Cloud, China, Generic Malware Top Security Concerns for 2019

  /     /     /  
Publicated : 23/11/2024   Category : security


Cloud, China, Generic Malware Top Security Concerns for 2019


FireEye researchers unveil an extensive list of security risks waiting in the new years wings.



There may still be nearly seven weeks left in 2018, but security leaders are already looking ahead to the new year. Enterprise concerns, from cloud attacks to nation-states, are already piling high.
This year, on track to be the worst-ever for data breaches, has already proved exhaustive for the infosec community. From Jan. 1 to Sept. 30, a total of 3,676 breaches were reported, involving over 3.6 billion records – the
second-most
number of reported breaches in a year.
The threats ahead are numerous, according to a new report entitled Facing Forward: Cyber Security in 2019 and Beyond. The report was compiled by FireEye CEO Kevin Mandia, chief security officer Steve Booth, vice president of global intelligence Sandra Joyce, and numerous analysts and strategists.
Whats top of mind for senior leaders? Nations building offensive capabilities, breaches continuing due to lack of attrition and accountability, the widening skills gap, lack of resources (particularly for SMBs), holes in the supply chain, cloud attacks, social engineering, and cyber espionage, cybercrime, and other threats targeting the
aviation sector
.
FireEyes Threat Intelligence, Mandiant, and Labs teams, which have a close eye on the frontlines, are particularly worried about how Chinese cyber espionage is restructuring, the increase in Iranian activity targeting the US, attackers using publicly available malware, the increase of business email compromise, abuse of legitimate services for command-and-control, and e-commerce and online banking portals being caught in the crosshairs of cyberthreats.
China Is Changing and Other Nation-State Threats
Ben Read, senior manager of cyber espionage analysis at FireEye, says he has noticed the threat from China evolve throughout this year. Its no longer smashing and grabbing intellectual property, he says. Attackers actions are far subtler – and more nefarious.
Theyre doing a lot, going after peoples data after it goes outside their premises, he explains. Organizations including law and investment firms, which have troves of client data, are prime targets.
FireEyes threat intelligence team has noticed Chinese cyber espionage restructure and believes this will drive the growth of its activity through, and beyond, 2020. Changes have been gradual and driven by high-profile events: the Obama-Xi agreement shifting Chinese cyber espionage away from intellectual property (IP) theft, the Peoples Liberation Army bringing cyber functions under a Strategic Support Force (SSF), and China beginning projects for its 13th Five-Year Plan.
Analysts believe 2019 will bring an increase in state-sponsored and financially driven supply chain attacks. APT10, a Chinese espionage group, is focused on hitting the supply chain of major US companies to steal business data and improve targeted technology theft by non-cyber means to avoid violating the Xi-Obama Agreement, which prohibits cybertheft of IP.
The supply chain is so global and so integrated … its more a problem in the software supply chain, Read adds. Auto updates are good for deploying patches but also a very attractive vector to get into lots of victim computers.
NotPetya
and
CCleaner
are key examples. Software supply chain attacks could involve integrating backdoors into legitimate software or using stolen certificates to sign malicious files and bypass detection.
The change in China is something weve seen over a number of years, Read says. China wants to be a respectable place to do business on the world stage. Thats something you cant be if youre very noisily stealing stuff.
Other nation-state threats hes watching include Iran and North Korea. Both are in delicate situations, he says. Analysts anticipate Iranian cyber activity against the United States is likely to increase after the US exit from the Joint Comprehensive Plan of Action (JCPOA). North Korea, which is keeping up its standard activities – stealing money, spying on South Korea – is taking an interest in Japan ahead of the 2020 Olympics in Tokyo.
Simple Malware and Cloud-Based Threats
Another top-of-mind trend is the growing use of publicly available malware among sophisticated attackers. Financially driven espionage actors, who previously developed their own threats, are now browsing underground forums for the generic, Read says.
Its cheaper to use something off the shelf, he explains, and a lot of pen-testing tools come at low cost. But thats not all: It can also give a false sense of security to defenders, he adds.
When advanced actors use simple tactics, they obfuscate their sophistication and lull their targets into a false sense of security. Its easy to dismiss a generic threat as something thats not to worry about. Unfortunately, now the attackers know theyre likely to be dismissed, and they can remain anonymous while launching generic threats against several victims at once.
There have always been espionage groups that use lower rent malware, Read says. What weve seen is it increasingly be part of the ecosystem for even the advanced groups.
Attackers choices vary by geography. Russia uses a mix, he explains, with some groups using open source and others using custom malware. North Korea tends to develop its own. The adoption of generic malware is more common among Iranian and Chinese actors.
Attackers are also eyeing the cloud as more data heads there.
Everyone in the industry is seeing huge migrations to the cloud, but most companies are not doing anywhere near as much work as they need to be doing to protect the cloud the way they used to protect their data centers — and the bad guys know this, states Booth
in the report
.
The bad guys go where the money is, and throughout 2019 they will find more opportunities in the cloud because it presents a wide attack surface without advanced technology to detect malicious activity, he adds. Roughly 20% of breaches FireEye investigates involve the cloud.
One way to approach cloud security, he says, is to treat the infrastructure hosting enterprise crown jewels as a higher priority than the laptop belonging to the person who clicked a malicious link. Ask yourself what your greatest assets are — what youre trying to protect.
Cyberattacks Arent Slowing
Mandia, who holds that security breaches are inevitable, points to the lack of risks or consequences for the people behind them. As a result, they will continue to act.
The attackers are not waking up fearful that they are going to get arrested for stealing email or extorting someone for a certain amount of cryptocurrency, he explains. Without a deterrent, attackers are going to keep targeting networks and getting through.
Related Content:
Small-Time Cybercriminals Landing Steady Low Blows
Security Teams Struggle with Container Security Strategy
Getting to Know Magecart: An Inside Look at 7 Groups
7 Non-Computer Hacks That Should Never Happen
 
 
 
Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the
conference
 and
to register.

Last News

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Cloud, China, Generic Malware Top Security Concerns for 2019