New year, new risks

Issue 1 2023 Information Security


Doros Hadjizenonos.

FortiGuard Labs researchers have warned that cyber criminals are finding yet more ways to weaponise new technologies at scale to enable more disruption and destruction. In their Threat Predictions for 2023, the researchers point to an emerging ‘Web3 Wild West’, the looming risks posed by ‘Q-Day’ and the dramatic return of wiper malware as some of the biggest new threats emerging in 2023.

Web3 risks

Web3, the blockchain-based iteration of the internet, aiming to decentralise ownership of the digital economy, offers benefits such as making it easier for development teams to deploy applications without managing and maintaining new infrastructure. However, because Web3 is about the user controlling their own data, and users are often the weakest link, it also presents new risks.

For example, Web3 wallets today do not use MFA, relying only on passwords, which are difficult to recover if lost. The researchers anticipate that before Web3 goes mainstream, regulations may be introduced on how network nodes address fraudulent activities and stolen data.

Q-Day is coming

Quantum computing is already providing breakthroughs in areas like cracking previously unbreakable cryptographic algorithms, prompting warnings that it is only a matter of time before quantum day (Q-Day) arrives, when quantum computers will be powerful enough to break current encryption mechanisms. FortiGuard Labs notes that the security community is working to create new encryption algorithms designed to stand up to quantum computers, but this effort is still ongoing.

A NIST contest for new post-quantum encryption algorithms saw one encryption, Supersingular Isogeny Key Encapsulation (SIKE) suffering a cyberattack from a single-core computer that successfully broke the encryption. FortiGuard Labs also warns that cyber criminals may start using quantum computing for additional nefarious activities.

Wipeout

FortiGuard Labs also notes that wiper malware has made a dramatic comeback in 2022, with attackers introducing new variants of this decade-old attack method. They predict that threat actors will increasingly combine various threats to maximise the level of ongoing destruction they can cause, for example, combining a computer worm with wiper malware to make it easier for the malware to replicate quickly, spread more widely, and cause massive destruction in a short period.

Last year, FortiGuard Labs team predicted a rise in new vulnerabilities, pre-attack reconnaissance among attackers that would pave the way to escalate the growth of Crime-as-a-Service (CaaS). Their prediction came true. We saw a rise in targeted attacks enabled by the RaaS model and more affiliates launching these calculated attacks.

The volume, variety, and scale of cyberthreats will keep security teams on high alert in 2023 and beyond.

2023 defence strategies

Those planning their 2023 security strategies need to start by taking a very high-level view, bracing for the unexpected with a security posture that is flexible enough to be able to react to attacks from any direction. Looking outside for clues about future attack methods will be more important than ever to help prepare before attacks take place. Digital risk protection (DRP) services are a good way to assess your security posture from the outside. CISOs must also have an equal understanding of what is going on inside the company.

Implementing network segmentation is also critical to protecting your organisation from cybercriminals. Segmentation helps prevent attacks from spreading across a network and infiltrating unprotected devices and other systems.

Deception technology (imitating a valuable piece of software or an important device) will help you identify attacks and give you the ability to trace back to where the threat is coming from, including the IP address, and a lot of other forensic information that is necessary to identify and block the attacker.

Regardless of work-from-anywhere, learning-from-anywhere, or immersive experiences-from-anywhere, real-time visibility, protection, and mitigation is essential with advanced endpoint detection and response (EDR) to enable real-time analysis, protection, and remediation.

Whenever possible, enhance security solutions with machine learning (ML) and AI so they can detect attack patterns and stop threats in real time. One of the most important methods to defend against these developments is cybersecurity awareness education and training. Organisations should consider adding new modules that provide education on spotting evolving methods such as AI-enabled threats.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What are MFA fatigue attacks, and how can they be prevented?
Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...
SA's cybersecurity risks to watch
Information Security
The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.

Read more...
Cyber insurance a key component in cyber defence strategies
Information Security
[Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...