CyberThreat Handbook: Thales and Verint present their “Who’s Who” hackers

By : |October 7, 2019 0

Thales and Verint present their “Cyberthreat Handbook”, an unprecedented report, in order to study and categorize groups of major cyberattackers, ranging from cybercriminals, cyberterrorists and cyberactivists in nation states. As part of a strategic partnership to develop advanced and comprehensive technologies for technical threat analysis, the Thales and Verint teams unveil an unparalleled panorama of the major cyber threats, describing very precisely the modus operandi, motivations and the sectors affected by some 60 emblematic groups, thanks to analyzes of multiple sources of intelligence such as the web or the technical analyst of the threat.

In a world where cybersecurity is becoming increasingly important, Thales and Verint are committed to better understanding cyberattackers and their techniques, in order to effectively contribute to their detection and anticipation in both private and public sectors. Knowing your enemy can be complex in a world of dissimulation, where threats are extremely diverse.

Analysts Thales and Verint have defined four major families of attackers from their motives and their ultimate goal. Of the 60 or so major attackers analyzed, 49% are sponsored by states, which often focus on the theft of sensitive data from geopolitical targets. 26% are “Hacktivists”, who pursue ideological motivations, followed closely by cybercriminals (20%), driven by greed. Finally, cyberterrorists account for 5% of the groups analyzed.

The major economic, political and military powers are the most affected by significant campaigns. Thus, the 12 countries with the highest GDP are all among the most targeted states, first and foremost the United States, Russia, the European Union (in particular the United Kingdom, France and Germany). , China, then India, South Korea and Japan.

The sectors most targeted by these major campaigns are the states and their defense capabilities, followed by the financial sector, energy and transport. Attacks on the media and the medical sector are increasing.

There is also the appearance of a “malware as a service” that allows cyber-hackers to buy and use software developed by other groups of attackers. Finally, more and more attacker groups are now focusing on the faults of providers, partners and suppliers that they use as Trojans to reach major targets (attacks via the supply chain).

“It is a great pride for our teams and Verint’s to unveil today, as part of a cooperation in their area of ​​expertise, a report of this magnitude for which analysts have spent months search, analyze and correlate data. It is clear that as threats multiply and evolve, cybersecurity plays a major role, especially for operators of vital importance. It is our duty to work to analyze, understand and catalog the techniques of cyberattackers, to enable our customers and all businesses and organizations to strengthen their capabilities to detect and anticipate future attacks” Marc Darmon, Deputy Director General, Secure Information and Communication Systems, Thales

“Joining forces with Thales allows us to mutually acquire a thorough and comprehensive knowledge of potential threats and provide the necessary capabilities and solutions in cybersecurity. Verint Cyber ​​Intelligence benefits from years of expertise combined with advanced investigative methods and mastery of critical technologies to prevent cyber attacks before they impact businesses. This report provides cybersecurity experts with a unique insight and knowledge to better anticipate cyber attacks and mitigate their consequences.” Elad Sharon, President, Verint Cyber ​​Intelligence Solutions

No Comments so fars

Jump into a conversation

No Comments Yet!

You can be the one to start a conversation.