tag-cyberwar","tag-hacking","tag-internet","tag-spying","tag-surveillance","tag-technology"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/178365","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=178365"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/178365\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media\/178366"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=178365"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=178365"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=178365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}