Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Nation-state attacks are hard to spot. It’s time for a new approach to threat detection

By Mary Roark
network-security-freepik1170.jpg

Image via Freepik

May 11, 2022

Nation-state threat actors are fast emerging as one of the biggest security challenges facing nearly all organizations in light of the Ukraine crisis. Hackers that are either directly sponsored by nation-states or are simply given the leeway to act, have the time and resources to launch potentially devastating attacks against public and private sector organizations. One recent study suggests a 100% increase in significant nation-state incidents between 2017 and 2020, with enterprises now the most common target. 


The threat posed by nation-state hackers is back in the spotlight with the growing concern over Russian-backed cyberattacks. As the war in Ukraine ensues, the Cybersecurity and Infrastructure Security Agency (CISA) warned that malicious malware against organizations in Ukraine may spread to businesses in other countries. A threat like this can infiltrate a business’ network, cutting off access to critical data. 


To put these types of threats into perspective, last year, a group of criminals exploited critical vulnerabilities in the Pulse Secure VPN to bypass two-factor authentication and access data from a wide variety of U.S. and European Defense firms and government agencies. Significantly, at least one of the security flaws exploited by the hackers was zero-day, meaning that the security industry was effectively blindsided by the attack.


Breaches do not get much more serious than this. By managing to side-step two-factor authentication, the hacker strikes at the heart of a fundamental tool of modern enterprise security and the only line of defense for many applications. Moreover, these types of attacks are also almost impossible to detect. This is because once hackers gain initial access to a victim’s network, they can move laterally to establish a connection with a command and control (C&C) server, which they then use to communicate with and exfiltrate data. 


The Limits of Intrusion Detection

What can organizations do to protect against unknown threats that penetrate the network? What’s clear is that traditional intrusion detection systems (IDS) are unlikely to deliver the various forms of detection required. IDS techniques only work for known threats — they rely on a library of signatures and known behavior to identify breaches and alert the security team. With zero-day attacks, these signatures don’t exist, so the breach goes undetected. 


Network Pattern Analysis

Sensors can now be embedded into networks to monitor traffic as it flows not only “north-west” as a traditional firewall would detect but also “east-west” (i.e., from server to server within a customer’s network or from one virtual cloud to another). This data can then be interrogated by machine learning-based ML/AI models to understand the baseline of normal network activity. From there, any east-west communications that differ from this baseline can be flagged instantly for further investigation — if unusual lateral movement is detected from a server that typically is used to house a database, for example. With the increase in cloud apps and global collaboration by employees working from home and from various corporate and personal devices — detecting a “bad actor” is increasingly difficult for security teams. The hope is that the next generation of threat detection — one that is behavior-based — provides security responders with rapid, high-fidelity alerts that enable them to stop attacks in their tracks, zero-day or otherwise. But that would be utopia, and we don’t live in a utopia.    


As anyone who has worked in security long enough knows, there is never one silver bullet to solve threats on the scale posed by nation-state hackers or insiders, especially with vulnerabilities like Log4j. If anything, the simplicity and complexity of such attacks underline the need for organizations to adopt a layered security model. 


Sync Security with DevOps

In this case, organizations should look beyond network-based threat detection and user/endpoint behavior analytics and seek to embed security within the DevOps cycle. 


When security is an afterthought in the development lifecycle, vulnerabilities can creep into code. In such cases, vulnerabilities are often only exposed when a system is in production or, worse, when an organization is hacked. As well as exposing the business to unnecessary risk, costs mount up as time and resources are spent trying to find the root cause of a security issue. 


Conversely, by incorporating security into the development process early, fewer resources are required to identify and repair vulnerabilities.


Because data breaches are becoming increasingly common, business leaders should look to encourage a shift in mindset and culture so that security runs through the organization from the initial design of any app. 


Additionally — and specific to the zero-day threat — arming DevOps teams with testing tools and processes, organizations can better understand communication patterns and destinations to help identify C2 Tunnels (i.e., a technique that hackers often use to communicate with networks), allowing teams to identify stealthy lateral movements and ultimately protect data from being stolen. 


Monitor All, Not Just Stealth Attackers 

Nation-state hackers operate differently than those solely motivated by money. The latter often don’t care if they are noticed, so long as they can get away with monetizable or high reputational damage data. Indeed, ransomware attacks are entirely predicated on the victim knowing they’ve been hacked. 


Conversely, nation-states will often hope to go unnoticed. The longer they’re roaming around your network, the better they can understand their target and, ultimately, the more data they can slowly exfiltrate. Unfortunately, in many cases, they have been in stealth mode for over a year, and in others, their stealth activity will be perceived as normal. However, no matter how subtle the hack, at some point, activity needs to happen on the network for attackers to carry out their objectives. When that happens, it’s the organizations that are vigilant and tracking all behavior and monitoring all network traffic in real-time for anomalous lateral movement or unusual server command and control (C2) communications which will be best positioned to intervene or stop an attack before data is lost and the damage is done.


Two Things Needed to Detect C2

In order to detect C2, organizations need to monitor all network communications or the portion of network communications that access their most valuable assets. First, organizations need to assess what assets are vital to their operations and profitability and prioritize understanding and monitoring the access to those assets. 


The best way to monitor your network is with Network Detection and Response (NDR) solutions that capture information about your communications to establish a baseline of your communication patterns. Next, decide how intensely you need to monitor your network communications. NDR solutions can be simple such as notifying if communications are established to a known bad location based on IP address or country. (For example, an IP address in a country which your business does not have employees or does business with. For many, that is now any IP address in Russia.) 


An alternative is to collect metadata from packets or store all packets of communication for further analysis if an incident needs to be investigated. 


In many cases, those that depend on a high volume of financial transactions for their business will capture all packets. Unfortunately, collecting all packets can be expensive; more and more solutions create metadata about the communications capturing important information from the communication protocols. The most modern NDR solutions correlate a series of alerts and use rules to determine if there is a need to alert of suspicious behavior. The challenge with NDR is noise. For many, it begins to appear as though regular normal business sets off too many alarms (too many false positives). Identifying an NDR solution that can be configured to alert the organization regarding potentially suspicious network activity without overwhelming IT and security teams with too many alerts is the balance that every organization needs to achieve to fight nation-state threats and the proliferation of increasingly sophisticated zero-day attacks.


Hopefully, the fear of nation-state attacks will motivate organizations to adopt NDR tools which have become much more user-friendly with instructional guided user interfaces. Many show the progression of attacks against popular frameworks like the MITRE ATT&CK framework so that novice threat hunters can follow the progression of an attack and see what the root cause might have been and how long an attacker has been lurking. The time to adopt NDR is now.

KEYWORDS: cyber security nation-state attack network monitoring risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mary roark headshot

Mary Roark is a cybersecurity thought leader. With over 30 years of technology experience, she serves as the VP of Cybersecurity Strategy at Accedian. She holds a CISSP certificate and has been an evangelist across various areas of security while at RSA Security, Sophos, and security start-ups. She also held leadership positions in telco and technology marketing at AT&T, Microsoft, Nortel Networks, and Unisys. She holds a Bachelor’s in Electrical Engineering from the University of Arizona and an MBA from the Stern School of Business at New York University. As a Hispanic female, she hopes to encourage more diverse talent to tackle the challenges society faces with keeping data secure.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Gavel

    DOJ announces new cyber unit to prosecute nation-state threat actors

    See More
  • SEC0120-insider-Feat-slide1_900px

    Rethinking "Red Flags" - A New Approach to Insider Threats

    See More
  • Five hands circled together

    The new normal: How to embrace a cultural approach to zero trust

    See More

Events

View AllSubmit An Event
  • August 27, 2025

    Risk Mitigation as a Competitive Edge

    In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!