Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

03:30 PM
Simon Marshall
Simon Marshall
Simon Marshall

Countries, Coins & Cloud Will Test Enterprise Security in 2018

According to expert researchers from Kaspersky Labs, 2018's security challenges will be bigger than those seen in 2017.

For every major security attack reported in 2017, many will have gone unreported. More will have been perpetrated without discovery. Hackers sit in networks right now, biding their time.

So where should we be looking for security threats in 2018? I tracked down three of Kaspersky Lab's experts and quizzed them on what we're up against. We identified vulnerabilities from nation states, cryptocurrency miners and enterprise cloud weaknesses as our top three worries.

Nation states
Attack attribution is notoriously challenging. Threat actors are hired on the Dark Web to do the job and then vanish,
malware and attack vector obfuscationmuddy the water and forensics can be inconclusive. Kaspersky says we may not be able to identify where an attack has come from, but we can expect them to continue.

"I think it's hard to say there would be a 'greater threat' of nation states next year, as the same actors are pretty much at it year in and year out," Brian Bartholomew, security researcher at Kaspersky Lab Global Research and Analysis Team, told SecurityNow. "One can 'predict' an increase based on some of the known events coming up, but honestly, the level of nation state attacks will most likely remain the same as it's been in years past, barring a major conflict, which would certainly increase the threat."

North Korea was formally blamed by the US in December for the WannaCry attack, with commentators citing the Rebublic's need for military funding amid sanctions as a driver for the accusation. Obviously, February's Winter Olympics in Pyeongchang are a focal point of cyber worry, as are the US mid-term elections in November. And, there are general or presidential elections coming up this year in Georgia, Azerbaijan, Russia, Iraq and Pakistan to name a few. Then, there's the threat of escalation of tensions on the Korean Peninsula.

"Destructive style attacks by nation states could also show up again," said Bartholomew. "This most likely will depend on the conflict status of countries such as North Korea, Iran and others who have been known to launch these types of attacks in the past."

December's Triton near-miss has been attributed to the activity of a nation state with 'moderate' confidence by Fireye, which discovered the attack on industrial controllers that could have caused physical damage.

"While a shutdown was created in the industrial process, it was most likely done by accident while developing a more destructive capability," suggests Bartholomew. "Had the actor succeeded in their assumed plans, the outcome would have been much worse."

Cryptocurrency miners
It has been estimated that about half a billion computers are currently mining cryptocurrencieswithout the owners' knowledge. The low cost for actors of distributing covert mining software through websites, the current cryptocurrency pricing bubble and the difficulty for the user in spotting illegally installed miners are the perfect storm.

"Miners can bring real and relatively easy money to fraudsters, and that's why this software is turning into a popular tool for malicious users," said Alexey Malanov, a malware expert at Kaspersky Lab. In the same way that birds of one species may unknowingly nurture a cuckoo in their midst, miners profit at the expense of the computer owner. "After running a downloaded file, the miner installs independently and simply starts secretly mining cryptocurrencies by using a victim's computing power and electricity."

Malanov reckons that miners increase PC electrical consumption fivefold by loading the CPU and video card, leading to the ultimate potential failure of the computer.

Enterprise cloud
Consumer food outlets Chipotle, Wendy's and SONIC Drive-In have all recently been targets for hackers. SONIC made no public statement about the source of its October breachwhich may have resulted in millions of credit card details being stolen. The working theory is that SONIC's supply chain may have initially been targeted as the weakest link in the security chain.

"One of the biggest threats to enterprises that we are seeing now -- and expect to see more of in 2018 -- is supply chain attacks," said Rob Cataldo, vice president of enterprise sales at Kaspersky Lab North America. "As attackers can target third-party providers to subsequently infiltrate the better-protected original target, this is an alarming threat to businesses that needs to be addressed in their cloud security strategies before it's too late.

According to Kaspersky's own figures, about 35% of businesses don't know where their corporate data is housed and how it's being secured. Nearly a quarter of them held their hand up to not checking the compliance credentials of their cloud and SaaS service providers, leaving this as a gaping security loophole as we enter 2018.

As more enterprises move to the convenience of the cloud, Cataldo thinks they shouldn't lose sight of where their data is, or most importantly, treat a supplier as outside of their own security policy.

"Enterprises need to have a discussion with third-party providers about their cybersecurity policies and treat the relationship as a business risk that needs to be continuously managed," he said.

Related posts:

— Simon Marshall, Technology Journalist, special to Security Now

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-28
An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.
PUBLISHED: 2020-11-28
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
PUBLISHED: 2020-11-28
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
PUBLISHED: 2020-11-28
An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
PUBLISHED: 2020-11-28
An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.