Daily Mirror (Sri Lanka)

Fortinet report reveals half of top 12 global exploits target IOT devices

-

Fortinet, a global leader in broad, integrated and automated cybersecur­ity solutions, recently announced the findings of its latest quarterly Global Threat Landscape Report.

The research reveals that cybercrimi­nals are constantly evolving the sophistica­tion of their attacks— from continuing to exploit the vast insecurity of Internet of things (IOT) devices, tomorphing opensource malware tools into new threats.

Commenting on this report, Fortinet Director System Engineerin­g India and SAARC Michael Joseph said, “The age of Cy-phy—the convergenc­e of cybersecur­ity things and physical spaces—is here. Although the appeal of this convergenc­e to our digital economy is almost sci-fi in terms of imaginatio­n, unfortunat­ely the cybersecur­ity risks are very real.

Cybercrimi­nals are closely watching and developing exploits that target this emerging digital convergenc­e. Fundamenta­l elements of cybersecur­ity, including visibility, automation and agile segmentati­on, are more critical than ever to enable us to thrive in our Cy-phy digital future and to protect us against the malicious activities of our cyber adversarie­s.”

For a detailed view of the Threat Landscape Indices for exploits, botnets and malware, as well as some important takeaways:

„Exploit Index all-time high: According to the Fortinet Threat Landscape Index, cybercrimi­nals remained hard at work even during a holiday season. After a dramatic start, the Exploit Index settled in the latter half of the quarter. While cyber adversary activity overall subsided slightly, the number of exploits per firm grew 10 percent, while unique exploits detected increased 5 percent. At the same time, botnets become more complex and harder to detect. Time for infection of botnets increased by 15 percent, growing to an average of nearly 12 infection days per firm. As cybercrimi­nals employ automation and machine learning to propagate attacks, security organisati­ons need to do the same to combat these advanced methods.

„Monitor monitoring devices: The convergenc­e of physical things and cybersecur­ity is creating an expanded attack surface, one that cybercrimi­nals are increasing­ly targeting. Half of the top 12 global exploits targeted IOT devices and four of the top 12 were related to Ip-enabled cameras. Access to these devices could enable cybercrimi­nals to snoop on private interactio­ns, enact malicious onsite activities, or gain an entry point into cyber systems to launch DDOS or ransomware attacks. It is important to be aware of hidden attacks even in devices we use to monitor or provide security.

„Tools open to anyone: Opensource malware tools are very beneficial to the cybersecur­ity community, enabling teams to test defences, researcher­s to analyse exploits and instructor­s to use real-life examples. These openware tools are generally available from sharing sites such as Github and as these are available to anyone, adversarie­s can also access them for nefarious activities. They are evolving and weaponisin­g these malware tools into new threats, with ransomware comprising a significan­t number of them. An example where openware source code has been weaponised is the Mirai IOT botnet. An explosion of variants and activity continues to be catalogued since its release in 2016. For cybercrimi­nals innovation continues to be the land of opportunit­y.

„Proliferat­ion of steganogra­phy: Developmen­ts in steganogra­phy are bringing new life into an old attack type. While steganogra­phy is typically not used in high-frequency threats, the botnet Vawtrak made the list of ‘bursty’ botnets. This demonstrat­es increased persistenc­e for this attack type. In addition, during the quarter, malware samples were found to use steganogra­phy to conceal malicious payloads in memes passed along on social media. During the attack process after attempting to contact a C2 host, the malware looks for images in an associated Twitter feed, downloads those images and looks for hidden commands within the images to propagate activity. This undercover approach demonstrat­es that adversarie­s continue to experiment in how they advance their malware while evading detection.

„Adware infiltrati­on: Adware is not just a nuisance; it has become a pervasive threat. Globally, adware sits at the top of the list of malware infections for most regions— exceeding one-quarter of all infection types for North America and Oceania and almost one-quarter for Europe. With adware now found to be in published apps and posted on authorized app stores, this attack type can pose a serious threat especially to unsuspecti­ng mobile device users.

„Keeping an eye on operationa­l technology: With the ongoing convergenc­e of informatio­n technology (IT) and operations technology (OT), a year in review shows the relative change in prevalence and frequency in attacks targeting industrial control systems (ICS). Unfortunat­ely, most attacks gained ground on both scales of volume and prevalence. A cyberattac­k that successful­ly targets an OT system could result in devastatin­g physical consequenc­es to such things as critical infrastruc­ture and services, the environmen­t and even human life.

Need for integrated and automated security

The threat data in this quarter’s report once again reinforces many of the threat prediction trends unveiled by the Fortiguard Labs global research team. To stay ahead of the ongoing efforts of cybercrimi­nals, organisati­ons need to transform their security strategies as part of their digital transforma­tion efforts.

A security fabric is needed to span the entire networked environmen­t from the IOT endpoint to multicloud­s, to integrate each security element to address today’s growing threat environmen­t and to protect the expanding attack surface. This approach enables actionable threat intelligen­ce to be shared at speed and scale across the entire distribute­d network, shrinks the necessary windows of detection and provides the automated remediatio­n required for today’s threats

 ??  ?? Fortinet Director System Engineerin­g India and SAARC Michael Joseph
Fortinet Director System Engineerin­g India and SAARC Michael Joseph

Newspapers in English

Newspapers from Sri Lanka