06.12.2013 Views

Can we expect a cyberwar resurgence?, Abney

Neohapsis security experts predict that next year there will be a cyberwar resurgence, the cloud will begin to show its hidden costs, and privacy will continue to lose in the US legislature. 1. We’ll see a cyberwar redux: Details on nation-state cyber capabilities and activities of countries other than the known big players will begin to be revealed. Geopolitics has many fronts, and it’s to your advantage to play in every event. So, it’s fair to assume there are players as yet unknown - whether smaller countries or larger ones that haven’t been exposed yet. In addition to political battles over the internet's fate [see prediction 4 below], countries will continue to covertly gain advantage over each other via the internet. We will begin to see more details on the activities of countries other than the USA (and allies), China, Russia or Iran. While you can probably guess the obvious players, those that come to mind as likely undertaking cyber activity under the public’s radar include: India, Indonesia, Brazil, Pakistan, Japan, Mexico, Germany, France, Italy, and South Africa. And that’s only going through the top 25 countries by population! 2. The cloud will begin to show its unseen costs: We will see an increasing number of breaches of customer-specific cloud assets. This won't be due to weaknesses in the cloud service or its technology but on the integration, configuration, and operation of it by the customer...

Neohapsis security experts predict that next year there will be a cyberwar resurgence, the cloud will begin to show its hidden costs, and privacy will continue to lose in the US legislature.

1. We’ll see a cyberwar redux: Details on nation-state cyber capabilities and activities of countries other than the known big players will begin to be revealed.

Geopolitics has many fronts, and it’s to your advantage to play in every event. So, it’s fair to assume there are players as yet unknown - whether smaller countries or larger ones that haven’t been exposed yet.

In addition to political battles over the internet's fate [see prediction 4 below], countries will continue to covertly gain advantage over each other via the internet. We will begin to see more details on the activities of countries other than the USA (and allies), China, Russia or Iran. While you can probably guess the obvious players, those that come to mind as likely undertaking cyber activity under the public’s radar include: India, Indonesia, Brazil, Pakistan, Japan, Mexico, Germany, France, Italy, and South Africa. And that’s only going through the top 25 countries by population!

2. The cloud will begin to show its unseen costs: We will see an increasing number of breaches of customer-specific cloud assets. This won't be due to weaknesses in the cloud service or its technology but on the integration, configuration, and operation of it by the customer...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

concerns have resulted in some countries attempting to reduce their reliance on US benevolence by<br />

either strict internet controls (as in China) or through a “parallel internet” (as Iran has discussed).<br />

The USA has generally stood on the side of online freedom – except where copyright is concerned – but<br />

those pushing for change are largely seeking to restrict freedom of communication or information. Any<br />

change away from online freedom is concerning. Whether IETF, ICANN, or the United Nations, the<br />

internet will continue to be a space for political forces to battle. Ho<strong>we</strong>ver, US adversaries will begin to<br />

form a more coherent opposition.<br />

5. DDoS will get sneaky: DDoS attackers will accelerate a move from simple volumetric attacks to<br />

attacks which take advantage of a site's specific performance.<br />

DDoS attacks that intelligently target bottlenecks in performance, such as pages with a high server load<br />

(e.g. database writes) or specific network bottlenecks (e.g. login/session management), can magnify<br />

impact over attacks which are volume-based or naively request the homepage of a site.<br />

Whether naive guessing, timing analysis, or adaptive statistical analysis during the attack, these attacks<br />

will require targets to deal with the specific part of their site that is causing problems rather than<br />

dealing with it at a purely network level. We will begin to see the spread of tools which profile specific<br />

targets and attack based upon certain <strong>we</strong>aknesses in configuration or implementation. Attackers will<br />

begin to use adaptive and intelligent DoS techniques, and as a result, <strong>we</strong> will begin to see performance<br />

impacts disproportionate with traditional DDoS, and the need for more nuanced defense strategies than<br />

many are using currently.<br />

6. Encryption technologies will undergo increased scrutiny: In the wake of revelations about the<br />

ability of governments to intercept and decrypt data that was thought to be secure, encryption<br />

technologies will be reexamined to look for <strong>we</strong>aknesses both intentional and accidental. Look for<br />

particular attention to be paid to cryptographic block modes like CBC and OFB as <strong>we</strong>ll as authenticated<br />

modes like EAX, CCM and GCM. In addition to the encryption methods themselves, look for critical<br />

thought around key management and forward security. While it’s not likely that much will come of these<br />

explorations, the simple fact that vast quantities of data previously considered inviolate was in fact<br />

exposed will make the more paranoid AND the academic minded among us pay closer attention to<br />

encryption as a whole.<br />

7. A foreign po<strong>we</strong>r or organized cybercrime group will have breached a mid-sized or municipal<br />

utility breached by for a long period: The last few years saw a great deal of attention paid to the<br />

security of utilities as a result of Smart Meter roll-outs and highly-publicized SCADA vulnerabilities. Now<br />

that the hype has died down, attacks will be stepped up, but in a more cautious fashion. It is widely<br />

<strong>expect</strong>ed that a number of utilities have been breached over the last decade, ho<strong>we</strong>ver now that they are<br />

being held to account by more and more government regulation, the compromised utilities will be found<br />

and the facts will leak to the public. Mid-sized and municipal utilities tend to be chronically understaffed<br />

and under resourced in IT departments. Without the resources available, corners are cut on both<br />

internal and external security. This leaves high value targets like water, electrical, natural gas, and<br />

wastewater open to easy compromise.<br />

8. Legacy problems will escalate: Whether it's the use of substandard security, or simply systems that<br />

<strong>we</strong>re designed in a different age, legacy systems will ever-increasingly fall prey to attack.<br />

Even when companies adopt good security and development practices old systems often linger with<br />

their past security problems exposed to the world - securing new things is an easier sell then securing<br />

systems due for sunset shortly.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!