Countries, Coins & Cloud Will Test Enterprise Security in 2018

  /     /     /  
Publicated : 22/11/2024   Category : security


Countries, Coins & Cloud Will Test Enterprise Security in 2018


According to expert researchers from Kaspersky Labs, 2018s security challenges will be bigger than those seen in 2017.



For every major security attack reported in 2017, many will have gone unreported. More will have been perpetrated without discovery. Hackers sit in networks right now, biding their time.
So where should we be looking for security threats in 2018? I tracked down three of Kaspersky Labs experts and quizzed them on what were up against. We identified vulnerabilities from nation states, cryptocurrency miners and enterprise cloud weaknesses as our top three worries.
Nation states
Attack attribution is notoriously challenging. Threat actors are hired on the Dark Web to do the job and then vanish,
malware and attack vector obfuscation
muddy the water and forensics can be inconclusive. Kaspersky says we may not be able to identify where an attack has come from, but we can expect them to continue.
I think its hard to say there would be a greater threat of nation states next year, as the same actors are pretty much at it year in and year out, Brian Bartholomew, security researcher at Kaspersky Lab Global Research and Analysis Team, told SecurityNow. One can predict an increase based on some of the known events coming up, but honestly, the level of nation state attacks will most likely remain the same as its been in years past, barring a major conflict, which would certainly increase the threat.
North Korea was
formally blamed by the US
in December for the WannaCry attack, with commentators citing the Rebublics need for military funding amid sanctions as a driver for the accusation. Obviously, Februarys Winter Olympics in Pyeongchang are a focal point of cyber worry, as are the US mid-term elections in November. And, there are general or presidential elections coming up this year in Georgia, Azerbaijan, Russia, Iraq and Pakistan to name a few. Then, theres the threat of escalation of tensions on the Korean Peninsula.
Destructive style attacks by nation states could also show up again, said Bartholomew. This most likely will depend on the conflict status of countries such as North Korea, Iran and others who have been known to launch these types of attacks in the past.
Decembers
Triton near-miss
has been attributed to the activity of a nation state with moderate confidence by Fireye, which discovered the attack on industrial controllers that could have caused physical damage.
While a shutdown was created in the industrial process, it was most likely done by accident while developing a more destructive capability, suggests Bartholomew. Had the actor succeeded in their assumed plans, the outcome would have been much worse.
Cryptocurrency miners
It has been estimated that
about half a billion computers are currently mining cryptocurrencies
without the owners knowledge. The low cost for actors of distributing covert mining software through websites, the current cryptocurrency pricing bubble and the difficulty for the user in spotting illegally installed miners are the perfect storm.
Miners can bring real and relatively easy money to fraudsters, and thats why this software is turning into a popular tool for malicious users, said Alexey Malanov, a malware expert at Kaspersky Lab. In the same way that birds of one species may unknowingly nurture a cuckoo in their midst, miners profit at the expense of the computer owner. After running a downloaded file, the miner installs independently and simply starts secretly mining cryptocurrencies by using a victims computing power and electricity.
Malanov reckons that miners increase PC electrical consumption fivefold by loading the CPU and video card, leading to the ultimate potential failure of the computer.
Enterprise cloud
Consumer food outlets
Chipotle
,
Wendys
and SONIC Drive-In have all recently been targets for hackers. SONIC made no public statement about the source of its
October breach
which may have resulted in millions of credit card details being stolen. The working theory is that SONICs supply chain may have initially been targeted as the weakest link in the security chain.
One of the biggest threats to enterprises that we are seeing now -- and expect to see more of in 2018 -- is supply chain attacks, said Rob Cataldo, vice president of enterprise sales at Kaspersky Lab North America. As attackers can target third-party providers to subsequently infiltrate the better-protected original target, this is an alarming threat to businesses that needs to be addressed in their cloud security strategies before its too late.
According to Kasperskys own figures,
about 35% of businesses dont know where their corporate data is housed
and how its being secured. Nearly a quarter of them held their hand up to not checking the compliance credentials of their cloud and SaaS service providers, leaving this as a gaping security loophole as we enter 2018.
As more enterprises move to the convenience of the cloud, Cataldo thinks they shouldnt lose sight of where their data is, or most importantly, treat a supplier as outside of their own security policy.
Enterprises need to have a discussion with third-party providers about their cybersecurity policies and treat the relationship as a business risk that needs to be continuously managed, he said.
Related posts:
A Blockchain Platform: The Security Now Bloqchain Science Interview
Bitcoin Attacks Mount as Criminals & States Seek Targets
Bad Rabbit Breeds Ransomware Fears
— Simon Marshall, Technology Journalist, special to Security Now

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Countries, Coins & Cloud Will Test Enterprise Security in 2018