Destructive Malware and Interstate Rivalries: The Evolution of Digital Weapons and Geopolitical Conflict

Presented at BSidesLV 2017, July 25, 2017, 11:30 a.m. (55 minutes)

Global stability is more precarious than at any time since the end of the cold war. At the same time, the mass proliferation of digital weapons, including destructive wiper malware, is lending new meaning to asymmetric capabilities. Unsurprisingly, some states are empirically more conflict prone than others, and it is these interstate rivalries that exhibit a higher propensity to use destructive wiper malware. Within this strategic backdrop, we'll walk through the evolution of wiper malware through a series of real-world examples of its role in interstate rivalries. This includes both the technical features and modes of compromise, as well as its strategic effects and key role in escalating tensions between these conflict-prone states. We'll conclude with an interactive discussion of the evolution and integration of wiper malware with ransomware, as well as what the proliferation of these digital weapons forebodes for geopolitical rivalries and future conflict.


Presenters:

  • Andrea Little Limbago - Chief Social Scientist - Endgame
    Dr. Andrea Little Limbago is the Chief Social Scientist at Endgame, researching and writing on geopolitics and cybersecurity, data science, and directing the company's technical content. Her writing has been featured in numerous outlets, including Politico, the Hill, and Christian Science Monitor. She has previously worked in academia and the Department of Defense. Andrea holds a PhD in Political Science from the University of Colorado at Boulder, where she taught a variety of international relations and foreign policy courses, and a Bachelor's degree from Bowdoin College.
  • Mark Dufresne - Director, Threat Research and Adversary Prevention - Endgame
    Mark Dufresne is the Director of Threat Research and Adversary Prevention at Endgame. He is responsible for Endgame's efforts to understand cyber threats and develop capabilities to detect and prevent malicious adversary techniques. Prior to joining Endgame, Mark worked at NSA for over a dozen years in various aspects of offensive and defensive cyber operations.

Links:

Similar Presentations: