Skip to Main Content
Cyber Operations
book

Cyber Operations

by Jerry M. Couretas
April 2024
Intermediate to advanced content levelIntermediate to advanced
320 pages
8h 58m
English
Wiley
Content preview from Cyber Operations

16Iran, China, and DPRK Cyber Operations and Tools

16.1 China, DPRK, and Iran Cyber Operations and Tools

China, the DPRK, and Iran are known to perform cyber operations, often with an economic or espionage focus. For example, in Section I, we looked at the development of Chinese cyber operations from patriotic hacktivists to strategic espionage collections. Similarly, Iran attempted to shut down international finance and oil production in the wake of STUXNET. The DPRK, however, is more focused on money, said to fund up to 1/3 of their nuclear weapons program through cyber theft. While the impact of each of these cyber operations is unprecedented in the pre‐cyber age, each player’s methods and tools have parallels in a focus on tradecraft with limited technical development.

16.1.1 Chinese Cyber Operations

Chinese cyber operations include a heavy reliance on tradecraft. For example, Operation Night Dragon (2011–2013), a probing of U.S. critical infrastructure systems, was an unexpected cyber surveillance operation that relied heavily on social engineering for system access.

16.1.1.1 2011—2013 Operation Night Dragon (CISA, 2021) (China)

While technical tools are important, especially when keeping track of the most recent vulnerability exploits (e.g., zero days), a lot of cyber targeting still focuses on the people running the networks and their system‐level access. For example, with the U.S. announcing a “pivot to Asia” in 2011, Chinese cyber actors stepped up their attacks, ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Inside Cyber Warfare, 3rd Edition

Inside Cyber Warfare, 3rd Edition

Jeffrey Caruso
Cyber Threat Hunting

Cyber Threat Hunting

Nadhem AlFardan
Practical Cyber Intelligence

Practical Cyber Intelligence

Adam Tilmar Jakobsen

Publisher Resources

ISBN: 9781119712091Purchase Link