Reverse Deception: Organized Cyber Threat Counter-Exploitation (110 page)

Read Reverse Deception: Organized Cyber Threat Counter-Exploitation Online

Authors: Sean Bodmer

Tags: #General, #security, #Computers

BOOK: Reverse Deception: Organized Cyber Threat Counter-Exploitation
5.79Mb size Format: txt, pdf, ePub

Juniper Networks is next on the list of victims. Juniper is a perfect organization to embed an APT. Its innovative approach to solving legacy networking issues has put it at the forefront and made it one of the most sought-after companies in network routing technology. Juniper is a diverse company that has network components and solutions in companies throughout the world. According to the Juniper website, “Our customers include the top 130 global service providers, 96 of the Global Fortune 100, as well as hundreds of federal, state and local government agencies and higher education organizations throughout the world” (
www.juniper.net/us/en/company/careers/sales-careers/
).

What’s a better target than the core/backbone of the infrastructure? With an APT infecting the infrastructure in Juniper, there is ample opportunity to stage other attacks or pick and choose which intellectual property is most inviting. Having access into Juniper could very well put an adversary in a position to gain access to information on closed networks or other government-sensitive networks.

Access to a local government’s information and networks could cripple a town or complicate activities with computer systems. These local government systems may be designed to control the overflow gates at a reservoir, control the traffic lights in town, or manage the environmental controls of historical documents. Even worse, threats can be introduced into the network of a local hospital that manages the critical-care unit!

Step 4: Diversify Commercial Offerings (Victim: Canadian Dow Chemical)

Dow Chemical is an international powerhouse with worldwide sales of more than $57 billion. Its products are manufactured in 35 countries, and it has customers in over 160 countries. Dow Chemical’s intellectual property is immense, as is its corporate knowledge of its customers. An APT inside Dow could yield information of a broad spectrum that would be of interest to nefarious characters. More deviant individuals would probably have targeted Dow’s formulas—turning stable compounds into deadly ones. You can see why a nation-state or terrorist organization might attempt to gain access to a company like this. APT access could also mean that, at some point in the future, Dow should expect a resurgence of issues.

Dow Chemical is an interesting company, offering solutions in many diverse markets and economic systems. Dow has diversified over the years, which has made the company an international giant. From the adversaries’ perspective though, it makes Dow the perfect target, considering it provides services and goods in to the following markets (per Dow Chemical’s webpage at
www.dow.com/products/food_and_related/landing.page?industry=1000414
):

Agriculture and food
Building and construction
Electronics and entertainment
Health care and medical
Household goods and personal care
Industrial
Oil and gas
Packaging, paper, and publishing
Plastics
Transportation
Utilities
Water and process solutions

Other books

Devils on Horseback: Nate by Beth Williamson
Romeo's Ex by Lisa Fiedler
Jade Island by Elizabeth Lowell
The Girl With No Past by Kathryn Croft
In the Shadow of Evil by Robin Caroll
Red Mist by Patricia Cornwell
Trust (Blind Vows #1) by J. M. Witt
The Old Deep and Dark by Ellen Hart
I Spy Dead People by Jennifer Fischetto