Start your day with intelligence. Get The OODA Daily Pulse.
Recently, the Federal Bureau of Investigation (FBI) published an industry advisory outlining the tactics, techniques, and procedures of Emennet Pasargad, an Iran-based cybersecurity company supporting government organizations to help them defends against this company’s potential hostile activities. Earlier, the Department of Justice (DoJ) charged two Iranian nationals with cyber intrusion, fraud, voter intimidation, interstate threats, and conspiracy, the basis for the FBI’s advisory. The FBI highlighted the tactic of conducting reconnaissance on potential targets, using extensive open-source research for leading businesses in various sectors. While research and reconnaissance are necessary precursors to any attack, using a seemingly legitimate front company provides a level of obfuscation for the actors as well as a plausible explanation of researching an organization, such as to make a potential customer pitch for its services, if confronted.
In addition to the aforementioned Emennet Pasargad incident, the DoJ has indicted several individuals linked to tech-related companies involved in several cyber-enabled infractions. Some of the more prominent ones highlight how front companies were used as a screen while others reveal the actors using the companies as a launching point for their activities. While in all of these incidents, enough evidence was eventually discovered to warrant legal indictment, the fact that in it took considerable time to detect is worrisome and a testament to the success of front companies’ involvement in cyber activities. Notable incidents include but are not limited to:
The use of front companies to support a nation state’s intelligence interests is not a novel concept, as corporate espionage has been around since at least the 1700s, according to one source. Over the years, front companies have proven pivotal to use as platforms from which to spy on hostile and friendly governments. Cyberspace has further enabled the use of front companies to commit all types of cyber malfeasance. Even if an existing company is not used, building a corporate presence on the Internet is relatively easy, legitimized with social media platforms, followers, and online networking. A prominent global professional social network liked LinkedIn is a goldmine for state activity acting through fake and legitimate profiles seeking to develop sources and/or establish business relations that can be exploited for later gain.
While intelligence agencies will undoubtedly continue to leverage front companies to support intelligence operations, cyberspace has lowered the bar for the creation of such entities to do just that. One reason for this is that the tech boon has made it relatively simple for new and previously unknown computer company startups to suddenly appear. There is a ravenous appetite for new and advanced technology capabilities from both the private and public sector alike creating opportunities for states or enterprising companies to use these fronts for not-so-above-board purposes. After all, the best front company would be one that is able to show a genuine track record, using its legitimacy to obfuscate its nefarious activities on the side. If caught, the company could assign blame to rogue individuals moonlighting for their own profit.
What’s clear is that cyberspace’s “gray” world is close to surpassing “white” and “black” counterparts. This may explain more incidents where companies are selling services and products that often walk the fine line of being legitimate but could be used adversely depending on the customer’s intent. It would also make attributing these activities to a particular government even more difficult. The case of Su Bin is a prime example of an espionage group stealing information and looking for a buyer rather than being directed by a customer. In this case, Su Bin was involved in a “years-long” conspiracy to hack into major U.S. defense contractors using his company set up to serve the aviation market as a front to help identify valuable military aviation technology. While the information stolen was sold to China, it would have easily been valuable to other adversarial and friendly nations, as well.
While setting up front companies has become easier in cyberspace, sloppy mistakes can raise red flags. Take for example, the situation with Haidan Xiandun. It incorporated in 2011 with registered capital and actively recruited technological talent, promoting itself as a “fast-growing high-tech information security company.” Yet the company’s address had no website, and the address was a floor at the library, and shared the same registrant as a handful of other companies in the Hainan province. Unsurprisingly, Haidan quickly disbanded before the DoJ indictment.
We shouldn’t count on the same mistakes being made particularly as state-driven cyberspace activities continue to refine themselves. The aggressive cybersecurity market and cybersecurity vendors surveilling the global scene has helped raise awareness on nation state threats. It has also forced states to re-examine how they operate, which will likely lead to improved operational security practices. This will include how front companies are set up and used, particularly if they divvy their activities between legitimate, state-driven, and entrepreneurial. Just when organizations think that attribution has become easier, the dark waters of cyberspace have only become further muddied.
Now more than ever, organizations need to apply rigorous thought to business risks and opportunities. In doing so it is useful to understand the concepts embodied in the terms Black Swan and Gray Rhino. See: Potential Future Opportunities, Risks and Mitigation Strategies in the Age of Continuous Crisis
Use OODA Loop to improve your decision making in any competitive endeavor. Explore OODA Loop
The greatest determinant of your success will be the quality of your decisions. We examine frameworks for understanding and reducing risk while enabling opportunities. Topics include Black Swans, Gray Rhinos, Foresight, Strategy, Stratigames, Business Intelligence and Intelligent Enterprises. Leadership in the modern age is also a key topic in this domain. Explore Decision Intelligence
We track the rapidly changing world of technology with a focus on what leaders need to know to improve decision-making. The future of tech is being created now and we provide insights that enable optimized action based on the future of tech. We provide deep insights into Artificial Intelligence, Machine Learning, Cloud Computing, Quantum Computing, Security Technology, Space Technology. Explore Disruptive/Exponential Tech
Security and resiliency topics include geopolitical and cyber risk, cyber conflict, cyber diplomacy, cybersecurity, nation state conflict, non-nation state conflict, global health, international crime, supply chain and terrorism. Explore Security and Resiliency
The OODA community includes a broad group of decision-makers, analysts, entrepreneurs, government leaders and tech creators. Interact with and learn from your peers via online monthly meetings, OODA Salons, the OODAcast, in-person conferences and an online forum. For the most sensitive discussions interact with executive leaders via a closed Wickr channel. The community also has access to a member only video library. Explore The OODA Community