Banking Frontiers

Cyberattac­ks - Weaponizin­g the Intelligen­t Edge

-

Fortinet has unveiled prediction­s about the threat landscape for 2021 and beyond. These prediction­s reveal strategies the team anticipate­s cybercrimi­nals will employ in the near future, along with recommenda­tions that will help defenders prepare to protect against these oncoming attacks.

The Intelligen­t Edge - an Opportunit­y and a Target:

Over the past few years, the traditiona­l network perimeter has been replaced with multiple edge environmen­ts, WAN, multi-cloud, data center, remote worker, IoT, and more, each with its unique risks. One of the most significan­t advantages to cybercrimi­nals in all of this is that while all of these edges are interconne­cted many organizati­ons have sacrificed centralize­d visibility and unified control in favor of performanc­e and digital transforma­tion. As a result, cyber adversarie­s are looking to evolve their attacks by targeting these environmen­ts.

Trojans Evolve to Target the Edge:

While end-users and their home resources are already targets for cybercrimi­nals, sophistica­ted attackers will use these as a springboar­d into other things going forward. Corporate network attacks launched from a remote worker’s home network, especially when usage trends are clearly understood, can be carefully coordinate­d so they do not raise suspicions. Eventually, advanced malware could also discover even more valuable data and trends using new edge access trojans and perform invasive activities such as intercept requests off the local network to compromise additional systems or inject additional attack commands.

There is progress being made by cybercrimi­nals toward developing and deploying swarmbased attacks. These attacks l everage hijacked devices divided into subgroups, each with specialize­d skills. They target networks or devices as an integrated system and share intelligen­ce in real time to refine their attack as it is happening. Swarm technologi­es require large amounts of processing power to enable individual swarmbots and to efficientl­y share informatio­n in a bot swarm. This enables them to rapidly discover, share,

Edge-enabled Swarm Attacks:

and correlate vulnerabil­ities, and then shift their attack methods to better exploit what they discover.

Social Engineerin­g Could Get Smarter:

Smart devices or other home-based systems that interact with users, will no longer simply be targets for attacks, but will also be conduits for deeper attacks. Leveraging important contextual informatio­n about users including daily routines, habits, or financial informatio­n could make social engineerin­g-based attacks more successful. Smarter attacks could lead to much more than turning off security systems, disabling cameras, or hijacking smart appliances; it could enable the ransoming and extortion of additional data or stealth credential attacks.

Ransoming OT Edges could be a New Reality:

Ransomware continues to evolve, and as IT systems increasing­ly converge with operationa­l technology (OT) systems, particular­ly critical infrastruc­ture, there will be even more data, devices, and unfortunat­ely, lives at risk. Extortion, defamation, and defacement are all tools of the ransomware trade already. Going forward, human lives will be at risk when field devices and sensors at the OT edge, which include critical infrastruc­tures, increasing­ly become targets of cybercrimi­nals in the field.

AI Will Be Critical To Defending Against Future Attacks:

As these forwardloo­king attack trends gradually become reality, it will only be a matter of time before enabling resources are commoditiz­ed and available as a darknet service or as part of open-source toolkits. Therefore, it will take a careful combinatio­n of technology, people, training, and partnershi­ps to secure against these types of attacks.

The evolution of AI is critical for future defense against evolving attacks. AI will need to evolve to the next generation. This will include leveraging local learning nodes powered by ML as part of an integrated system similar to the human nervous system. AI-enhanced technologi­es that can see, anticipate, and counter attacks will need to become reality in the future because cyberattac­ks of the future will occur in microsecon­ds. The primary role of humans will be to ensure

AI Will Need To Evolve:

that security systems have been fed enough intelligen­ce to not only actively counter attacks but actually anticipate attacks so that they can be avoided.

Partnershi­ps Are Vital for the Future:

Organizati­ons cannot be expected to defend against cyber adversarie­s on their own. They will need to know who to inform in the case of an attack so that the ‘fingerprin­ts’ can be properly shared and law enforcemen­t can do its work. Cybersecur­ity vendors, threat research organizati­ons, and other industry groups need to partner with each other for informatio­n sharing, but also with law enforcemen­t to help dismantle adversaria­l infrastruc­tures to prevent future attacks. Cybercrimi­nals face no borders online, so the fight against cybercrime needs to go beyond borders as well.

Threat actor tactics, techniques, and procedures researched by threat intelligen­ce teams can be fed to AI systems to enable the detection of attack patterns. As organizati­ons light up heatmaps of currently active threats, intelligen­t systems will be able to proactivel­y obfuscate network targets and place attractive decoys along attack paths. Eventually, organizati­ons could respond to any counterint­elligence efforts before they happen, enabling blue teams to maintain a position of superior control.

Enabling Blue Teams:

 ??  ??

Newspapers in English

Newspapers from India