Hard-to-Spot and Prevent Cyber Insecurity Threat Predicted
By Irene Gaitirira
Published November 23, 2017
Kaspersky Lab, in its Targeted Threat Predictions for 2018 report, says attackers, in a hard-to-block attack, could use legitimate third-party software to gain entry into enterprises. High-end mobile malware attack is also set to rise as attackers resort to new tricks to breach increasingly well protected targets.
“Supply chain attacks have proven every bit as nightmarish as we had previously theorised. As advanced threat actors continue to gain access to vulnerable development companies, back-dooring of popular or regionally popular software will become an increasingly desirable attack vector. Supply chain attacks will allow attackers to successfully gain access to multiple enterprises in target sectors while flying under the radar of system administrators and security solutions alike,” says Juan Andrés Guerrero-Saade, Principal Security Researcher in charge of Global Research and Analysis Team.
In 2017, supply chain attacks such as Shadowpad and ExPetya showed how easily third-party software could be used to gain entry into enterprises. This threat is expected to increase in 2018 as some of the world’s most dangerous threat actors start adopting the approach as an alternative to watering hole techniques or because other attempts to break in have failed.
Other targeted threat predictions for 2018 include:
- More high-end mobile malware
Advanced mobile malware which, when combined with exploits, constitute a powerful weapon against which there is little protection
- Destructive attacks will continue to rise
The Shamoon 2.0 and StoneDrill attack reported in early 2017 and the June ExPetr/NotPetya attack revealed a growing enthusiasm for destructive wiper attacks
- More attacks will lead with reconnaissance and profiling to protect attackers’ most precious exploits.
Attackers will spend more time on reconnaissance and using profiling toolkits such as ‘BeEF’ to determine if a less-costly, non-zero day exploit will do
- Sophisticated attacks will be found exploiting the bridge between the operating system (OS) and firmware
The Unified Extensible Firmware Interface (UEFI) is the software interface between the firmware and the OS on modern PCs. Kaspersky Lab expects more threat actors will make use of UEFI’s highly advanced capabilities to create malware that can be launched before any anti-malware solution, or even the OS itself, has had a chance to start
- More router and modem hacks
This well-known area of vulnerability has been largely ignored as a tool for advanced targeted attackers. They sit at a critical juncture for an attacker intent on gaining persistent and stealthy access to a network, and could even allow an attacker to hide their trail.
Top industry threat predictions for 2018 include:
- Connected vehicles are likely to face new threats as a result of growing supply chain complexity leading to a scenario where no one player has visibility of, let alone control over, all of a vehicle’s source code. This could make it easier for attackers to break in and bypass detection.
- In healthcare, attacks breaching private networks to target medical equipment and data with the aim of extortion, malicious disruption or worse, could rise as the volume of specialist medical equipment connected to computer networks grows.
- In financial services, the increased security of online payments means that fraudsters will turn their attention to account takeover attacks. Industry estimates suggest fraud of this type will run into billions of dollars.
- Industrial security systems are likely to be at increased risk of targeted ransomware attacks. Operational technology systems are more vulnerable than corporate IT networks, and are often exposed to the Internet.
- Targeted attacks on companies for the purpose of installing cryptocurrency miners – and in time this could become a more lucrative, long term business proposition than ransomware.