cxo voice
  • Home
  • News
  • Leaders Talk
  • Expert Opinion
No Result
View All Result
  • Home
  • News
  • Leaders Talk
  • Expert Opinion
No Result
View All Result
Leaders Talk and Latest Tech News | CXO VOICE
No Result
View All Result
Home News Cyber Security

FortiGuard Labs Predicts Organizations Will Employ More Automation To Combat Cyber Criminals

Santosh Kumar by Santosh Kumar
November 28, 2018
Reading Time: 5 mins read
Cyber Criminals
Share on FacebookShare on Twitter

Cybersecurity solutions provider Fortinet unveiled predictions from the FortiGuard Labs team about the threat landscape for 2019 and near future. These predictions reveal methods and techniques that Fortinet researchers anticipate cyber criminals will employ in the near future, along with important strategy changes that will help organizations defend against these oncoming attacks.

Cyber Attacks Will Become Smarter and More Sophisticated

For many criminal organizations, attack techniques are evaluated not only in terms of their effectiveness, but in the overhead required to develop, modify, and implement them. As a result, many of their attack strategies can be interrupted by addressing the economic model employed by cyber criminals. Strategic changes to people, processes, and technologies can force some cyber criminal organizations to rethink the financial value of targeting certain organizations.

One way that organizations are doing this is by adopting new technologies and strategies such as machine learning and automation to take on tedious and time-consuming activities that normally require a high degree of human supervision and intervention. These newer defensive strategies are likely to impact cyber criminals strategies, causing them to shift attack methods and accelerate their own development efforts. In an effort to adapt to the increased use of machine learning and automation, we predict that the cyber criminal community is likely to adopt the following strategies, which the cybersecurity industry as a whole, will need to closely follow.

1. Artificial Intelligence Fuzzing (AIF) and Vulnerabilities:

Fuzzing has traditionally been a sophisticated technique used in lab environments by professional threat researchers to discover vulnerabilities in hardware and software interfaces and applications. They do this by injecting invalid, unexpected, or semi-random data into an interface or program and then monitoring for events such as crashes, undocumented jumps to debug routines, failing code assertions, and potential memory leaks. Historically, this technique has been limited to a handful of highly skilled engineers working in lab environments.

However, as machine learning models are applied to this process we predict that this technique will not only become more efficient and tailored, but available to a wider range of less technical individuals. As cyber criminals begin to leverage machine learning to develop automated fuzzing programs they will be able to accelerate the process of discovering zero-day vulnerabilities, which will lead to an increase in zero-day attacks targeting different programs and platforms.

  • Zero-Day Mining Using AIF: Once AIF is in place, it can be pointed at code within a controlled environment to mine for zero-day exploits. This will significantly accelerate the rate at which zero-day exploits are developed. Once this process becomes streamlined, zero-day mining-as-a-service will become enabled, creating customized attacks for individual targets. This will change how organizations will need to approach security as there will be no way to anticipate where these zero-days will appear, nor how to properly defend against them. This will be especially challenging when using the isolated legacy security tools which many organizations have deployed in their networks today.
  • The “Price” of Zero-Days: Historically, the price of zero-day exploits has been quite high, primarily because of the time, effort, and skill required to uncover them. But as AI technology is applied over time, such exploits will shift from being extremely rare to becoming a commodity. We have already witnessed the commoditization of more traditional exploits, such as ransomware and botnets, and the results have pushed many traditional security solutions to their limits. The acceleration in the number and variety of available vulnerabilities and exploits, including the ability to quickly produce zero-day exploits and provide them as a service, will also impact the types and costs of services available on the dark web.

2. Swarm-as-a-Service:

Significant advances in sophisticated attacks powered by swarm-based intelligence technology is bringing us closer to a reality of swarm-based botnets known as hivenets. This emerging generation of threats will be used to create large swarms of intelligent bots that can operate collaboratively and autonomously. These swarm networks will not only raise the bar in terms of the technologies needed to defend organizations, but like zero-day mining, they will also have an impact on the underlying cyber criminal business model. Ultimately, as exploit technologies and attack methodologies evolve, their most significant impact will be on the business models employed by the cyber criminal community.

ADVERTISEMENT

Currently, the criminal ecosystem is very people-driven. Some professional hackers for hire build custom exploits for a fee, and even new advances such as Ransomware-as-a-Service requires black hat engineers to stand up different resources, such as building and testing exploits and managing back-end C2 servers. But when delivering autonomous, self-learning Swarms-as-a-Service, the amount of direct interaction between a hacker-customer and a black hat entrepreneur will drop dramatically.

  • A-la-Carte Swarms: The ability to subdivide a swarm into different tasks to achieve a desired outcome is very similar to the way the world has moved towards virtualization. In a virtualized network, resources can spin up or spin down VMs based entirely on the need to address particular issues such as bandwidth. Likewise, resources in a swarm network could be allocated or reallocated to address specific challenges encountered in an attack chain. A swarm that criminal entrepreneurs have already preprogrammed with a range of analysis tools and exploits, combined with self-learning protocols that allow them to work as a group to refine their attack protocols, makes purchasing an attack for cyber criminals as simple as selecting from an a-la-carte menu.

3. Poisoning Machine Learning:

Machine learning is one of the most promising tools in the defensive security toolkit. Security devices and systems can be trained to perform specific tasks autonomously, such as baselining behaviors, applying behavioral analytics to identify sophisticated threats, or tracking and patching devices. Unfortunately, this process can also be exploited by cyber adversaries. By targeting the machine learning process, cyber criminals will be able to train devices or systems to not apply patches or updates to a particular device, to ignore specific types of applications or behaviors, or to not log specific traffic to evade detection. This will have an important evolutionary impact on the future of machine learning and AI technology.

 Defenses Will Become More Sophisticated

To counteract these developments, organizations will need to continue to raise the bar for cyber criminals. Each of the following defensive strategies will have an impact on cyber criminal organizations, forcing them to change tactics, modify attacks, and develop new ways to assess opportunities. The cost of launching their attacks will escalate, requiring criminal developers to either spend more resources for the same result, or find a more accessible network to exploit.

1. Advanced Deception Tactics:

Integrating deception techniques into security strategies to introduce network variations built around false information will force attackers to continually validate their threat intelligence, expend time and resources to detect false positives, and ensure that the networked resources they can see are actually legitimate. And since any attacks on false network resources can be immediately detected, automatically triggering countermeasures, attackers will have to be extremely cautious performing even basic tactics such as probing the network.

2. Unified Open Collaboration:

One of the easiest ways for a cyber criminal to maximize investment in an existing attack and possibly evade detection is to simply make a minor change, even something as basic as changing an IP address. An effective way to keep up with such changes is by actively sharing threat intelligence. Continuously updated threat intelligence allows security vendors, and their customers, to stay abreast of the latest threat landscape. Open collaboration efforts between threat research organizations, industry alliances, security manufacturers, and law enforcement agencies will significantly shorten the time to detect new threats by exposing and sharing the tactics used by attackers. Rather than only being responsive, however, applying behavioral analytics to live data feeds through open collaboration will enable defenders to predict the behavior of malware, thereby circumventing the current model used by cyber criminals to repeatedly leverage existing malware by making minor changes.

 

Is Cyber Security Still a Challenge for Indian Organizations?

 

Santosh Kumar

Santosh Kumar

Senior Writer at CXO VOICE. His email is santosh@cxovoice.com

Related Posts

Cybersecurity While Working from Home amid Coronavirus outbreak
Cyber Security

Hackers targeted Google, Microsoft products via zero-day exploitation in 2022: Report

March 22, 2023
AI chatbots
Cyber Security

Avoid AI chatbots that don’t appear on the company’s website or app: warn researchers

March 14, 2023
security
Cyber Security

US issued new cybersecurity strategy, puts onus on Big Tech firms

March 3, 2023
80% of Indian firms face cyber attacks due to miscommunication in IT security
Cyber Security

80% of Indian firms face cyber attacks due to miscommunication in IT security

February 20, 2023
Cyber Criminals
Cryptocurrency

Cyber agency warns of huge global attack

February 6, 2023
How to remove a virus from a phone?
Cyber Security

How to remove virus from phone?

January 23, 2023
Zero click attacks
Cyber Security

T-Mobile data breach, 37 mn customer’s data stolen

January 20, 2023
cyber security initiatives by Government of India
Cyber Security

Hackers accessed employees’ data in ransomware attack: The Guardian

January 12, 2023
Load More
ADVERTISEMENT

Expert Views

chatbots for businesses
Opinion

Why chatbots are important for businesses to strengthen their sales and operations

June 5, 2023
How Travel and Expense can pave the way for responsible spend culture
Opinion

How Travel and Expense can pave the way for responsible spend culture

May 24, 2023
Data at Rest
Cyber Security

Data at Rest – How Data Encryption and Data Security Beneficial to IT Teams?

May 8, 2023
SaaS Rising: India is Ready for its Next IT Moment
Opinion

SaaS Rising: India is Ready for its Next IT Moment

January 31, 2023
Technology remains the main driver for insurance companies to scale and grow in 2023
News

Technology remains the main driver for insurance companies to scale and grow in 2023

January 10, 2023

Latest Updates

Top 10 Data and Analytics Technology Trends for 2020

Marketing leaders in India to boost the use of generative AI: Report

by IANS
18 hours ago

Users can now create desktop shortcut for Google Password Manager

Users can now create desktop shortcut for Google Password Manager

by IANS
24 hours ago

HP launched new PC portfolio to meet the evolving consumer demands

HP introduces 45-inch curved display, vertical mouse in India

by IANS
3 days ago

Apple iPadOS 17 offers redesigned Lock Screen, interactive widgets & more

Apple iPadOS 17 offers redesigned Lock Screen, interactive widgets & more

by IANS
4 days ago

Working in a post-pandemic world: What is the new normal?

Approx 4K people lost their jobs in the US due to AI in May: Report

by IANS
5 days ago

Atomic Wallet faces security breach, loses over $35 mn in crypto

Atomic Wallet faces security breach, loses over $35 mn in crypto

by IANS
5 days ago

Get Latest Update

Subscribe to our mailing list to receives newsletter direct to your inbox!

ADVERTISEMENT

Leaders Inerviews

Interview with Prasanna Arikala, CTO, Kore.ai on AI chatbots
AI

Can AI chatbots enhance customer experience and reduce the cost of serving customers?

-
Rising cyber attacks pose a serious threat to Indian SMBs, says Zakir Hussain
Cyber Security

Rising cyber attacks pose a serious threat to Indian SMBs, says Zakir Hussain

-
Axis Bank's Cloud-driven digital banking solutions
Banking

Axis Bank doubles down on cloud based digital banking solutions

-
digital-first strategy
Banking

Jana Small Finance Bank’s digital-first strategy enhances customer experience

-

Entrepreneur

Samsung Electronics appoints its first female president

Inspiring Women Entrepreneurs in India (2022)

Technology Adoption For Entrepreneurs

Volunteering management is the need of the Hour

We bring business leaders' opinions and unique ideas on what’s happening in the market and its impact. Also, get the daily news, analysis, and insights.

Connect with us

Easy Links

  • Cryptocurrency
  • Event
  • Blockchain
  • Press Release
  • Resources & Downloads

Write Us

contact@cxovoice.com
  • Home
  • About
  • Contact Us
  • Advertise
  • Privacy & Policy
  • Feedback

© 2023 CXO VOICE

No Result
View All Result
  • Home
  • News
  • Leaders Talk
  • Expert Opinion

© 2023 CXO VOICE

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Our Spring Sale Has Started

You can see how this popup was set up in our step-by-step guide: https://wppopupmaker.com/guides/auto-opening-announcement-popups/