Daily Mirror (Sri Lanka)

Cybersecur­ity threat prediction­s for 2021

- BY RAJESH MAURYA

In 2020, we saw many rapid changes on a global scale as organisati­ons across the world attempted to adapt to a new normal caused by the pandemic. Amid this shift, there were significan­t developmen­ts seen across the cyberthrea­t landscape.

Going into 2021 and beyond, we face another significan­t shift with the rise of new intelligen­t edges, which is about more than just end-users and devices remotely connecting to the network.

In Fortiguard Labs’ threat prediction­s for 2021, we’ve estimated the strategies that we anticipate cybercrimi­nals will leverage in the coming year and beyond. This includes but is not limited to prediction­s and insights on intelligen­t edge computing and advances in computing power, as well as the new wave of advanced threats that will undoubtedl­y arise as a result.

Each year at t his time, we take a look at trends across the cyberthrea­t landscape, whether just around the corner or further afield. Predicting security threat trends may seem like more art than science but the reality is that combining a strong understand­ing of how threats develop and what sorts of technologi­es cybercrimi­nals gravitate towards both to use and to exploit with evolving business trends and strategies helps make prediction­s a reasonable process.

Intelligen­t edge is a target

Over the past few years, the traditiona­l network perimeter has been replaced with multiple edge environmen­ts, WAN, multi-cloud, data centre, remote worker, IOT and more, each with its unique risks. One of the most significan­t advantages to cybercrimi­nals in all of this is that while all of these edges are interconne­cted many organisati­ons have sacrificed centralise­d visibility and unified control in favour of performanc­e and digital transforma­tion.

Trojans evolve to target edge

While end-users and their home resources are already targets for cybercrimi­nals, sophistica­ted attackers will use these as a springboar­d into other things going forward. Corporate network attacks launched from a remote worker’s home network, especially when usage trends are clearly understood, can be carefully coordinate­d so they do not raise suspicions.

Advancemen­ts in social engineerin­g attacks

Smart devices or other homebased systems that interact with users, will no longer simply be targets for attacks but will also be conduits for deeper attacks. Leveraging important contextual informatio­n about users, including daily routines, habits or financial informatio­n, could make social engineerin­g-based attacks more successful. Smarter attacks could lead to much more than turning off security systems, disabling cameras or hijacking smart appliances, it could enable the ransoming and extortion of additional data or stealth credential attacks.

New ways to leverage ransomware in critical infrastruc­tures

Ransomware continues to evolve and as IT systems increasing­ly converge with operationa­l technology (OT) systems, particular­ly critical infrastruc­ture, there will be even more data, devices and unfortunat­ely, lives at risk. Extortion, defamation and defacement are all tools of the ransomware trade already. Going forward, human lives will be at risk when field devices and sensors at the OT edge, which include critical infrastruc­tures, increasing­ly become targets of cybercrimi­nals in the field.

Spreading attacks from space

The connectivi­ty of satellite systems and overall telecommun­ications could be an attractive target for cybercrimi­nals. As new communicat­ion systems scale and begin to rely more on a network of satellite-based systems, cybercrimi­nals could target this convergenc­e and follow in pursuit.

Quantum computing threat

From a cybersecur­ity perspectiv­e, quantum computing could create a new risk when it eventually is capable of challengin­g t he effectiven­ess of encryption in the future. The enormous compute power of quantum computers could render some asymmetric encryption algorithms solvable. Although the average cybercrimi­nal does not have access to quantum computers, some nation-states will, therefore the eventual threat will be realised if preparatio­ns are not made now to counter it by adopting crypto agility.

Artificial intelligen­ce will be key

As these forward-looking attack trends gradually become reality, it will only be a matter of time before enabling resources are commoditis­ed and available as a darknet service or as part of open-source toolkits. Therefore, it will take a careful combinatio­n of technology, people, training and partnershi­ps to secure against these types of attacks coming from cyber adversarie­s in the future.

AI technology needs to keep up

The evolution of AI is critical for future defence against evolving attacks. AI will need to evolve to the next generation. This will include leveraging local learning nodes powered by ML as part of an integrated system similar to the human nervous system. Ai-enhanced technologi­es that can see, anticipate and counter attacks will need to become reality in the future because cyberattac­ks of the future will occur in microsecon­ds. The primary role of humans will be to ensure that security systems have been fed enough intelligen­ce to not only actively counter attacks but actually anticipate attacks so that they can be avoided.

Organisati­ons can’t do it alone

Organisati­ons cannot be expected to defend against cyber adversarie­s on their own. They will need to know who to inform in the case of an attack so that the ‘fingerprin­ts’ can be properly shared and law enforcemen­t can do its work. Cybersecur­ity vendors, threat research organisati­ons and other industry groups need to partner with each other for informatio­n sharing but also with law enforcemen­t to help dismantle adversaria­l infrastruc­tures to prevent future attacks. Cybercrimi­nals face no borders online, so the fight against cybercrime needs to go beyond borders as well. Only by working together will we turn the tide against cybercrimi­nals.

(Rajesh Maurya is Regional Vice President, India and

SAARC, Fortinet)

 ??  ??
 ??  ??

Newspapers in English

Newspapers from Sri Lanka