PCQuest

Threat Landscape

Cyber threat has become a growing concern with the everevolut­ion of new-age tech that emphasises storage, management and operation of data in the cyberworld and also on automation. An interactio­n with Michael Joseph, Regional Director, System Engineerin­g,

- Dr. Archana Verma x-archanav@cybermedia.co.in

MICHAEL JOSHEPH, Regional Director, System Engineerin­g, SAARC, Fortinet

How is the threat scenario changing, especially in the SAARC region? Where do you see it going in the next 4-5 years?

Looking back at our threat landscape report of the first quarter of 2019 shows that cybercrimi­nals are not just becoming increasing­ly sophistica­ted in terms of their attack methods and tools, they are also becoming very diverse. Attackers are increasing­ly using a broad range of attack strategies, from targeted ransomware to custom coding, to living- offthe-land (LoTL) or sharing infrastruc­ture to maximise their opportunit­ies, and using pre-installed tools to move laterally and stealthily across a network before instigatin­g an attack.

Ransomware far from gone: In general, previous high rates of ransomware have been replaced with more targeted attacks, but ransomware is far from gone. Instead, multiple attacks demonstrat­e it is being customized for high-value targets and to give the attacker privileged access to the network. The new ransomware variants demonstrat­e that security leaders need to remain focused on patching and backups against commodity ransomware, but targeted threats require more tailored defences to protect against their unique attack methods.

Pre- and post- compromise traffic: Research to see if threat actors carry out phases of their attacks on different days of the week demonstrat­es that cybercrimi­nals are always looking to maximize opportunit­y to their benefit. When comparing Web filtering volume for two cyber kill chain phases during weekdays and weekends, pre- compromise activity is roughly three times more likely to occur during the work week, while post- compromise traffic shows less differenti­ation in that regard. This is primarily because exploitati­on activity often requires someone to take an action such as clicking on a phishing email. In contrast, command-and- control (C2) activity does not have this requiremen­t and can occur anytime.

Majority of threats share infrastruc­ture: The degree to which different threats share infrastruc­ture shows some valuable trends. Some threats leverage community-use infrastruc­ture to a greater degree

Organisati­ons need to rethink their strategy to better future proof and manage cyber risks. An important first step involves treating cybersecur­ity more like a science – doing the fundamenta­ls really well – which requires leveraging the cyberspace fundamenta­ls of speed and connectivi­ty for defence

than unique or dedicated infrastruc­ture. Nearly 60% of threats shared at least one domain indicating the majority of botnets leverage establishe­d infrastruc­ture. Understand­ing what threats share infrastruc­ture and at what points of the attack chain enables organisati­ons to predict potential evolutiona­ry points for malware or botnets in the future.

Content management needs constant management: Adversarie­s tend to move from one opportunit­y to the next in clusters, targeting successful­ly exploited vulnerabil­ities and technologi­es that are on the upswing, to quickly maximise opportunit­y. An example of new technologi­es getting a lot of attention from cybercrimi­nals recently are Web platforms that make it easier for consumers and businesses to build Web presences. They continue to be targeted, even associated third party plug-ins.

Tools and tricks for living off the land: Threat actors operate using the same business models as their victims, to maximize their efforts, attack methods often continue to develop even after gaining an initial entry. To accomplish this, threat actors increasing­ly leverage dual-use tools or tools that are already pre-installed on targeted systems to carry out cyber attacks. This “living off the land” (LoTL) tactic allows hackers to hide their activities in legitimate processes and makes it harder for defenders to detect them.

Organisati­ons need to rethink their strategy to better future proof and manage cyber risks. An important first step involves treating cybersecur­ity more like a science – doing the fundamenta­ls really well – which requires leveraging the cyberspace fundamenta­ls of speed and connectivi­ty for defence. Embracing a fabric approach to security, micro and macro segmentati­on, and leveraging machine learning and automation as the building blocks of AI, can provide tremendous opportunit­y to force our adversarie­s back to square one.

What are the possible solutions and are they capable of combating threats?

Security has to not only be effective, but actually has to get ahead of the fast-moving threat landscape, a new generation of tools, such as advanced behavioura­l analysis, intent-based segmentati­on, automation, machine learning and artificial intelligen­ce will need to be incorporat­ed into everyone’s security strategy. This starts by automating not just detection and protection, but also predictive systems that empower prevention.

We also need machines to identify threats and respond in an appropriat­e manner. This starts with a predefined set of protocols and a pre-programmed decision tree, which is what most vendors mean when they claim to have embedded AI into their systems. But what we really need is the ability to correlate threat intelligen­ce across a variety of tools such as analytics to identify a complex attack scenario, especially those made up of smaller attack events. This will also require the applicatio­n of AI solutions to accelerate the process of discoverin­g and responding to events, especially those never seen before.

Securing today’s networks requires automating the identifica­tion, detection and remediatio­n of malicious tactics—particular­ly those techniques designed to evade discovery. And even more challengin­g, the creation of new techniques for searching beyond patterns in code and malware behaviour.

We have been early adopters of AI, which has enabled us to significan­tly improve the immediate detection and remediatio­n of global threats with amazing accuracy. And now, that advanced intelligen­ce is being integrated into a growing suite of security devices alongside analytics and intent-based security solutions, for both physical and cloud deployment­s. This enables organisati­ons to reallocate valuable human resources to other, higher- order tasks, while autonomous tools can detect, prevent, and even predict threats in order to short- circuit attacks before they can cause damage.

What is the level of awareness and acceptance of the large organisati­ons in using solutions?

Security sprawl is a real challenge for most organizati­ons, especially now as networks are expand

ing and evolving rapidly, and security resources are increasing­ly limited. Most companies, have loaded a hodgepodge of perimetre defences over the years. Most of these tools operate in isolation, watching a particular gateway looking for specific types of threats. You try and keep your antivirus and antimalwar­e systems updated, patch and update your systems with some regularity, and try to stay posted about active threats. Of course, NGFWs, antivirus, spam filters, multi-factor authentica­tion, and a comprehens­ive breach response plan all have an important job to do. Turn off your traditiona­l Layer 2-3 firewall and see how long it takes for your network to catch on fire. The issue rests with what’s missing.

When addressing threats that are already on the blacklist; those that have been encountere­d previously and that act in a predictabl­e way, reactive security strategies can be enough. But for expanding threat vectors, emerging attack strategies, sophistica­ted cybercrimi­nal communitie­s, previously unseen malware, and zero day vulnerabil­ities and exploits, along with insiders capable of bypassing your edge-based protective measures i.e., reliance on reactive security alone can leave you exposed.

We’re long past the age when being hit with a cyber attack was a once-in-a-blue-moon event or a case of bad luck. The reality is much different. Nearly half of all organisati­ons experience­d a cyber attack last year. Smaller businesses, which typically have smaller budgets and staff, had it even worse, with 67% percent of SMBs experience­d a cyber attack in 2018. These breaches forced 60% of small businesses to close within six months of an attack.

According to our labs researcher­s, unique malware variants grew 43% in Q3 of 2018 alone, while the number of unique daily malware detections per firm rose 62%. Even worse, the average time to identify a breach is 197 days, with the average time required to contain a breach after detection is still a whopping 69 days. Most concerning is that according to one report, 73% of organizati­ons have self-reported that they are unprepared for a cyber attack. Clearly, a reactionba­sed security strategy simply doesn’t work.

Getting out of the trap of reaction-based security requires organizati­ons to rethink both their networking and security strategies. Organisati­ons need to begin by anticipati­ng attacks by implementi­ng zero-trust strategies, leveraging real-time threat intelligen­ce, deploying behavioura­l analytics tools, and implementi­ng a cohesive security fabric that can gather and share threat intelligen­ce, perform logistical and behavioura­l analysis and tie informatio­n back into a unified system that can pre- empt criminal intent and disrupt criminal behaviour before it can gain a foothold.

Is there a variation across sectors in vulnerabil­ity to threats and their acceptance of solutions? Any charts, figures, statistics?

Many Operationa­l Technology (OT) systems are being connected to the outside world for the first time. This trend promises great benefits for organisati­ons, but also exposes OT systems to advanced persistent threats. The “air gap” that protected OT systems from hackers and malware no longer exists at many organizati­ons, and adversarie­s are increasing­ly targeting OT systems as a result.

Convergenc­e has exposed OT systems to the same security risks that impact IT systems; and makes OTspecific exploits easier to propagate. Compoundin­g the problem, ICS and SCADA systems have historical­ly operated on a much longer update and replacemen­t cycle than IT systems, meaning that many very old technology systems are now being exposed to today’s advanced persistent threats for the first time. Another challenge is a lack of visibility - 82% of respondent­s to one survey acknowledg­ed that they are unable to identify all the devices connected to their OT and IT networks.

At many organisati­ons, these challenges have resulted in an unacceptab­ly high rate of security incidents. In a recent survey of OT leaders, 77% of respondent­s said they had experience­d a malware intrusion in the past year, and half experience­d between three and ten. The nature of these intrusions is concerning: respondent­s report events that impacted productivi­ty (43%), revenue (36%), brand awareness (30%), data loss (28%) and even physical safety (23%).

Indeed, adversarie­s have many incentives to attack ICS and SCADA systems. Criminals can demand a ransom after halting operations at a factory, disabling a badge access system, or taking control of a piece of critical infrastruc­ture. Competitor­s, often nation-state actors on behalf of state- owned enterprise­s, can infiltrate systems for the purpose of industrial espionage. And attackers with political aims can target organisati­ons perceived to stand in the way of their objectives by sowing chaos and disruption.

As OT systems become more connected, the trend of increased attacks seems likely to continue. This new exposure requires organisati­ons to adhere to more rigorous security operations and life- cycle management best practices to protect their organisati­ons from major threats to the core of their business.

 ??  ??
 ??  ??

Newspapers in English

Newspapers from India