To make random reflections on random subjects including the subject of randomness itself.
Sunday
The 36 Stratagems for Cyber Attacks
No one can say for certain who wrote these 36 martial proverbs; however, some Chinese historians date them as far back as the Southern Qi dynasty (479–502), which was about 1,000 years after Sun Tzu wrote The Art of War. The 36 stratagems have a darker connotation than The Art of War, focusing solely on acts of trickery, mischief, and mayhem—more the province of spies than soldiers. This makes the ancient document an inspiring resource for today’s Chinese nonstate hackers, who rely on creating ruses to trick unsuspecting Internet users into leaving the safety of their firewalls for dangerous terrain. It’s also interesting to note that, unlike Russia, since 2011 China has never engaged in military action where cyber warfare was a component, allegedly opting instead for acts of cyber espionage:
Stratagem #3: “Kill with a borrowed knife”
This stratagem advises “Attack using the strength of another (in a situation where
using one’s own strength is not favourable).”
This could just as easily apply to the use of botnets as a means to launch DDOS attacks.
Stratagem #8: “Openly repair the gallery roads, but sneak through the passage of Chencang”
This stratagem advises “Deceive the enemy with an obvious approach that will take a very long time, while surprising him by taking a shortcut and sneak up to him. As the enemy concentrates on the decoy, he will miss you sneaking up to him.”
Use backdoors or Trojan worms when attacking a network.
Stratagem #10: “Hide a knife behind a smile”
This stratagem advises “Charm and ingratiate yourself with your enemy until you
have gained his trust. Then move against him.”
This could describe phishing schemes or other social engineering attacks.
Stratagem #15: “Lure the tiger out of the mountain”
This stratagem advises “Hold out baits to entice the enemy.” This refers to luring an opponent from a position of strength, such as being protected by a firewall and updated anti-virus program, to a position of weakness or vulnerability.
One way to accomplish this is with the adoption of social engineering techniques to get the target to accept a fake email as genuine and open a compromised attachment or click on an infected link.
Stratagem #17: “Tossing out a brick to get a Jade gem”
This stratagem advises “Bait someone by making him believe that he gains something and obtain something valuable from him in return.”
This could equate to a social engineering technique used to get the target to click on a link or visit a website where information will be covertly collected without his knowledge.
Stratagem #30: “The honey trap”
This stratagem advises “Send your enemy beautiful women to cause discord within his camp.”
In contemporary computer parlance, this could refer to a honey pot, which lures visitors to a rigged site that collects information about them.
The 36 stratagems, like The Art of War, still plays a large role in shaping Beijing’s military strategy. Western policymakers should be familiar with both historical documents if they wish to understand the strategy underpinning the Chinese threat landscape.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Your comment is not allowed and automatically deleted by robots if:
1. You have no good things to say.
2. Your criticism is not based on facts and immaterial on the issues discussed.
3. Your facts or opinions are hearsays.
4. You hide in a veil of anonymity and you have no courage to reveal yourself.
5. Remember most people are are so opinionated about things, and they don't even know what they're talking about, or can't even do it themselves.