Americas

  • United States

Asia

Oceania

Contributor

Top 5 cybersecurity concerns for 2018

Opinion
Dec 11, 20175 mins
CybercrimeData and Information SecurityHacking

These predictions are just a handful of the many threats we'll see. Our solutions need to evolve with the threats and provide multiple layers of protection

data breach predictions
Credit: Thinkstock

The year 2017 saw some of the biggest cyberthreats in recent history, with millions of consumers and thousands of businesses affected by everything from the WannaCry attack to the Equifax and Uber data breaches. Gartner reports that worldwide, information security spending will reach $86.4 billion by the end of 2017 and the 2017 Cybercrime Report anticipates cybercrime damages to cost the world $6 trillion annually by 2021.

So, how can businesses protect themselves from falling victim to next year’s most anticipated security attacks? I’ve compiled a list of five predictions highlighting new and evolving threats to watch out for and protect against in 2018.

1. The cryptojacking “gold rush” will be the top priority for cybercriminals

Cryptojacking activity began exploding toward the end of 2017 and we suspect that we will see far more activity in 2018, particularly as the value of cryptocurrencies escalates. What makes this kind of activity interesting is how it has created a blurry line between the everyday Internet user and the cybercriminal. An individual mining cryptocurrency could very well be mining for their own wallet, based on visitors to their own web properties. There is also a very likely chance within those circumstances that disclosed cryptojacking activity could replace advertising on sites to become an entirely new revenue stream. However, the largest portion of cryptojacking is likely to occur from legitimate websites compromised to mine currency for the criminal wallet. Regardless, cryptojacking will be one of the cybercrime activities to watch in 2018.

2. We will see an increase in PowerShell-based attacks

Earlier this year, entities of the Saudi Arabian government were compromised using a macro in Microsoft Word to infect the target’s computer with an information-stealing Trojan. Rather than retrieving a binary payload, the attack relied on malicious scripts to maintain persistence on the device and to communicate with compromised websites acting as proxies for the command and control server. These malicious script-based attacks, specifically PowerShell-based attacks, are incredibly difficult to identify. They can easily evade antivirus engines, making it that much more appealing to cybercriminals. I predict many more PowerShell attacks in the year to come.

[ Related: How to protect your network from PowerShell exploits ]

3. The cybercriminal underground will continue to evolve and grow

While it may seem like we are already overwhelmed by the amount of cyberattacks occurring daily, this will not slow down in 2018. In fact, with a recent increase in cybercriminal tools and a lower threshold of knowledge required to carry out attacks, the pool of cybercriminals will only increase. This growth is a likely response to news media and pop culture publicizing the profitability and success that cybercrime has become. Ransomware alone was a $1 billion industry last year. Joining the world of cybercrime is no longer taboo, as the stigma of these activities diminishes in parts of the world. To many, it’s simply a “good” business decision. At the same time, those already established as “top-players” in cybercrime will increase their aggressive defense of their criminal territories, areas of operations and revenue streams. We may actually begin to see multinational cybercrime businesses undertake merger and acquisition strategies and real-world violence to further secure and grow their revenue pipeline.

4. Security software will have a target on its back

In 2018, cybercriminals will target and exploit more security software. By targeting trusted programs and the software and hardware supply chain, attackers can control devices and wholeheartedly manipulate users. Hackers will leverage and exploit security products, either directly subverting the agent on the endpoint, or intercepting and redirecting cloud traffic to achieve their means. As these events become more publicly known, the public and business perception of security software, particularly that of antivirus solutions, will further deteriorate.

5. More cyber criminals will use worms to launch malware

In 2017, we saw WannaCry and Trickbot use worm functionality to spread malware. More malware families will use this technique in 2018 because network compromise from worms spread faster than many other methods. If hackers can figure out how to use worms without being too noisy (a traditional downfall of this approach), this tactic can amass a large number of victims very quickly.

These predictions are just a handful of the many threats projected to hit 2018. Every year, we see both the caliber and sophistication of breaches reach new heights with respect to loss and damages. At the same time, we are all becoming too comfortably numb with the daily breach headlines. We can’t cross our fingers and hope that our own company or PII (personal identifiable information) isn’t next on the news cycle.

What we can do is enhance awareness, education and training of our employees and IT staff. Our employees are on the front lines of this cybercrime battle and one avoided click can save hours of down time for IT. At the same time, our solutions need to evolve with the threats and provide multiple layers of protection. With the new year, we have a fresh start and a new security page to write for 2018.

Contributor

Justin Dolly is EVP, Chief Security Officer and CIO of Malwarebytes. Prior to Malwarebytes, Dolly was the VP, Chief Security and Privacy Officer at Jawbone, where he oversaw the security and privacy implications of consumer wearable technology. He also held the Vice President and Chief Information Security Officer position at ServiceNow, where he provided strategy and vision for all information security-related initiatives.

Before that, Dolly was the CISO at VMware Inc., where he developed and led all information security-related programs and initiatives. Previously, Dolly held various security and technology leadership roles at Kaiser Permanente, CNET/CBS Interactive and Macromedia.

The opinions expressed in this blog are those of Justin Dolly and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.