Every day, we hear about cyber attacks causing chaos. Unfortunately, these incidents are increasingly linked to human tragedies. It’s not just about the monetary damages caused by financial scams, but also the physical harm inflicted on people.

“We have long recognized that large parts of our civilian infrastructure are critical to our lives and well-being and need special protection”, writes Dr. Simon Wiseman, CTO for Global Governments and Critical Infrastructure at Forcepoint. “Things like our personal finances and energy consumption and distribution. They keep the country going, and without them, we quickly return to the Stone Age.”

According to Dr. Wiseman, the emerging reports highlight more and more areas that are critical. And stakes increase for infrastructure attacks, like the Iranian nation-state ones Albania recently suffered (on a related note, this recent WEF panel discussion with Prime Minister Rama and other experts is well worth a watch). Or when hundreds of patients were denied healthcare across hospitals after a massive ransomware attack.

Dependency makes more things critical

Sometimes technology creates new potential vulnerabilities that we didn’t have to worry about before. As we switch from oil powered to electric cars, for example, we become dependent on highly interconnected and highly vulnerable EV charging points. And these days, as we grow more dependent on using smartphones to communicate multiple times a day, being able to rely on their connectivity is more important than ever, especially during emergencies. In this context, what’s defined as critical infrastructure seems to expand continuously. Perhaps now, we’re better served to ask what infrastructure isn’t critical, rather than what is.

Besides the expanding nature of what can be called critical infrastructure, the other challenge remains to protect it effectively. If we look at modern operating systems, and the applications we use with them, they are packed with security controls – breaking into them should be astonishingly difficult, and yet it doesn’t seem to be.

Technology lag is part of the reason. It’s clear that lots of organizations don’t use the latest equipment both in terms of hardware and software. Many hospitals, for example, use outdated machines simply because they can’t afford to upgrade. It’s a similar story for industrial plants—not because of affordability, but because there are simply few actual opportunities to upgrade.

Analysts tend to skip the origin

When we read reports of a hack in the technical press, we often get some detailed diagnosis of what happened by some researcher who has spent considerable time working out what the attackers did. But rarely does this work tell us how the attack started. Almost always the report is about what the attack did once it got going, and that’s because the evidence is there to analyze, whereas the point of entry is something small and obscure and the evidence is lost or destroyed. Mostly we just hear that somehow the attacker got a victim to run some code that was the initial stage of the attack.

Looking at these reports, it’s obvious that most of them start by the initial victim running the attacker’s code. And as soon as even a little bit of code is run, whether it is a macro or some fileless malware, the attacker then cleverly uses this to run increasingly more complicated code, bootstrapping themselves into a position of total control over your system. A bit like the crack in a dam, that starts with a little trickle but gradually erodes into a stream, then a torrent and finally ends up with a catastrophic failure.

Clear benefits of keeping the attackers out
There are two places where we can fight back. The first is to prevent the attacker from getting a victim to run any code at all. Second, we can stop the attack from spreading from the initial victim to the rest of the system. Both points relate to information sharing, which is absolutely necessary and unavoidable because it essentially functions as a delivery mechanism for an attack. This means we need to get control over the content that is flowing and make sure the information being passed around doesn’t have any code to run. This ought to be really easy — inspect the data that’s passed around and if you see any code block it or remove it. But things are complicated by the fact that code can hide in all sorts of places, so you end up with a fairly complicated system for tracking down the code and eliminating it. This process is called Content, Disarm and Reconstruct.

Yes, there are exceptions, certain people in organizations do need to receive code and distribute it, but they are in a distinct minority – people like the software engineers who built the system – and they need to be tackled separately from the main bulk of users in any organization who just don’t need to pass code around.

Stopping code is a very effective measure. Looking at a collection of 30 million pieces of malware, just over 95% of those samples are code – the rest are malformed data of some kind. Typical anti-virus scanning is at best 90% effective so CDR beats it hands down.

But CDR only works if it can get into the data flows. Unlike anti-virus, it can’t sit on every desktop and check files before they are used – the attack might start before the CDR has a chance to intervene, and the time it takes to clean a whole file would ruin the user’s experience with a noticeable delay. We need to put CDR at the boundary of our systems, between us and the attackers, and also along internal boundaries to stop the spread of an attack that manages to hit its first victim.

Fortunately, the world is moving in a direction that makes this easy: The cloud. As we use central cloud services as the means of sharing information, the cloud service becomes the natural place to tackle malware. CDR can be injected into these services, either directly or by security add-ons such as Cloud Access Security Brokers (CASBs). The old vulnerable equipment used in so many of the systems we rely on doesn’t get touched. The flaws in it remain, but they become inaccessible – the attacker cannot get to them to exploit them. This buys time to get everything updated to the latest and greatest.


If this information is helpful to you read our blog for more interesting and useful content, tips, and guidelines on similar topics. Contact the team of COMPUTER 2000 Bulgaria now if you have a specific question. Our specialists will be assisting you with your query. 

Content curated by the team of COMPUTER 2000 on the basis of news in reputable media and marketing materials provided by our partners, companies, and other vendors.

Follow us to learn more


Let’s walk through the journey of digital transformation together.

By clicking on the SEND button you agree to the processing of personal data. In accordance with our Privacy Policy

2 + 2 =