Lessons learned from China's cyberattacks
After the US Senate Armed Services Committee publically revealed last week that Chinese military hackers enacted multiple targeted cyberattacks against the Pentagon's TRANSCOM, private-sector, contracted companies, the grave repercussions are finally starting to sink in, and the finger-pointing has only just begun.
Rising above the din, an astutely in-depth analysis of the security breaches released by FireEye, sanely investigates the motivations behind a military breach, the true targets of the attacks and what can be learned from such incidents.
According to the analysis, nation-state hackers obtain classified data in order to assess foreign power capabilities and poach technology, as well as potentially garner an economic upper hand when it comes to the global arms market, using stolen blueprints and immediately enactable technologies.
It remains unnerving that nearly three quarters of the companies breached were unaware of any threat or of vulnerability to attack. The lesson learned here, FireEye points out, is that intelligence sharing among government entities as well as the threat intelligence community— though perhaps counter intuitive—will “contribute to better preparedness and a more effective defense against cyberthreats.”