Reverse Deception: Organized Cyber Threat Counter-Exploitation (110 page)

Read Reverse Deception: Organized Cyber Threat Counter-Exploitation Online

Authors: Sean Bodmer

Tags: #General, #security, #Computers

BOOK: Reverse Deception: Organized Cyber Threat Counter-Exploitation
3.91Mb size Format: txt, pdf, ePub

Juniper Networks is next on the list of victims. Juniper is a perfect organization to embed an APT. Its innovative approach to solving legacy networking issues has put it at the forefront and made it one of the most sought-after companies in network routing technology. Juniper is a diverse company that has network components and solutions in companies throughout the world. According to the Juniper website, “Our customers include the top 130 global service providers, 96 of the Global Fortune 100, as well as hundreds of federal, state and local government agencies and higher education organizations throughout the world” (
www.juniper.net/us/en/company/careers/sales-careers/
).

What’s a better target than the core/backbone of the infrastructure? With an APT infecting the infrastructure in Juniper, there is ample opportunity to stage other attacks or pick and choose which intellectual property is most inviting. Having access into Juniper could very well put an adversary in a position to gain access to information on closed networks or other government-sensitive networks.

Access to a local government’s information and networks could cripple a town or complicate activities with computer systems. These local government systems may be designed to control the overflow gates at a reservoir, control the traffic lights in town, or manage the environmental controls of historical documents. Even worse, threats can be introduced into the network of a local hospital that manages the critical-care unit!

Step 4: Diversify Commercial Offerings (Victim: Canadian Dow Chemical)

Dow Chemical is an international powerhouse with worldwide sales of more than $57 billion. Its products are manufactured in 35 countries, and it has customers in over 160 countries. Dow Chemical’s intellectual property is immense, as is its corporate knowledge of its customers. An APT inside Dow could yield information of a broad spectrum that would be of interest to nefarious characters. More deviant individuals would probably have targeted Dow’s formulas—turning stable compounds into deadly ones. You can see why a nation-state or terrorist organization might attempt to gain access to a company like this. APT access could also mean that, at some point in the future, Dow should expect a resurgence of issues.

Dow Chemical is an interesting company, offering solutions in many diverse markets and economic systems. Dow has diversified over the years, which has made the company an international giant. From the adversaries’ perspective though, it makes Dow the perfect target, considering it provides services and goods in to the following markets (per Dow Chemical’s webpage at
www.dow.com/products/food_and_related/landing.page?industry=1000414
):

Agriculture and food
Building and construction
Electronics and entertainment
Health care and medical
Household goods and personal care
Industrial
Oil and gas
Packaging, paper, and publishing
Plastics
Transportation
Utilities
Water and process solutions

Other books

Nuworld: Claiming Tara by Fitzgerald, Laurie
Thieftaker by D. B. Jackson
Break Me by Lissa Matthews
Spirit Storm by E.J. Stevens
A Separate Country by Hicks, Robert
El caos by Juan Rodolfo Wilcock
Fire and Forget by Matt Gallagher
The Barbarian Nurseries by Héctor Tobar