Las nuevas armas de la ciberguerra
Introduction to Modern Warfare and Cyber Warfare
The speaker discusses the emergence of modern warfare systems, including cyber warfare. They emphasize that anyone working behind a computer is a potential target for attackers. The importance of understanding cybersecurity and the potential consequences of being hacked are highlighted.
New Systems of Modern Warfare
- Modern warfare includes cyber warfare or cyber guerra.
- Anyone working behind a computer is a potential target for hackers.
- Companies are at risk of being hacked, and it is likely that most companies will experience hacking incidents.
Ukrainian Intelligence Attack on Russian Tax System
- On December 12th, Ukrainian intelligence attacked and paralyzed the Russian tax system.
- The attack encrypted and deleted data, including backups, preventing Russia from collecting taxes from its citizens.
- This attack was one of the largest denial-of-service attacks in history, causing significant disruption to Ukraine's telecommunications operator.
Physical Attacks Combined with Cyber Warfare
- Ukraine experienced physical missile attacks that disrupted their connectivity for several hours or even days.
- These attacks were combined with cyber warfare tactics to create maximum impact.
- It serves as a reminder that modern warfare systems include cyber warfare.
Impact of Electronic Warfare on Synchronization Systems
The speaker explains how electronic warfare can disrupt synchronization systems used in various infrastructures worldwide. They discuss the use of GPS jamming by Russia in Ukraine and how it affects critical infrastructure like electricity grids.
Importance of Synchronization in Infrastructure
- Many infrastructure systems rely on precise synchronization using atomic clocks to maintain accurate time globally.
- Electric power stations, train stations, and other public utility infrastructure require synchronized timekeeping regardless of their location.
GPS Jamming by Russia
- Russia employs electronic warfare techniques such as GPS jamming to interfere with satellite signals.
- Without GPS signals, atomic clocks on board satellites cannot synchronize, leading to potential problems in electric power systems.
Mitigating GPS Jamming Effects
- Companies like Cisco are developing hardware solutions that include internal oscillators to replace the reliance on GPS signals for synchronization.
- These measures aim to ensure the stability and functionality of critical infrastructure systems.
Russian Cyber Warfare Tactics and NSA Weapons
The speaker discusses Russian cyber warfare tactics and their use of weapons obtained from the National Security Agency (NSA) of the United States. They highlight the potential dangers when cyber weapons fall into the wrong hands.
Discovery of Russian Malware
- Malware created by Russia has been infecting systems worldwide, initially targeting Ukraine but now appearing globally.
- The viruses are designed to attack various targets, including businesses, regardless of geographical location.
Use of NSA Weapons by Russia
- The speaker reveals that Russia is using weapons obtained from the NSA, which were leaked by Edward Snowden.
- This highlights the unintended consequences when cyber weapons developed for defense purposes end up being used by other entities.
Sandworm Group and Economic Impact
The speaker discusses the Sandworm group, believed to be an internal group within the Russian government responsible for cyber attacks. They also mention how companies have been targeted with ransomware attacks using hacking tools designed by Russia.
Sandworm Group and Vulcan Files
- The Sandworm group is associated with a system called Vulcan, known for its scanning capabilities and hacking activities.
- This group has caused significant disruptions in Ukraine's electrical systems multiple times and launched disruptive attacks during events like the Olympics in South Korea.
Economic Impact of Ransomware Attacks
- Many companies experience ransomware attacks where files are encrypted, and a ransom is demanded for their release.
- These attacks often utilize hacking tools designed by Russia, causing significant economic damage.
Importance of Cybersecurity for Employees
The speaker emphasizes the importance of cybersecurity for all employees within an organization. They discuss the prevalence of daily hacking incidents and the need for cybersecurity training to prevent attacks.
Cybersecurity Training for Employees
- All employees who work with computers are potential targets for hackers.
- Many companies, including those in Latin America, experience daily hacking incidents.
- The workshop aims to provide cybersecurity training to individuals without prior knowledge in order to protect organizations from automated attacks.
Conclusion
England's Treasury Department is hiring a cybersecurity director with an annual salary of £55,000. However, this salary is considered low for living in London.
Government jobs are no longer desirable due to low pay and lack of competitiveness compared to other sectors. China, on the other hand, is actively investing in cybersecurity by recruiting retired soldiers with expertise in the field.
Russia is using its cybersecurity systems not only for specific attacks but also to spread disinformation through verified Twitter accounts.
The future of warfare and security lies in cyberspace. Governments need to be prepared for cyberattacks as they can have severe consequences.
Recent research shows that it is possible to reconstruct images from brain scans using machine learning algorithms. This raises concerns about privacy and potential misuse by authoritarian governments.
Cybersecurity threats are not limited to individuals or wealthy organizations. Even developing countries can become targets of hacking groups like Lazarus Group, which has targeted banks and entertainment companies.
The MGM casino hack was carried out using vishing (voice phishing), highlighting the vulnerability of even large organizations to cyberattacks.
- England's Treasury Department is hiring a cybersecurity director with a low salary for living in London.
- Government jobs are no longer attractive due to low pay.
- China is actively recruiting retired soldiers with cybersecurity expertise.
- Russia uses its cybersecurity systems for attacks and spreading disinformation.
- Cybersecurity threats are a concern for governments worldwide.
- Research shows the possibility of reconstructing images from brain scans using machine learning.
- Cybersecurity threats can affect individuals and organizations of all sizes, including developing countries.
Hackers Impersonating CEO and Voice AI
This section discusses a hacking technique where hackers impersonate the voice of a CEO using artificial intelligence (AI). They call the receptionist, pretending to be the CEO, and convince them to perform actions that compromise the company's network security.
Hackers use voice AI to impersonate CEO
- Hackers use AI technology to train their voices to sound like the CEO.
- They call the receptionist and pretend to be the CEO, urgently requesting them to perform certain tasks on their computer within a limited time frame.
- The receptionist, believing it is the CEO, follows their instructions and unknowingly opens up the network to attackers.
Importance of cybersecurity training
- The speaker highlights that even in this case, where their own team at Platzi was involved in training voice AI for security purposes, they were able to successfully impersonate someone.
- It emphasizes the importance of cybersecurity training for individuals and organizations.
- Platzi has rebuilt its cybersecurity school from scratch with courses on both general cybersecurity for anyone and specialized courses for professionals responsible for protecting company networks.
Xiaomi browsers collecting user data
- The speaker warns about privacy concerns related to Xiaomi smartphones' browsers.
- Xiaomi's Mi Browser Pro and Mint Browser are reported to collect users' browsing information and send it back to China without their knowledge or consent.
- This data collection can lead to identity theft or other malicious activities.
Pegasus spyware by NSO Group
- The NSO Group, an Israeli company, developed Pegasus spyware capable of hacking iPhones and WhatsApp accounts.
- The Saudi Arabian government infamously used Pegasus spyware to hack Jeff Bezos' WhatsApp account, leading to his divorce.
- Apple constantly releases security updates to counteract the Pegasus spyware.
Potential misuse of hacking tools
- The speaker warns that hacking tools like Pegasus can fall into the wrong hands, including authoritarian governments.
- Governments have used such tools to spy on their citizens and suppress dissent.
- It emphasizes the need for individuals and organizations to be prepared for cybersecurity attacks in an increasingly interconnected world.
Importance of Cybersecurity Training
This section emphasizes the importance of cybersecurity training for individuals and organizations. It discusses how Platzi has developed comprehensive courses in cybersecurity to help protect companies from cyberattacks.
Importance of cybersecurity training
- The speaker highlights the significance of cybersecurity training in today's multipolar and conflict-ridden world.
- Every organization, including businesses, governments, and military forces, is susceptible to cyberattacks.
- Being prepared for these attacks is not just a minimum requirement but a desperate necessity.
Comprehensive cybersecurity courses by Platzi
- Platzi offers two categories of cybersecurity courses:
- Cybersecurity routes for anyone regardless of their profession or field.
- Professional cybersecurity courses designed specifically for those responsible for protecting company networks.
- These courses cover various topics, including artificial intelligence in security and international certification ISO 27001.
Protecting personal data on smartphones
- The speaker warns about potential privacy risks associated with using Xiaomi smartphones' browsers.
- Xiaomi's Mi Browser Pro and Mint Browser are reported to collect users' browsing information without their consent and send it back to China.
- This data collection can lead to identity theft or other malicious activities.
Cybersecurity as a global concern
- The speaker emphasizes that every organization will face hacking attempts at some point.
- Governments, businesses, and even military forces can be targeted.
- It highlights the need for comprehensive cybersecurity training to prevent and mitigate cyberattacks.