Fireside Chat with Rob Joyce
This talk is an interview with a former National Security Agency official discussing the dual nature of national security operations, balancing offensive signals intelligence with defensive protection of sensitive systems. The discussion highlights the strategic challenges of modern cyber warfare, including the role of private-public partnerships and the impact of emerging technologies like generative AI on threat landscapes. It provides a high-level perspective on the geopolitical implications of cyber operations and the evolving role of nation-state actors in the digital domain.
Why Nation-State Cyber Operations Are Shifting Toward Societal Disruption
TLDR: Modern nation-state cyber operations have evolved from traditional signals intelligence to active disruption of critical infrastructure and societal stability. By targeting civilian-facing systems like energy grids and transportation, adversaries aim to induce panic rather than just exfiltrate data. Pentesters and researchers must recognize that these campaigns often rely on living-off-the-land techniques that bypass traditional signature-based detection.
The era of nation-state actors focusing exclusively on high-value intelligence exfiltration is over. We are seeing a clear shift in the threat landscape where the objective is no longer just to steal secrets, but to prepare the battlefield for potential conflict by compromising the very systems that keep a society functioning. When we talk about critical infrastructure, we are no longer just discussing air-gapped industrial control systems. We are talking about the interconnected web of cloud-based management platforms, satellite communications like Starlink, and the underlying routing infrastructure that powers modern life.
The Shift to Living-off-the-Land
Adversaries are increasingly moving away from custom, high-cost malware that gets burned the moment it is detected. Instead, they are favoring living-off-the-land (LotL) techniques. By using legitimate administrative tools and built-in system binaries, they blend into the noise of daily network operations. For a pentester, this is the most difficult environment to simulate. You are not looking for a suspicious binary in a temp folder. You are looking for an administrator account performing unusual, yet technically valid, PowerShell commands at 3:00 AM.
This approach is particularly effective against cloud-native environments. When an attacker gains access to a cloud management console, they do not need an exploit. They have the keys to the kingdom. They can modify configurations, pivot through virtual networks, and exfiltrate data using the platform's own APIs. If you are testing an environment, your focus should shift from finding RCEs to auditing the permissions and logging configurations of the management plane. If you can move laterally using only native tools, your client has a massive visibility gap.
The Mechanics of Societal Disruption
The goal of these operations is often to create a "fog of war" that paralyzes decision-makers. By targeting transportation, aviation, and energy sectors, adversaries can create a cascading effect of failures. This is not about a single server going down. It is about the psychological impact of a society losing faith in its own systems.
In a recent engagement, we observed how easily a misconfigured identity provider can lead to a total compromise of an organization's internal communications. When you look at the OWASP Top 10, specifically the focus on Broken Access Control, you see the exact mechanism these actors use. They do not need to break the encryption if they can simply log in as a legitimate user with over-privileged access.
The Role of Public-Private Partnerships
Defending against these threats requires a level of collaboration that most organizations are not prepared for. We are seeing the rise of organizations like the Cybersecurity and Infrastructure Security Agency (CISA), which provides critical guidance on hardening infrastructure against these specific nation-state tactics. However, the burden of defense cannot rest solely on government agencies.
For researchers and bug bounty hunters, the opportunity lies in finding the subtle logic flaws that allow these actors to maintain persistence. If you are hunting in a corporate environment, look for the "normal" behavior that shouldn't be normal. Why is this service account querying the Active Directory for domain admin groups? Why is this cloud function reaching out to an external IP that isn't part of the documented infrastructure? These are the breadcrumbs that lead to the discovery of a sophisticated actor.
Automating the Defense
Automation is the only way to scale our response to these threats. We cannot rely on manual log analysis when an adversary can automate their reconnaissance and exploitation at machine speed. Machine learning models are becoming essential for baselining network behavior and identifying anomalies that indicate a breach.
However, do not fall into the trap of thinking that a tool will solve the problem. Automation is a force multiplier for a skilled team, not a replacement for one. You need to understand the underlying protocols and the way systems are architected to identify when an automated tool is being subverted.
The next time you are on an engagement, stop looking for the "cool" exploit. Start looking for the architectural weakness that allows an attacker to act like a legitimate user. That is where the real risk lies, and that is where you can provide the most value to your clients. The adversaries are already thinking about how to disrupt the systems we rely on every day. It is time we start thinking about how to defend them with the same level of sophistication.
Target Technologies
Up Next From This Conference

Breaking Secure Web Gateways for Fun and Profit

Listen to the Whispers: Web Timing Attacks That Actually Work

Abusing Windows Hello Without a Severed Hand
Similar Talks

Unmasking the Snitch Puck: The Creepy IoT Surveillance Tech in the School Bathroom

Google First-Party Secrets Disclosure

