October is National Cybersecurity Awareness Month (NCSAM) and this week’s theme is Today’s predictions for tomorrow’s internet.
And that presented us with a bit of a problem.
At Naked Security we’re big fans of NCSAM but we aren’t fans of predictions. Or at least not the popular, blue sky kind that sees every glitch, failure and fumble as a sign of the impending digital Pearl Harbour. So we decided to support week three of NCSAM with some predictions but we’re doing it our way – by taking the “tomorrow’s internet” part literally.
We asked a number of people working in different technical roles at Sophos where they’re actually planning to spend some of their time and energy in the next six months.
So here are our “from the trenches” predictions that reflect what people are actually preparing for. We’re preparing for them to come true, maybe you should too.
1. More file-less attacks
Principal Threat Researcher 2, Fraser Howard:
To date file-less attacks have been fairly isolated, but it seems to be growing in prominence (Poweliks, Angler for a bit, Kovter and more recently Powmet). This is a natural response to the widespread deployment of machine learning.
I also expect to see a rise in Powershell abuse.
2. Smarter fuzzing for everyone
Senior Security Analyst 2, Stephen Edwards:
I’m expecting the sophistication of fuzzing to improve significantly. Fuzzing can be used to automatically create billions of ‘stupid’ tests and the next challenge is to make those tests smarter, by informing the test creation process with knowledge about how a program works.
Automatic exploration of code is hard though.
Hybrid techniques try to balance the speed of stupid tests with the efficiency of smarter ones, while avoiding getting lost in too many choices.
A number of promising approaches to improving fuzzing have already been demonstrated and it feels to me that we’re almost at a breakthrough where those different techniques will be combined and made public.
3. Ask who and what, not where
Cyber Security Specialist, Mark Lanczak-Faulds:
Traditionally, security focuses on the domain as a whole. As we look to blur the boundaries of a traditional network and the internet, what matters are the identities and assets residing within the domain.
We need to determine risk based on identity and the assets associated with that identity. When you trigger an alert accounting for those factors, you know what’s at stake and can act proportionately and swiftly.
4. Focus on exploit mitigation
Sophos Security Specialist, Greg Iddon:
Patching is no longer something you can save until after change freeze or a rainy day.
I think that in the next six to twelve months, implementing exploit mitigation – protection against the abuse of known or unknown bugs and vulnerabilities, and the underlying way attackers take advantage of these bugs and vulnerabilities – is going to be key to staying ahead.
What concerns me most is that there is a swathe of new vendors who are only focussing on detection of Portable Executable (PE) files, touting machine learning as the be-all and end-all of endpoint security. This simply isn’t true.
Don’t get me wrong, machine learning is great, but it’s just a single layer in what must be a multi-layered approach to security.
5. Ransomware repurposed
Global Escalation Support Engineer, Peter Mackenzie:
Based on some trends we’re seeing now I think we could see a shift in the way that ransomware is used.
Unlike most other malware, ransomware is noisy and scary – it doesn’t work unless you know you’ve got it, and it has to make you feel afraid. As security tools get better at dealing with ransomware, some attackers are using that noisyness as a technique for hiding something else, or as last resort after making money off you another way using, say, key loggers or cryptocurrency miners.
Once you’ve removed the noisy ransomware infection it’s easy to think you’ve cleaned your system. What you need to ask is “why did it detonate now?” and “what else was, or still is, running on the computer where we found the ransomware?”.
That’s enough from us, we’d love to read your predictions in the comments below.
Follow @NakedSecurityfrom Naked Security http://ift.tt/2yw86Yd
0 comments:
Post a Comment