AI will supercharge spear-phishing
Imagine a piece of malware hidden on your boss’ computer. It watches her every move, quietly listening; learning. It sifts through her emails, calendar, and messages. In the process, it doesn’t just learn her writing style. It learns the unique way she interacts with everyone in her life.
It picks up on the inside jokes she shares with her husband. It knows the formal tone she employs with the CEO. And it recognizes the familiar cadence she uses with her favorite employee: you.
Her emails to you are often casual, even jokey. She signs her emails with ‘Cheers’ and sends you corny jokes on occasion. And before important meetings, she writes you an encouraging email.
One day, on your way to a morning meeting, you get an email from her. It reads:
I’ll see you at 9 for our meeting. You’re gonna kill it today.
See attached for a map to their office.
PS why did the refrigerator need a bandaid?
……….. for the cold cuts!
You smile, but suddenly you remember that you don’t know where their office is. Would you open the map?
Most people wouldn’t give a second thought. But the attached ‘map’ is really a malicious payload that, if opened, would start rapidly encrypting data and hold your company’s files hostage for a $30,000 ransom.
Artificial intelligence won’t just be used for good — it will open the door for sophisticated cyber-attacks like this. AI will supercharge spear-phishing with automated, intelligent technology. Hyper-realistic, machine-written emails are not some distant fiction. Indeed, the technology already exists.
Between Google’s DeepMind and voice-recognition software like Amazon’s Alexa, machines can now recognize and copy subtle patterns in human behavior. Recently, an intelligent machine even learned how to write a dystopian sci-fi novel . An email from your boss would be child’s play for an even moderately advanced AI.
Artificial intelligence won’t just power phishing attacks either. It will augment every kind of cyber-attack — including those we don’t even know about — with advanced decision-making capabilities. To keep pace with intelligent, unpredictable threats, cyber security will have to adopt an intelligent security of its own.
Want to learn more about the future of AI? You can book a meeting with me and the rest of the Executive Team at the upcoming RSA conference in San Francisco.
5 cyber security predictions for 2017
Between the Yahoo hack, the DNC email leak, and the DDoS attack that took down much of the Internet, 2016 has seen an unprecedented wave of cyber-attacks.
But these headlines offer but a glimpse into the cyber-war that’s waged every day on a grand scale. Evolving threats and new vulnerabilities mean this war is in a state of constant flux. By analysing current security trends, however, we can try to gauge what the attacks of the future will look like.
These are my predictions for 2017:
- Attackers won’t just steal data — they’ll change it
Criminals aren’t just looking to make a quick buck anymore. They’re playing the long con. By subtly manipulating information, they can inflict reputational damage, erode the integrity of data, or even influence public opinion via ‘fake news’.
- Insider threats will rise dramatically
As networks become busier and more complex, indications of insider threat will get lost in the noise of the network. Yet, these subtle changes could represent thousands of files being removed by a careless employee.
- The Internet of Things will become the Internet of Vulnerabilities
According to Gartner, 13.5 billion connected devices will be in use by 2020 . The Dyn attack exploited these smart devices to devastating effect, and future attacks will continue to use vulnerabilities in the IoT for large-scale attacks.
- Consumer devices will be held hostage
In 2016 alone, ransomware has skyrocketed by 400 percent . It’s only a matter of time until these attacks start to target consumer devices. Your smart TV, your phone, your computer, even your car could be held for ransom.
- Artificial intelligence will go dark
AI will soon become a cyber-weapon. Highly sophisticated and persistent attacks will use AI to bypass traditional defenses. From the shadows, they’ll be able to manipulate data, launch advanced phishing campaigns, steal sensitive files, or activate a kill-switch.
But there is hope. If we can forecast the upcoming threats, we can better prepare ourselves for the challenges to come. Our security strategies for the new year should be designed with these threats in mind.
In the meantime, on behalf of everyone here at Darktrace, we hope you have a wonderful holiday, a happy New Year, and a cyber-safe 2017.
The Internet of Stranger Things
To take down DNS provider Dyn, hackers exploited critical vulnerabilities in the Internet of Things. Vital internet services crashed, including Twitter, Amazon, and Netflix. Experts now suggest that amateurs may have been behind the attack . This begs the question — if amateurs can use IoT to wreak havoc, how will more sophisticated attackers proceed?
As IoT devices become increasingly prevalent — and as ransomware has skyrocketed by 259 percent in just five months — criminals will start to look at essential business equipment as a viable target. Healthcare machines like insulin pumps and MRIs are now network-connected, as are Boeing 787s, oilfield sensors, wind turbines, quality control machines, and more.
By taking control of essential equipment, a criminal can bring business to a grinding halt, either demanding payment to regain access, or sabotaging the equipment beyond repair.
But IoT attacks also don’t have to be so obvious. Once a criminal has control of a network device, they can subtly alter its data. For instance, by changing results obtained from a drilling company’s sensors, a criminal can trick them into mining a depleted area.
This represents a far more insidious kind of attack. With critical equipment under their control, a criminal can quietly tweak bank account numbers, medical results, or blueprints. Just a small change can prove catastrophic, and given the ubiquitous nature of IoT devices, every industry is vulnerable. Worse still, you may not realize until it’s too late.
By comparison, the Dyn attack seems rather crude.
To be sure, the DDoS attack on Dyn was eye-opening. In the course of a day, we learned the ease with which lackluster IoT security can be exploited for massive cyber-attacks. In this instance, the attacker created a Mirai botnet using home devices to overload the Dyn servers with attack traffic reported to be as high as 1.2 Tbps .
But the Dyn attack is just the beginning. Whether through a subtle attack or an aggressive ransomware extortion, modern businesses are facing substantial new threats because of the IoT. Our security approach needs to reflect this new reality. Fortunately, self-learning immune systems are here, and they can automatically adapt to protect even the newest technologies within our digital ecosystems.
For more on the future of IoT security, sign up for my webinar to learn how cyber-attacks will soon be powered by AI .
Holiday hacking: Cyber-attacks on Cyber Monday
Every year, on the first Monday after Thanksgiving, two things happen. First, online retailers slash prices and the internet goes on its annual shopping spree. And second, criminals swarm on unwitting businesses, launching large-scale hacks and clever scams.
Digital sales reach up to $3.19 billion on Cyber Monday . Amazon alone generated 36 percent of all online sales last Cyber Monday, accounting for an estimated $1 billion. With so much money changing hands over the internet, the ramifications of a cyber-attack would be huge.
What happens if a DDoS attack hits Amazon’s service provider? The website goes down. Digital sales grind to a halt. And millions in revenue go down the drain as they watch their most lucrative day of the year pass them by.
On Cyber Monday 2014, a DNS provider was hit with a fairly rudimentary DDoS attack. While it lacked the large-scale impact of today’s Mirai botnets, their clients lost vital business. In another holiday attack, criminals hacked Target and stole sensitive data from 70 million customers.
Disruption and data-theft have become tried-and-true tactics for criminals on Cyber Monday. And with Mirai botnets capable of launching massive DDoS attacks, these could become even more devastating, reminiscent of the Dyn attack but with more far-reaching monetary consequences.
However, in their current form, DDoS attacks are still relatively simple. They work by exploiting a fundamental flaw in the Internet. But what if this Cyber Monday, a highly targeted and sophisticated DDoS attack took an organization hostage? By overwhelming a company — or a series of companies — with junk traffic, an attacker could demand a large sum to stop the attack. Whether to manipulate the market or for financial gain, all signs point toward increasingly advanced DDoS attacks.
The implications for this Cyber Monday are clear — businesses need to be prepared. From DDoS to ransomware, every organization can expect to be hit. Companies should bolster their cyber defense well before the holidays, because in security, as in life, you should expect the best, but prepare for the worst.
To learn more about the types of attack you could face, check out my thoughts on DDoS and the IoT .
2016: The year of election tampering?
The 2016 U.S. election is roiled by fears over election tampering and cyber-warfare. While such anxiety threatens to undermine confidence in the results, the up-side is that for the first time since 2000, the election is generating thoughtful discussion on the intersection of cyber-security and voting.
After the high-profile hack of the Democratic National Committee, and after attacks on voter registration databases in 20 states, these fears are certainly justified. After all, we live in a new era of threat, where foreign powers don’t hesitate to use cyber-tools for economic and political gain. The White House has now formally blamed Russia for the DNC hack, but they’re hardly the only nation-state willing to engage in cloak-and-dagger cyber-warfare.
Further complicating matters is that our voting machines are in desperate need of an overhaul. In 2006, computer scientists proved that in less than a minute, an e-voting machine could be hacked and installed with vote-changing malware , and it can even be done remotely. But intentional manipulation may not even be our biggest concern — in 2004, North Carolina lost 4,438 votes because of a system error.
If you’re thinking paper ballots are the answer, I don’t blame you. Most states would agree: only five states currently use digital voting alone , and 75 percent of all voting is done on paper ballots.
But after the 2000 election, when the infamous ‘hanging chads’ forced millions of votes to be invalidated, it became clear that paper ballots are not only cumbersome, but inaccurate. Two years later, Congress passed the Help America Vote Act and introduced digitized voting and registration databases across America. Unfortunately, the new machines were plagued with errors, and many of them are still in use today.
Growing concern over election tampering prompted 33 state election agencies to petition the Department of Homeland Security for aid. The DHS responded by offering “cyber hygiene scans on Internet-facing systems as well as risk and vulnerability assessments.”
This is a good start, but hardly a long-term solution. Cyber-security for the future has to go beyond one-off scans and retrospective assessments. The answer has to involve intelligently monitoring and analyzing millions of devices — from voting machines to vulnerable IoT devices — in order to mitigate risk from unknown threats. Whether it be a state-sponsored hack or tampering from a politically motivated insider, the integrity of our elections is at stake, and its security deserves the utmost attention.
To hear more of my thoughts on the modern threat landscape, sign up for my webinar on November 9.
6 emerging cyber-threats you didn’t see in the news
As an industry, the constant stream of cyber-attacks in the news can be overwhelming. It seems like every day we see front-page headlines announcing defaced websites or massive data breaches.
But what about the attacks that never make the news?
Here at Darktrace, our worldwide deployments find early-stage threats every day. While these developing threats never make the headlines, they often emerge in fascinating and unexpected ways.
Here’s a selection of what we’ve found for our customers:
- An attacker hacked into a biometric fingerprint scanner used for physical access at a major manufacturing company.
This company used network-connected fingerprint scanners, allowing the attacker to use Telnet connections and default credentials to gain access. There were strong indiciators that the attacker was able to use the device to breach other servers.
- A cyber-criminal gained access to a video conferencing system of a multi-national corporation.
Using a backdoor Trojan Horse, the attacker used six external computers to collect data from the camera, presumably in an attempt to steal video from confidential meetings.
- A new strain of malware forced the computers of a security company to visit explicit websites.
Using random, algorithmically-generated websites, the attackers tried to plant incriminating evidence on the network by generating illegal web activity.
- A threat-actor hacked a ‘Lost and Found’ computer at a major European airport.
To gain entry, the attacker used DNS servers, an essential capability for internet communication though rarely used for information transfer.
- A hacker tried to compromise an industrial power network using default codes.
After penetrating the SCADA energy network, the attacker tried to establish a remote control link by using access codes listed as factory defaults online.
- A phishing email launched a ransomware attack on a non-profit charity.
Using a fake email, the attacker claimed to have an invoice from a legitimate supplier. The attached pdf contacted a server in Ukraine and downloaded malware attempting to encrypt the non-profit’s network.
Our ‘immune system’ technology caught each attack at an extremely early stage, giving us a rare look at how modern threats are able to bypass legacy systems. Traditional security solutions can only detect attacks with pre-determined signatures. But in each case, threat-actors used signature-less attacks to blend into the noise of the network.
By harnessing the power of unsupervised machine learning, the Enterprise Immune System learned ‘normal’ for each of these networks, and detected the threats as anomalous behavior. Our threat analysts then determined the nature of the attack and counseled the organization to take appropriate action.
If you’re interested in learning the full story behind these emerging cyber-threats, check out our full Global Threat Case Studies report.
We look forward to sharing more of our industry insights with you in the future.