30.01.2017 Views

Kingdom of Bahrain

TT_Jan17

TT_Jan17

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

and some are starting to use built-in tools<br />

and no executable malware at all to avoid<br />

detection by endpoint protection code<br />

that focuses on executable files. Recent<br />

examples have <strong>of</strong>fered to decrypt files<br />

after the victim shared the ransomware<br />

with two friends, and those friends paid to<br />

decrypt their files. Ransomware authors<br />

are also starting to use techniques other<br />

than encryption, for example deleting or<br />

corrupting file headers. And finally, with<br />

“old” ransomware still floating around the<br />

web, users may fall victim to attacks that<br />

can’t be “cured” because payment locations<br />

no longer work.<br />

Emergence <strong>of</strong> personal IoT attacks.<br />

Users <strong>of</strong> home IoT devices may not notice<br />

or even care if their baby monitors are<br />

hijacked to attack someone else’s website.<br />

But once attackers “own” a device on a<br />

home network, they can compromise<br />

other devices, such as laptops containing<br />

important personal data. We expect to see<br />

more <strong>of</strong> this as well asmore attacks that<br />

use cameras and microphonesto spy on<br />

households. Cyber criminals always find a<br />

way to pr<strong>of</strong>it.<br />

Growth <strong>of</strong> malvertising and corruption<br />

<strong>of</strong> online advertising ecosystems:<br />

Malvertising, which spreads malware<br />

through online ad networks and web pages,<br />

has been around for years. But in 2016,<br />

we saw much more <strong>of</strong> it. These attacks<br />

highlight larger problems throughout the<br />

advertising ecosystem, such as click fraud,<br />

which generates paying clicks that don’t<br />

correspond to real customer interest.<br />

Malvertising has actually generated click<br />

fraud, compromising users and stealing<br />

from advertisers at the same time.<br />

The downside <strong>of</strong> encryption. As encryption<br />

becomes ubiquitous, it has become much<br />

harder for security products to inspect<br />

traffic, making it easier for criminals to<br />

sneak through undetected. Unsurprisingly,<br />

cybercriminals are using encryption in<br />

creative new ways. Security products will<br />

need to tightly integrate network and client<br />

capabilities, to rapidly recognize security<br />

events after code is decrypted on the<br />

endpoint.<br />

Rising focus on exploits against virtualized<br />

and cloud systems. Attacks against<br />

physical hardware (e.g. Rowhammer)<br />

raise the possibility <strong>of</strong> dangerous new<br />

exploits against virtualized cloud systems.<br />

Attackers might abuse the host or other<br />

guests running on a shared host, attack<br />

privilege models, and conceivably access<br />

others ‘data. And, as Docker and the entire<br />

container (or ‘serverless’) eco-system<br />

become more popular, attackers will<br />

increasingly seek to discover and exploit<br />

vulnerabilities in this relatively new trend in<br />

computing. We expect active attempts to<br />

operationalize such attacks.<br />

Technical attacks against states and<br />

societies. Technology-based attacks have<br />

become increasingly political. Societies face<br />

growing risks from both disinformation(e.g.,<br />

“fake news”) and voting system<br />

compromise. For instance, researchers have<br />

demonstrated attacks that might allow a<br />

local voter to fraudulently vote repeatedly<br />

Users <strong>of</strong> home IoT<br />

devices may not notice<br />

or even care if their baby<br />

monitors are hijacked<br />

to attack someone<br />

else’s website. But once<br />

attackers “own” a device<br />

on a home network, they<br />

can compromise other<br />

devices, such as laptops<br />

containing important<br />

personal data.<br />

without detection. Even if states never<br />

engage in attacks against their adversaries’<br />

elections, the perception that these attacks<br />

are possible is itself a powerful weapon.<br />

What can organisations do to protect<br />

against new threats?<br />

Unfortunately, many organizations still<br />

don’t have their security basics right. We<br />

<strong>of</strong>fer six measures organizations should put<br />

in place to help keep more complex threats<br />

at bay.<br />

Moving from layered to integrated<br />

security. Many organizations now possess<br />

multiple solutions that were once bestin-breed<br />

but are now too costly and<br />

difficult to manage. Moving towards<br />

integrated solutions where all components<br />

communicate and work together will help to<br />

solve this. For example, if malware knocks<br />

an endpoint’s security s<strong>of</strong>tware <strong>of</strong>fline,<br />

network security should automatically<br />

quarantine that device, reducing the risk to<br />

your entire environment.<br />

Deploying next-generation endpoint<br />

protection. As ransomware becomes<br />

ubiquitous and endpoints grow more<br />

diverse, organizations must refocus on<br />

endpoint protection. But signature-based<br />

solutions are no longer enough on their<br />

own, and can miss zero-day attacks. Choose<br />

solutions that recognize and prevent the<br />

techniques and behaviors used in nearly all<br />

exploits.<br />

Prioritizing risk-based security. No<br />

organization possesses the resources to<br />

systematically protect everything, and<br />

100% prevention is no longer realistic.<br />

Clarify the risks associated with each<br />

system, and focus your efforts accordingly.<br />

Risks change fast: look for tools that track<br />

them dynamically, and respond accordingly.<br />

But make sure those tools are easy and<br />

practical enough to use.<br />

Automating the basics. You can’t afford to<br />

waste time running the same reports and<br />

performing the same security tasks you<br />

always have. Automate wherever it can be<br />

done simply and easily, so you can focus<br />

scarce resources on serious risks and highvalue<br />

tasks.<br />

Building staff and process to deter and<br />

mitigate social attacks. Since social attacks<br />

now predominate, educating users and<br />

involving them in prevention is now even<br />

more important. Focus education on the<br />

threats each group is likeliest to encounter.<br />

Make sure it’s up-to-date: outdated<br />

guidance on topics such as phishing can be<br />

counterproductive, <strong>of</strong>fering a false sense <strong>of</strong><br />

security.<br />

Improving defender coordination.<br />

Cybercrime is organized crime: defense<br />

must be organized, too. That means<br />

choosing tools and processes that eliminate<br />

barriers within your organization, so<br />

everyone can respond quickly to the same<br />

attack. It may also mean looking for legal<br />

and practical opportunities to collaborate<br />

with other companies and the government,<br />

so you can mitigate widespread attacks and<br />

learn from others’ postmortems.<br />

48 January 2017

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!