Citrix Blogs

Defending your organization against state-sponsored cyber campaigns

Earlier this month, Ukraine was the target of a series of cyberattacks, alleged to be part of a larger hybrid warfare campaign conducted by Russia. While geopolitical issues are beyond the scope of this blog post, these attacks should serve as a reminder for us all to pause and evaluate the impact state-sponsored cyber campaigns can have on enterprises and their InfoSec strategies, and what actions they can take.

How Do State-Sponsored Cyberattacks Affect Us?

“The supreme art of war is to subdue the enemy without fighting.” — Sun Tzu, The Art of War

The goal of these kinds of cyberattacks is typically to cripple critical services the country’s military and citizens rely on, often in advance of conventional war. They divert the attention of political leaders, fuel domestic unease, and affect military morale, all aimed at weakening an adversary before any conventional tactics are even used. Such campaigns are often covert, can be seeded in “peaceful” times, and can extend over long periods.

Unfortunately, the battleground for these cyber campaigns can be your IT infrastructure. The Cybersecurity and Infrastructure Security Agency (CISA) identifies 16 critical sectors “whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof.” By encrypting critical information with or without ransomware demands; launching Tbps-scale DDoS attacks, and in worse cases; and controlling operational technology (OT) networks (with initial access gained through IT networks), attackers can cause economic, political, and social chaos.

Add to that espionage. Targeting of public and private sector organizations by foreign intelligence services is an old tactic, but the use of malware to steal trade secrets like blueprints and source code is relatively new. This can affect a targeted company’s ability to compete in the market and lead to reputational damage as well as legal and other costs.

Actions You Can Take Today

Advanced persistent threat (APT) groups that launch highly focused, sophisticated, and well-funded campaigns often drive state-sponsored cyberattacks. But even APTs tend to reuse familiar tactics such as spear phishing, brute force access (through commonly used and stolen credentials), and command-and-control connections via a domestic proxy. CISA outlined critical mitigation mechanisms against common attack tactics in a January 11 alert. But in addition to enforcing appropriate tools and policies, InfoSec leaders have a critical role to play, as well. Let’s look at three things they can do.


Two-thirds of organizations (66 percent) are actively consolidating the number of cybersecurity vendors they do business with. — ESG


Those are just three ideas to help you get started. Conflicts between nations extend into the cyber world today and can affect everyone. Our opportunity here is to share best practices and threat insights and collaborate to ensure everyone, everywhere is protected and to reduce the efficacy of cyber campaigns. Ultimately, this will require changes in government policy, business cultures, and how vendors partner with each other. It’s an ambitious goal, but it’s one worth striving for.

As always, Citrix is happy to advise and assist your organization in its cybersecurity efforts. Reach out to us so we can help you get started.

Exit mobile version