The Cyber Security Landscape: A Frightening Picture

A recent report by the Institute for Critical Infrastructure Technology (ICIT), a cyber security think tank that acts as a conduit between the private sector, US federal agencies and the legislative community, paints a frightening picture of the information security landscape.

The study, Rise of the Machines: The Dyn Attack Was Just a Practice Run, published in December 2016, shows just how vulnerable organisations are to the latest attack vectors. Corporate as well as government security executives need to understand what they’re up against when it comes to threats such as distributed denial of service (DDoS).

“The perfect storm is brewing that will pummel our nation’s public and private critical infrastructures with wave upon wave of devastating cyber-attacks,” the report notes. “The Mirai malware offers malicious cyber actors an asymmetric quantum leap in capability; not because of sophistication or any innovative DDoS code, rather it offers a powerful development platform that can be optimized and customised according to the desired outcome of a layered attack by an unsophisticated adversary.”

Script kiddies and cyber-criminal gangs are already drastically expanding their control over vulnerable Internet of Things (IoT) devices, which can be contracted in DDoS-for-Hire services by a virtually unlimited number of actors for use in an infinite variation of layered attack methods, the study says.

The brunt of the vulnerabilities on the Internet and in IoT devices rest with DNS, ISPs and IoT device manufacturers, “who negligently avoid incorporating security-by-design into their systems because they have not yet been economically incentivised and they instead choose to pass the risk and the impact onto unsuspecting end-users,” the report says. As a result of this, IoT botnets continue to grow and evolve.

As the adversarial landscape including nation state and mercenary bad actors, hacktivists, cyber-criminal gangs, script kiddies, and others continues to evolve, public and private data, intellectual property, and critical infrastructure continues to be pilfered and disrupted, ICIT says. The sectors at greatest risk for attacks include financial services, healthcare and energy.

The ICIT report presents a number of recommendations for organisations as they struggle to defend against the growing number of attacks. One is to develop actionable incident response plans. The key to an organisation’s survival in an increasingly hostile threat landscape is preparedness and forethought.

“At the moment, organisations have few technical options to mitigate DDoS aside from anti-DDoS service, endpoint security, and filtering rules,” ICIT says. “Instead, organisations can improve their security posture by developing an actionable and practiced incident response plan or standard operating procedure (SOP) for their personnel to follow in the event of an attack.” These plans ensure a chain of communication and command, and preclude short-term actions that could harm the organisation in the long-term.

Another step is to develop penetration tested IoT software and hardware featuring security-by-design. “Mirai demonstrates that rapidly developed or negligently developed IoT software and hardware can and will be leveraged for malicious purposes,” the report notes. “If IoT botnets are to be diminished and weakened in the future, IoT software and hardware must be developed with security-by-design.”

Device manufacturers do not include security-by-design due to lack of time, expertise and economic incentive. While some IoT and mobile software is developed in the US, most is developed or adapted abroad.

“Despite the possibility of regulatory measures from the United States and other nations, there is a strong likelihood that these constraints and the resulting manufacturer behaviors will remain unchanged,” ICIT says. “Rather than impose additional constraints on developers that will impact their already narrow profit margins, the cyber security community can build initiatives that promote the open source development and testing of IoT software.”

Training and policy are also critical. DDoS attacks are often distractions in multi-tiered cyber-attacks, in which the attacker aims to weaken network defenses or divert critical resources away from another attack vector while establishing persistent presence on the network, ICIT says. In other cases, botnets are used to deliver ransomware and other malware onto network systems.

Cyber security controls and basic training can greatly limit the number of network assets susceptible to botnet infection, the group says. This includes training on how to ignore social engineering lures, policies enforcing hardened system authentication controls at every interface, defensive measures against compromised certificates, reliance on data execution prevention and data loss prevention services, and other essential cyber security controls.

Finally, organisations need to begin holding device manufacturers accountable for security flaws. Mirai and other malware that infect IoT devices are designed to exploit weak security, default credentials, and hard-coded credentials and settings, ICIT says. Some manufacturers have begun to require complex credentials to be created upon activation of devices, while many others continue to distribute devices whose default or hard-coded credentials leave the devices vulnerable to infection.

Government contractors and private sector companies have the ability to refuse to engage with manufacturers that do not incorporate security by design into devices, ICIT says.

BusinesInsights:

How Cyber Attacks Will Get Worse In 2017:         Critical Cybersecurity Protocols To Implement:

 

« Indian Police Training To Crackdown On Electronic Fraud
GoggleBox: Moderate Screen Use 'Boosts Teen Wellbeing' »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Redicom

Redicom

Redicom is an independent consulting agency focusing on identity management, strong authentication and single-sign-on.

Atempo

Atempo

Atempo is a leading independent European-based software vendor with a global presence. We provide solutions to protect, store, move and recover all your data.

Excelerate Systems

Excelerate Systems

Excelerate Systems is a leading provider of IT services with a focus on Big Data, Cloud Services and Security.

BHC Laboratory

BHC Laboratory

BHC Laboratory is a cyber capabilities’ development company for a wide range of global customers.

DestructData

DestructData

DestructData is a leading independent provider of End of Life data destruction/security solutions.

Munich Re

Munich Re

Munich Re is a leading global provider of reinsurance, primary insurance and insurance-related risk solutions including Cyber.

Datacentrix

Datacentrix

Datacentrix provides end-to-end cybersecurity services for the operational technology (OT) and IT environments to monitor, assess and defend our customers' information assets.

Aurora Systems Consulting

Aurora Systems Consulting

Aurora is a Cybersecurity solutions provider with a portfolio consisting of security consulting, products and services that proactively prevent, secure and manage advanced threats and malware.

LogMeIn

LogMeIn

LogMeIn makes it possible for millions of people and businesses around the globe to do their best work simply and securely—on any device, from any location and at any time.

Wickr

Wickr

Wickr's mission is to secure the world's most critical communications. Wickr provides the highest standard of encryption trusted by millions worldwide.

Anonomatic

Anonomatic

Anonomatic’s mission is to make data privacy secure, simple and cost effective. We are Data and Privacy Experts who are passionate about helping organizations solve PII compliance.

Orbis Cyber Security

Orbis Cyber Security

Orbis is one of the leading cybersecurity company in USA. Our cybersecurity specialist defends your data, combat threat, and modernize your compliance.

Knownsec

Knownsec

Knownsec provides customers with cloud defense, cloud monitoring, and cloud mapping products and services with "AI + security big data" as the underlying capability.

Huntr

Huntr

Huntr provides a single place for security researchers to submit vulnerabilities, to ensure the security and stability of AI/ML applications.

Amtivo Ireland

Amtivo Ireland

Amtivo Ireland (formerly Certification Europe and EQA) offers a range of certifications and related services.

Darwinium

Darwinium

Darwinium is a Cyberfraud Prevention Platform that provides scalable customer journey protection without complexity.