SmartStateIndia
News

FortiGuard Labs Predicts Weaponizing of the Intelligent Edge Will Dramatically Alter Speed and Scale of Future Cyberattacks

Fortinet unveiled predictions from the FortiGuard Labs global threat intelligence and research team about the threat landscape for 2021 and beyond.

These predictions reveal strategies the team anticipates cybercriminals will employ in the near future, along with recommendations that will help defenders prepare to protect against these oncoming attacks.

Cyber adversaries leveraging intelligent edges, 5G-enabled devices, and advances in computing power will create a wave of new and advanced threats at unprecedented speed and scale. In addition, threat actors will continue to shift significant resources to target and exploit emerging edge environments, such as remote workers, or even new OT edge environments, rather than just targeting the core network.

For defenders, it is critical to plan ahead now by leveraging the power of artificial intelligence (AI) and machine learning (ML) to speed threat prevention, detection, and response. Actionable and integrated threat intelligence will also be important to improve an organization’s ability to defend in real time as the speed of attacks continues to increase.

The Intelligent Edge Is an Opportunity and a Target

Over the past few years, the traditional network perimeter has been replaced with multiple edge environments, WAN, multi-cloud, data center, remote worker, IoT, and more, each with its unique risks. One of the most significant advantages to cybercriminals in all of this is that while all of these edges are interconnected many organizations have sacrificed centralized visibility and unified control in favor of performance and digital transformation. As a result, cyber adversaries are looking to evolve their attacks by targeting these environments and will look to harness the speed and scale possibilities 5G will enable.

  • Trojans Evolve To Target the Edge: While end-users and their home resources are already targets for cybercriminals, sophisticated attackers will use these as a springboard into other things going forward. Corporate network attacks launched from a remote worker’s home network, especially when usage trends are clearly understood, can be carefully coordinated so they do not raise suspicions. Eventually, advanced malware could also discover even more valuable data and trends using new EATs (Edge Access Trojans) and perform invasive activities such as intercept requests off the local network to compromise additional systems or inject additional attack commands.
  • Edge-enabled Swarm Attacks: Compromising and leveraging new 5G-enabled devices will open up opportunities for more advanced threats. There is progress being made by cybercriminals toward developing and deploying swarm-based attacks. These attacks leverage hijacked devices divided into subgroups, each with specialized skills. They target networks or devices as an integrated system and share intelligence in real time to refine their attack as it is happening. Swarm technologies require large amounts of processing power to enable individual swarmbots and to efficiently share information in a bot swarm. This enables them to rapidly discover, share, and correlate vulnerabilities, and then shift their attack methods to better exploit what they discover.
  • Social Engineering Could Get Smarter: Smart devices or other home-based systems that interact with users, will no longer simply be targets for attacks, but will also be conduits for deeper attacks. Leveraging important contextual information about users including daily routines, habits, or financial information could make social engineering-based attacks more successful. Smarter attacks could lead to much more than turning off security systems, disabling cameras, or hijacking smart appliances, it could enable the ransoming and extortion of additional data or stealth credential attacks.
  • Ransoming OT Edges Could Be a New Reality: Ransomware continues to evolve, and as IT systems increasingly converge with operational technology (OT) systems, particularly critical infrastructure, there will be even more data, devices, and unfortunately, lives at risk. Extortion, defamation, and defacement are all tools of the ransomware trade already. Going forward, human lives will be at risk when field devices and sensors at the OT edge, which include critical infrastructures, increasingly become targets of cybercriminals in the field.
Innovations in Computing Performance Will Also Be Targeted

Other types of attacks that target developments in computing performance and innovation in connectivity specifically for cybercriminal gain are also on the horizon. These attacks will enable adversaries to cover new territory and will challenge defenders to get ahead of the cybercriminal curve.

  • Advanced Cryptomining: Processing power is important if cybercriminals want to scale future attacks with ML and AI capabilities. Eventually, by compromising edge devices for their processing power, cybercriminals would be able to process massive amounts of data and learn more about how and when edge devices are used. It could also enable cryptomining to be more effective. Infected PCs being hijacked for their compute resources are often identified since CPU usage directly impacts the end-user’s workstation experience. Compromising secondary devices could be much less noticeable.
  • Spreading Attacks from Space: The connectivity of satellite systems and overall telecommunications could be an attractive target for cybercriminals. As new communication systems scale and begin to rely more on a network of satellite-based systems, cybercriminals could target this convergence and follow in pursuit. As a result, compromising satellite base stations and then spreading that malware through satellite-based networks could give attackers the ability to potentially target millions of connected users at scale or inflict DDoS attacks that could impede vital communications.
  • The Quantum Computing Threat: From a cybersecurity perspective, quantum computing could create a new risk when it eventually is capable of challenging the effectiveness of encryption in the future. The enormous compute power of quantum computers could render some asymmetric encryption algorithms solvable. As a result, organizations will need to prepare to shift to quantum-resistant crypto algorithms by using the principle of crypto agility, to ensure the protection of current and future information. Although the average cybercriminal does not have access to quantum computers, some nation-states will, therefore the eventual threat will be realized if preparations are not made now to counter it by adopting crypto agility.
AI Will Be Critical To Defending Against Future Attacks

As these forward-looking attack trends gradually become reality, it will only be a matter of time before enabling resources are commoditized and available as a darknet service or as part of open-source toolkits. Therefore, it will take a careful combination of technology, people, training, and partnerships to secure against these types of attacks coming from cyber adversaries in the future.

  • AI Will Need To Evolve: The evolution of AI is critical for future defense against evolving attacks. AI will need to evolve to the next generation. This will include leveraging local learning nodes powered by ML as part of an integrated system similar to the human nervous system. AI-enhanced technologies that can see, anticipate, and counter attacks will need to become reality in the future because cyberattacks of the future will occur in microseconds. The primary role of humans will be to ensure that security systems have been fed enough intelligence to not only actively counter attacks but actually anticipate attacks so that they can be avoided.
  • Partnerships Are Vital for the Future: Organizations cannot be expected to defend against cyber adversaries on their own. They will need to know who to inform in the case of an attack so that the “fingerprints” can be properly shared and law enforcement can do its work. Cybersecurity vendors, threat research organizations, and other industry groups need to partner with each other for information sharing, but also with law enforcement to help dismantle adversarial infrastructures to prevent future attacks. Cybercriminals face no borders online, so the fight against cybercrime needs to go beyond borders as well. Only by working together will we turn the tide against cybercriminals.
  • Enabling Blue Teams: Threat actor tactics, techniques, and procedures (TTPs), researched by threat intelligence teams, such as threat actor playbooks, can be fed to AI systems to enable the detection of attack patterns. Similarly, as organizations light up heatmaps of currently active threats, intelligent systems will be able to proactively obfuscate network targets and place attractive decoys along attack paths. Eventually, organizations could respond to any counterintelligence efforts before they happen, enabling blue teams to maintain a position of superior control. This sort of training gives security team members the ability to improve their skills while locking down the network.

Michael Joseph, Director System Engineering, India & SAARC, Fortinet, said, “2020 demonstrated the ability of cyber adversaries to leverage dramatic changes happening in our daily lives as new opportunites for attacks at an unprecedented scale. Going into 2021 and beyond, we face another significant shift with the rise of new intelligent edges, which is about more than just end-users and devices remotely connecting to the network. Targeting these emerging edges will not only create new attack vectors, but groups of compromised devices could work in concert to target victims at 5G speeds. To get out ahead of this coming reality, all edges must be part of a larger, integrated, and automated security fabric platform that operates across the core network, multi-cloud environments, branch offices, and remote workers.”

Related posts

Vertiv Names Rainer Stiller Chief Marketing Officer

SSI Bureau

CEOs told to get fit for a zero-emissions economy, says BlackRock and software holds the key

SSI Bureau

Securonix Receives $1 Billion+ Growth Investment Led by Vista Equity Partners

SSI Bureau

22 comments

Lreiwp March 8, 2024 at 4:52 am

atorvastatin 20mg canada buy atorvastatin 40mg online order atorvastatin 20mg without prescription

Reply
Khcadq March 18, 2024 at 9:37 pm

ciplox order online – order trimox 250mg sale
erythromycin order

Reply
Ylxaxq March 19, 2024 at 5:38 am

order valacyclovir 500mg without prescription – generic zovirax 400mg acyclovir over the counter

Reply
Nfinry March 21, 2024 at 1:07 am

ivermectin 6mg for sale – buy aczone pills for sale order tetracycline 500mg online

Reply
Ifvnpc March 22, 2024 at 11:14 pm

buy lasix diuretic – candesartan 16mg ca buy capoten 25mg

Reply
Dvwxzf March 23, 2024 at 3:17 am

acillin tablet cost vibra-tabs amoxicillin cost

Reply
Rjzywu March 26, 2024 at 8:10 pm

order generic glucophage 500mg – duricef 250mg usa buy lincocin without a prescription

Reply
Afnbry March 29, 2024 at 3:05 am

quetiapine order – order geodon 80mg pills buy eskalith tablets

Reply
Bntggz March 31, 2024 at 5:07 am

hydroxyzine 10mg cost – generic buspirone buy endep medication

Reply
Lkdjtm April 1, 2024 at 2:29 am

anafranil 25mg brand – remeron usa buy sinequan 75mg for sale

Reply
Lmnyey April 5, 2024 at 3:40 am

buy clavulanate pills – myambutol cost cipro ca

Reply
Yzswoh April 9, 2024 at 3:08 am

cleocin us – buy terramycin 250 mg generic chloramphenicol over the counter

Reply
Nwovul April 12, 2024 at 6:07 pm

albuterol 2mg ca – buy generic ventolin inhalator order theo-24 Cr for sale

Reply
Lzqnrr April 13, 2024 at 8:59 pm

ivermectin 3mg online – eryc 250mg pills cefaclor 250mg price

Reply
Rbrmdy April 15, 2024 at 3:18 am

clarinex drug – ketotifen online order buy albuterol sale

Reply
Webcbe April 16, 2024 at 10:17 pm

depo-medrol online – medrol online buy buy azelastine 10ml sprayers

Reply
Jbvmla April 17, 2024 at 4:48 am

buy micronase online cheap – purchase micronase generic dapagliflozin 10 mg generic

Reply
Hglazw April 19, 2024 at 4:39 am

prandin sale – order prandin 2mg online cheap order empagliflozin 25mg sale

Reply
Wbjiwn April 21, 2024 at 3:45 am

metformin buy online – order sitagliptin 100mg for sale precose 25mg us

Reply
Vpjkjj April 24, 2024 at 1:04 am

rybelsus price – buy semaglutide 14 mg pill DDAVP over the counter

Reply
Pswztm April 24, 2024 at 1:07 am

order nizoral 200 mg online cheap – buy itraconazole sale order sporanox sale

Reply
Lomveb April 26, 2024 at 2:43 am

buy lanoxin tablets – buy verapamil 120mg online cheap purchase furosemide generic

Reply

Leave a Comment

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More