People ask me all the time – what is it like for a company to be hit by a long term (3 – 6 month) well-coordinated and expertly controlled cyber-attack? I have used several ways to explain it. But it is very hard to visualize the impact of relentless and coordinated attacks that happen day-in and day-out, creating havoc on your systems, network, and employees. After just one week, noticeable fatigue sets in on all resources to include hardware, software, cyber defenses, and yes, even your employees that are trying their best to protect the company.
Ultimately, I think a good comparison for a cyber incident is to an attack by siafu/army ants. Cyber attackers go after a company, much like how siafu/army ants go after their prey, destroying everything in their path.
Cyberattack Example
Here is a scenario of how a cyber-attacker group might operate similarly to a siafu/army ant colony:
- A cyber-attacker group, led by a hacker known as "Queeney," decides to target your company (ABC Inc).
- Queeney recruits other hackers to join the group, assigning each group of hackers roles, such as "Reco" for reconnaissance and "Covert" for launching attacks.
- The group establishes a bivouac in a hidden server network.
- Worker ants (hackers) like Reco identify vulnerabilities in ABC Inc.'s systems.
- Queeney, like the queen ant, plans and coordinates attacks based on the information gathered by Reco.
- Covert, the soldier ants, launch attacks against ABC Inc.'s systems over a period of 3-6 months, aiming to steal data or disrupt operations.
Here is how cyber-attackers and siafu/army ants are similar.
Leadership and Hierarchy:
- Siafu/army Colony: The colony revolves around the queen ant. She gives pheromone orders about what to do, where to go, and how to bug out (literally, dictating tasks, reproduction, and even escape routes. Soldier ants are her muscle, protecting the queen and the whole colony. The rest, the worker ants, are busybodies doing everything else.
- Cyber-attacker Group: Mirroring the ant colony's structure, cyberattack groups often have a single charismatic leader who is the kingpin of the operation, similar to the queen ant. This tech wiz leader, like Queeney in our previous example, calls the shots, picks targets, and decides how long the attacks last. Lower-level hackers function like worker ants. Some specialize in reconnaissance, finding weaknesses in the target company's defenses, just like worker ants searching for food sources. Others act as soldier ants, launching attacks to steal data or disrupt operations.
Bivouac and Base of Operations:
- Siafu/army Colony: These guys don't settle down and are always on the move. Army ant colonies are nomadic. They establish temporary resting sites called bivouacs every few weeks. These bivouacs are constructed from leaves and silk produced by the ants themselves, offering protection and a centralized location for the colony.
- Cyber-attacker Group: Cyber attackers also create a base of operations (their on-line bat cave) as their virtual bivouac. This could be a single server or a network of compromised computers across the globe. It serves as their central hub for planning, communication, and launching attacks. Just like the ants rebuild their bivouac every few weeks, cyber attackers relocate their bases when they fear detection.
Communication and Coordination:
- Siafu/army Colony: Army ants communicate through pheromones, which are chemical signals that leave scent trails. These trails guide other ants to food sources, away from danger zones, and to new nesting sites.
- Cyber-attacker Group: While less biologically sophisticated than pheromones, cyber attackers rely on encrypted communication channels to exchange information and coordinate attacks. They might use messaging apps, online forums, or even hacked communication servers to maintain secrecy.
Relentless Pursuit of Objectives:
- Siafu/army Colony: Army ant colonies are known for their relentless pursuit of prey. Once they locate a food source, they swarm it in overwhelming numbers, working together to take down prey much larger than themselves.
- Cyber-attacker Group: Cyber attackers, like army ants, exhibit similar persistence. They'll swarm in and launch continuous attacks over a period of months, relentlessly probing for weaknesses and exploiting them to achieve their goals. Their constant pressure and numbers can be incredibly difficult for the target company to defend against.
In conclusion, cyberattack groups and siafu/army ant colonies share some surprising similarities in their social organization, leadership, communication, planning, and use of a central base. However, there are also key differences between these two groups. Army ant colonies are driven by instinct and survival needs. Their complex social structures evolved to ensure the colony's survival and propagation. Cyber attackers, on the other hand, are driven by motives like financial gain, revenge, or simply the thrill of the challenge. Their goals are destructive, causing disruption and chaos.
Explore Altiam Digital Cybersecurity Solutions.