Threat Intelligence
5/17/2017
12:00 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Inside the Motivations Behind Modern Cyberattackers

Attackers seeking money, dominance, and data are banding together and sharing infrastructure to target businesses.

Today's organizations have a few key disadvantages in the fight against modern cybercrime. For one, each needs to build an indestructible defense -- but attackers only need to find one crack to break in.

On top of that, each business is up against several attackers who share strategies and skills. Cybercriminals are collaborating better than white-hat hackers are, explained Paul Kurtz, co-founder and CEO at TruSTAR, during his Dark Reading Crash Course presentation at this year's Interop ITX.

Kurtz focused his talk on the motives and methods of today's adversaries: who are they, what do they want, and how are they targeting their victims?

Motivations for cybercrime extend beyond the obvious draw of financial gain. Attackers are also driven by espionage, dominance, and creating uncertainty, as demonstrated by the proliferation of false information during last year's presidential elections.

"We have an evolution going on" with respect to the types of threats businesses face, he continued. Ransomware "continues to explode," with attacks increasing by 50% in one year. Social engineering is a growing problem; social actions like phishing were present in 21% of incidents over the last year, said Kurtz.

Nation-state threats have recently become a top concern, given the current geopolitical landscape and aftermath of the WannaCry ransomware attacks. Kurtz warned against focusing too much on attribution when it comes to cybercrime.

Many victims want to know who is behind these attacks, he said, but it doesn't matter whether it's a nation-state, criminal, terrorist, hacktivist, or insider -- they're all working together on exploits and sharing information with one another. If the latest cyberattack didn't affect your organization, there's a hacker who can use its source code to launch a similar one.

"In the end, with this particular attack, we have to remember adversaries are looking at what other adversaries are doing," Kurtz said of WannaCry. "They'll think they can improve on what's been done."

Knowing who is behind cyberattacks, in a way, "doesn't really help you much," he noted. Instead of trying to classify individual threat actors, he urged his audience to try and better understand how these adversaries work together and use this information to inform their security strategies.

"Today, the most important information about cyberattacks is locked inside your company, which has been attacked," he noted. However, businesses aren't using this information to its full advantage and sharing it to protect against threats.

In his session, "Collecting and Using Threat Intelligence Data", Polarity CEO Paul Battista emphasized the importance of leveraging intelligence for threat warnings, prevention, and informed decision-making.

"It's important for managers, businesses, engineers, and machines to understand what they're up against," he explained. Security practitioners should be asking their business leaders: what keeps you up at night? What do you think are the biggest threats to our organization? What decisions do you make, and how can intelligence improve them?

Manual threat intelligence research can be time consuming, especially as the number of threat intelligence indicators grows into the billions. This data should be collected into a single repository so organizations can identify malicious activity and have a holistic understanding of the threats they face.

"We need to be able to take indicators and bring them into an environment that's relevant to us," said Teddy Powers, security engineer at Anomali. "We're faced with too many fires on a daily basis not to take advantage of threat intelligence platforms."

If threat actors are collecting and sharing information, he continued, then why aren't businesses?

Related Content

Kelly Sheridan is Associate Editor at Dark Reading. She started her career in business tech journalism at Insurance & Technology and most recently reported for InformationWeek, where she covered Microsoft and business IT. Sheridan earned her BA at Villanova University. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
JulietteRizkallah
50%
50%
JulietteRizkallah,
User Rank: Ninja
5/18/2017 | 2:49:34 PM
Cybersecurity industry too competitive to collaborate?
The article's author is right: cyber criminals band together and share info and knowledge way faster and better than their targets.  So they stay ahead of the game and move evolve their attacks extremely fast. When we look at the cyber security vendors, they are all competing to be the first to have a way to prevent or mitigate attacks, they do not share any information with each other due to the extreme competitive environement. 

We may need federal involvment of regulations to get to a true collaboration, or something really bad to happen...
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: just wondering...Thanx
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.