Te āhuatanga i te ao
International threat landscape
As malicious cyber activity takes little notice of borders, international trends are usually reflected at the domestic level, whether directly or indirectly. Geopolitical tensions, conflict and an economic downturn have resulted in a more adversarial global cyber environment. Collaboration and enablers within the cyber ecosystem continue to swell the resources of malicious cyber actors. The scale of malicious cyber activity has escalated, and disruptive cyber activity has been felt worldwide.
Global tensions intensify the cyber environment
Heightened tensions within the international landscape have driven cyber threat actors to break further away from rules-based international systems. State-sponsored cyber actors are increasingly demonstrating a disregard for the norms of responsible state behaviour online. The number of malicious cyber actors aspiring to target systems supporting Western critical infrastructure is also increasing. It is possible that disruptive malicious cyber activity linked to conflict could escalate and impact Aotearoa New Zealand.
Ongoing global tensions, including Russia’s invasion of Ukraine, have almost certainly generated a significant amount of targeted intrusion and hacktivist cyber activity globally in 2023/2024, including against New Zealand organisations. Likely emboldened by the invasion, Russia-aligned cyber actors have continued targeting Russia’s neighbours and New Zealand’s like-minded partners. While not to the extent many expected, malicious cyber activity in support of Russia and Ukraine has persisted into 2024.
Attempts to undermine the integrity of democratic institutions was a rising trend in this financial year’s international cyber landscape. In December 2023, the Minister Responsible for the GCSB, on behalf of the New Zealand Government, publicly condemned malicious cyber activity affecting the United Kingdom’s domestic democratic institutions and processes, including civil society organisations. This activity was attributed to Russia’s Federal Security Service (FSB).
In March 2024, New Zealand’s Government again joined with the UK in its condemnation of People’s Republic of China (PRC) state-backed malicious cyber activity impacting the UK’s Electoral Commission and targeting UK Members of Parliament. As part of this announcement, the NCSC publicly shared its attribution of a PRC state-sponsored compromise of New Zealand’s Parliamentary Counsel Office and Parliamentary Service in 2021. The NCSC remains concerned that challenges to democracy may become more common in cyberspace.
Living-off-the-land tradecraft
Malicious actors continue to use living-off-the-land (LOTL) tradecraft for avoiding detection and maintaining persistence on networks. This technique is used by both state and non-state actors, though it is likely favoured by state-sponsored actors who are attempting to maintain access for espionage and data exfiltration over long periods of time.
Living-off-the-land is a technique in which actors use legitimate or pre-existing software on a victim network to maintain access. Use of legitimate software and accounts is less likely to raise alerts for defenders. This is in contrast to the installation of malicious software, which may look suspicious in incident response logs, and is much more likely to be stopped by antivirus software.
In the financial year, the NCSC joined international partners in publishing two joint guidance advisories. The first of these reports provided information on common LOTL techniques and gaps in cyber defence capabilities. It also provided guidance for network defenders to mitigate identified gaps and to detect and hunt for LOTL activity.
The second advisory detailed the risks and indicators of PRC actors on systems of critical infrastructure. It urged critical infrastructure organisations to apply the recommended mitigations and hunt for similar malicious activity using the guidance within the advisory to reduce the risk and impact of compromise.
Cloud service exploitation
Targeting of cloud services has been a persistent feature of the international landscape in 2023/2024. The growing reliance on the cloud is bringing new security challenges to an already complex problem. While understanding and confidence in implementing cloud services has improved, so has the sophistication of cyber threat actors taking advantage of cloud complexity for malicious activity. Malicious cyber actors likely target these services for extracting large volumes of data quickly and undetected.
In June 2023, a wave of cyber incidents targeting cloud-based data storage supplier Snowflake affected over 100 customers. This breach was not caused through a vulnerability, misconfiguration, or a breach of its systems. Instead, initial access was gained using stolen credentials that were obtained through multiple malware infections.
Cyber criminals are increasingly targeting the providers of managed information and communications technology (ICT) infrastructure suppliers to widen their impact and extort payment. State-sponsored cyber actors have similarly compromised major international infrastructure and software-as-a-service providers for espionage. In 2024, the US Cyber Security Review Board published its findings on the compromise of several Microsoft Exchange-hosted government email accounts compromised by PRC-linked cyber actors.
Additionally, the targeting of cloud-service providers for disruptive activity can also be ideologically motivated. In June 2023, a series of distributed denial-of-service (DDoS) attacks against Microsoft led to disruptions across multiple services. The cyber attacks were linked to a pro-Russia hacktivist group likely using multiple virtual private servers, alongside rented cloud infrastructure, open proxies and DDoS tools.
Collaboration in the cybercrime ecosystem
The success rates of financially motivated malicious cyber actors in 2023/2024 were likely enabled through collaborative relationships in the cybercrime ecosystem. Malicious cyber actors’ resources have grown as a result of access to crime-as-a-service models and connection to an ecosystem of cyber enablers. It is likely both state-sponsored and criminal cyber actors will continue forging ties with enablers such as access brokers to reduce overheads for their cyber operations.
Russian-language criminals operating ransomware or ransomware-as-a service (RaaS) play a pivotal role in the cybercrime ecosystem. These syndicates continue to be responsible for the most impactful cyber incidents responded to by the NCSC. Several of these syndicates have links to the Russian state and are likely emboldened by its tacit tolerance of their malicious activities.
During the 2023/2024 financial year, global law enforcement cybercrime disruption efforts impacted dominant ransomware groups. Despite these disruption efforts likely leading to a dent in ransomware activity, it is almost certain that groups will reorganise and diversify, enabling them to bounce back. Effective and long-term disruption of the cyber criminal ecosystem will require sustained collaboration between government, law enforcement, and industry. This should focus on disruptive efforts, including infrastructure takedowns, seizure of illicit proceeds, arrest of cyber criminals and cryptocurrency regulation.
Use of artificial intelligence for malicious cyber activity
The increasing accessibility and proliferation of AI technologies lowers the barrier for some criminals to commit malicious cyber activity at a scale and level of sophistication previously outside their capabilities. At present, the use of AI mainly amplifies existing risks from cyber-dependant and cyber-enabled crime, rather than creating new ones.
Along with the general population, many criminals use AI primarily when it is embedded in easily accessible services. The frequency and sophistication of fraud will likely increase with developments in AI applications such as voice cloning, and data harvesting and impersonation. Large language models are likewise being used in a range of ways including writing credible phishing messages and writing code for creating information-stealer malware too obtain victims’ personal details for use in fraud. Equally, the large-scale data processing abilities of AI will be progressively exploited by criminals to identify and profile victims as it is used for the consolidation of images and data.
Commoditisation of identity
Online, identities are increasingly commoditised to facilitate data exfiltration, and the sophistication of identity-related attacks is rising. The advent of smartphones and use of internet of things (IoT) technologies have increased the surface of the threat environment.
Cyber criminals can obtain digital images, voice feeds and confidential information about people with ease for use in social engineering. With the growth of social media, identity theft is rife. Personal information, including that concerning jobs, hobbies, and friends, saturates the digital environment and is visible to everyone. Collection of this information is consequently able to be conducted with anonymity, and collected data can be used for phishing, scams, or even deepfake deceptions.
A new generation of cyber threat actors
Some cyber criminal syndicates are no longer hesitant to target individuals or organisations where there may be retribution, or where cyber attacks were perceived by some as unethical, for example against hospitals. Victim harassment, including threat to life, is also being increasingly leveraged against employees of organisations
to exert pressure to release payment.
This new generation of cyber threat actors is challenging these accepted rules in pursuit of profits, regardless of potential risk to innocent lives or possible consequences from attacking critical infrastructure. Combined with this less-restricted approach to victim selection, these actors regularly alter the type of cyber criminal activity they conduct. This makes their behaviour unpredictable and therefore more difficult to respond to.