How A Cyber Attack Resembles an Attack by Army Ants

Art Burt
4/16/2024
min read

People ask me all the time – what is it like for a company to be hit by a long term (3 – 6 month) well-coordinated and expertly controlled cyber-attack? I have used several ways to explain it. But it is very hard to visualize the impact of relentless and coordinated attacks that happen day-in and day-out, creating havoc on your systems, network, and employees. After just one week, noticeable fatigue sets in on all resources to include hardware, software, cyber defenses, and yes, even your employees that are trying their best to protect the company.  

Ultimately, I think a good comparison for a cyber incident is to an attack by siafu/army ants. Cyber attackers go after a company, much like how siafu/army ants go after their prey, destroying everything in their path.  

Cyberattack Example

Here is a scenario of how a cyber-attacker group might operate similarly to a siafu/army ant colony:

  • A cyber-attacker group, led by a hacker known as "Queeney," decides to target your company (ABC Inc).
  • Queeney recruits other hackers to join the group, assigning each group of hackers roles, such as "Reco" for reconnaissance and "Covert" for launching attacks.
  • The group establishes a bivouac in a hidden server network.
  • Worker ants (hackers) like Reco identify vulnerabilities in ABC Inc.'s systems.
  • Queeney, like the queen ant, plans and coordinates attacks based on the information gathered by Reco.
  • Covert, the soldier ants, launch attacks against ABC Inc.'s systems over a period of 3-6 months, aiming to steal data or disrupt operations.  

Here is how cyber-attackers and siafu/army ants are similar.

Leadership and Hierarchy:
  • Siafu/army Colony: The colony revolves around the queen ant. She gives pheromone orders about what to do, where to go, and how to bug out (literally, dictating tasks, reproduction, and even escape routes. Soldier ants are her muscle, protecting the queen and the whole colony. The rest, the worker ants, are busybodies doing everything else.
  • Cyber-attacker Group: Mirroring the ant colony's structure, cyberattack groups often have a single charismatic leader who is the kingpin of the operation, similar to the queen ant. This tech wiz leader, like Queeney in our previous example, calls the shots, picks targets, and decides how long the attacks last. Lower-level hackers function like worker ants. Some specialize in reconnaissance, finding weaknesses in the target company's defenses, just like worker ants searching for food sources. Others act as soldier ants, launching attacks to steal data or disrupt operations.
Bivouac and Base of Operations:
  • Siafu/army Colony: These guys don't settle down and are always on the move. Army ant colonies are nomadic. They establish temporary resting sites called bivouacs every few weeks. These bivouacs are constructed from leaves and silk produced by the ants themselves, offering protection and a centralized location for the colony.
  • Cyber-attacker Group: Cyber attackers also create a base of operations (their on-line bat cave) as their virtual bivouac. This could be a single server or a network of compromised computers across the globe. It serves as their central hub for planning, communication, and launching attacks. Just like the ants rebuild their bivouac every few weeks, cyber attackers relocate their bases when they fear detection.
Communication and Coordination:
  • Siafu/army Colony: Army ants communicate through pheromones, which are chemical signals that leave scent trails. These trails guide other ants to food sources, away from danger zones, and to new nesting sites.
  • Cyber-attacker Group: While less biologically sophisticated than pheromones, cyber attackers rely on encrypted communication channels to exchange information and coordinate attacks. They might use messaging apps, online forums, or even hacked communication servers to maintain secrecy.
Relentless Pursuit of Objectives:
  • Siafu/army Colony: Army ant colonies are known for their relentless pursuit of prey. Once they locate a food source, they swarm it in overwhelming numbers, working together to take down prey much larger than themselves.
  • Cyber-attacker Group: Cyber attackers, like army ants, exhibit similar persistence. They'll swarm in and launch continuous attacks over a period of months, relentlessly probing for weaknesses and exploiting them to achieve their goals. Their constant pressure and numbers can be incredibly difficult for the target company to defend against.

In conclusion, cyberattack groups and siafu/army ant colonies share some surprising similarities in their social organization, leadership, communication, planning, and use of a central base. However, there are also key differences between these two groups. Army ant colonies are driven by instinct and survival needs. Their complex social structures evolved to ensure the colony's survival and propagation. Cyber attackers, on the other hand, are driven by motives like financial gain, revenge, or simply the thrill of the challenge. Their goals are destructive, causing disruption and chaos.

Explore Altiam Digital Cybersecurity Solutions.  

Art Burt

Related posts

Keep exploring!

Robotic Process Automation (RPA) Action and Information: Which Is More Valuable?

Robots are cute, but what they can tell you about your business is powerful. Don't be fooled by their perky antennae and happy faces - robots mean business!

Wayne White
10/25/2023
7
min read

New Year, New CISO (AGAIN!)!

The new year will bring-in new threats. Company leadership (CXO & Board) is vital for prevention and recovery.

Tina Valdez
10/31/2023
7
min read

It is Time for Boards to Deal with Their Risk - The Problem with Drift and How Foundational Oversight Will Help

"Drift" is super cool on the race track, but it is the silent security risk in your IT environment. This article focuses on how boards can beat it back.

Wayne White
11/13/2023
7
min read