Biggest Cybersecurity Threats In 2016

Headless worms, machine-to-machine attacks, jail-breaking, ghostware and two-faced malware: The language of cybersecurity incites a level of fear that seems appropriate, given all that's at stake.

In the coming year, hackers will launch increasingly sophisticated attacks on everything from critical infrastructure to medical devices, said Fortinet global security strategist Derek Manky.

"We are facing an arms race in terms of security," said Manky. Fortinet provides network security software and services, and its customers include carriers, data centers, enterprises, distributed offices and managed security service providers.

Here's how the 2016 threat landscape looks to some experts:

Research firm Gartner predicts there will be 6.8 billion connected devices in use in 2016, a 30 percent increase over 2015. By 2020, that number will jump to more than 20 billion connected devices, predicts Gartner. Put another way, for every human being on the planet, there will be between two and three connected devices (based on current U.N. population projections).
The sheer number of connected devices, or the "Internet of Things," presents an unprecedented opportunity for hackers. "We're facing a massive problem moving forward for growing attack surface," said Manky.
"That's a very large playground for attackers, and consumer and corporate information is swimming in that playground," he said. Many consumer connected devices do not prioritize security. As they proliferate, expect the number of attacks to skyr
 
In its 2016 Planning Guide for Security and Risk Management, Gartner puts it like this: "The evolution of cloud and mobile technologies, as well as the emergence of the 'Internet of Things,' is elevating the importance of security and risk management as foundations."

Smartphones present the biggest risk category going forward, said Manky. They are particularly attractive to cybercriminals because of the sheer number in use and multiple vectors of attack, including malicious apps and web browsing.

"We call this drive-by attacks — websites that will fingerprint your phone when you connect to them and understand what that phone is vulnerable to," said Manky.

Apple devices are still the most secure, said Manky. "Apple's had a good security policy because of application code review. So that helps, certainly, to filter out a lot of these potential malicious applications before they make it onto the consumer device,…With that, nothing is ever safe," he said.

The new-year will likely bring entirely new worms and viruses able to propagate from device to device, predicts Fortinet. 2016 will see the first "headless worms" — malicious code — targeting "headless devices" such as smart watches, smartphones and medical hardware. "These are nasty bits of code that will float through millions and millions of computers," said Manky.

Of course, the potential for harm when such threats can multiply across billions of connected devices is orders of magnitude greater.

"The largest we've seen to date is about 15 million infected machines controlled by one network with an attack surface of 20 billion devices. Certainly that number can easily spike to 50 million or more," said Manky. "You can suddenly have a massive outage globally in terms of all these consumer devices just simply dying and going down."
 
Expect a proliferation of attacks on cloud and cloud infrastructure, including so-called virtual machines, which are software-based computers. There will be malware specifically built to crack these cloud-based systems.

"Growing reliance on virtualization and both private and hybrid clouds will make these kinds of attacks even more fruitful for cybercriminals," according to Fortinet.

At the same time, because apps rely on the cloud, mobile devices running compromised apps will provide a way for hackers to remotely attack public and private clouds and access corporate networks.

Firms need to stop thinking just about cyberattack deterrence, and focus on detecting breaches early and often, says Hitesh Sheth, CEO of Vectra Networks.

As law enforcement boosts its forensic capabilities, hackers will adapt to evade detection. Malware designed to penetrate networks, steal information, then cover up its tracks will emerge in 2016. So-called ghostware will make it extremely difficult for companies to track exactly how much data has been compromised, and hinder the ability of law enforcement to prosecute cybercriminals.

"The attacker and the adversaries are getting much more intelligent now," said Manky.

Alongside ghostware, cybercriminals will continue to employ so-called "blastware" which destroys or disables a system when detected. "Blastware can be used to take out things like critical infrastructure, and it's much more of a damaging attack," he said.
"Because attackers may circumvent preventative controls, detection and response capabilities are becoming increasingly critical," advises Gartner in its report.

Many corporations now test new software in a safe environment called a sandbox before running it on their networks. "A sandbox is designed to do deeper inspection to catch some of these different ways that they're trying to change their behaviors," said Manky. "It's a very effective way to look at these new threats as we move forward."

That said, hackers in turn are creating malevolent software that seems benign under surveillance, but morphs into malicious code once it's no longer under suspicion. It's called two-faced malware.

This is at least partially the sheer volume of attacks is so high — Fortinet sees half a million security threats per minute.

"The reason we see so much volume as well is because cybercriminals are trying to evade [detection]. They know about security vendors, they know about law enforcement, they're trying to constantly morph and shift their tactics," said Manky.

"Companies should definitely enforce more security policies," said Manky. "Security's becoming a board level discussion, so that's already happening, and it should continue to happen."
Part of any cybersecurity strategy should be the use of antivirus software, the education of employees not to click on unknown attachments or links as well as keeping software up to date, also know as patch management.

"A lot of these devices are not going to be patched that quickly or they might not have an update mechanism on them," said Manky. "Certainly, any time a patch becomes available, companies should enforce that because these are closing a lot of the holes where attackers are navigating through."

Here is how Gartner frames it for business seeking to protect themselves in 2016. "While some traditional controls have or will become less effective, techniques such as removing administrative privileges from endpoint users should not be forgotten. Similarly, vulnerability management, configuration management and other basic practices have to be priorities in organizations that have not yet implemented them effectively."

And ultimately, something is better than nothing, advises the firm: "Addressing priorities does not mean striving for perfection, but rather ensuring, at least, that critical exposures are remediated (or, if applicable, mitigated with compensating controls) and that the residual risks are minimal and acceptable (or at least enumerated and tracked)."

CNBC: http://cnb.cx/1mLqnto

« Cyberwar: Islamic State, Russia & China Hold The Advantage
ISIS Secret Cyber Terrorism Forum Exposed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DCL Search & Select

DCL Search & Select

DCL Search & Selection connect candidates to the best companies in the IT Security, Telco, UC, Outsourcing, ERP, Audit & Control markets.

CyberDefcon

CyberDefcon

CyberDefcon is an independent organization dedicated to the pursuit of making the internet a safer place.

Data Shepherd

Data Shepherd

Data Shepherds primary focus is to protect your business. We achieve this by offering extensive and unique expertise in innovative IT and Cyber security solutions.

Acalvio Technologies

Acalvio Technologies

Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter.

Nexus Group

Nexus Group

Nexus Group develops identity solutions for physical and digital access.

Custodio Technologies

Custodio Technologies

Custodio Technologies was established as a Singaporean R&D Centre of Israel Aerospace Industries (IAI) in order to spearhead R&D activities in the field of cyber early warning.

Sabasai

Sabasai

Sabasai specialises in all aspects of insider threat management from training and education to building security frameworks and insider threat programs to on-site risk & vulnerability assessments.

Prove & Run

Prove & Run

Prove & Run provides a patented software development toolchain that is specifically forged to deal with the complex security properties of sensitive software components.

sayTEC

sayTEC

sayTEC's mission is to develop and deliver next-generation products and services in encrypted data and voice transmission.

Isovalent

Isovalent

Isovalent deliver the most advanced Kubernetes networking & security capabilities to the most demanding of enterprise users.

Fullstack Academy

Fullstack Academy

A trailblazer in bootcamp education, Fullstack Academy prepares students for fulfilling careers in tech through our NYC campus, online learning, and university partnerships.

Narf Industries

Narf Industries

Narf Industries are a small group of reverse engineers, vulnerability researchers and tool developers that specialize in tailored solutions for government and large enterprises.

MAUSHIELD

MAUSHIELD

MAUSHIELD is the national platform for sharing cyber threat information and intelligence that can help organisations to improve their cybersecurity posture, minimize risks and prevent cyber-attacks.

CloudCoCo

CloudCoCo

CloudCoCo help UK businesses of all sizes and industries succeed by providing enterprise-grade technology at small-business prices.

NeuroID

NeuroID

NeuroID combines the power of industry-leading behavioral analytics with advanced device and network intelligence to create your first line of defense against malicious bots, bad actors, and fraud.

Apexanalytix

Apexanalytix

Apexanalytix is a leading provider of supplier onboarding, risk management and recovery solutions.