Virtualization Technology News and Information
Article
RSS
Cloud Daddy 2019 Predictions: Retaliation, AI and Cloud Incursions

Industry executives and experts share their predictions for 2019.  Read them in this 11th annual VMblog.com series exclusive.

Contributed by Joe Merces, CEO, Cloud Daddy

Retaliation, AI and Cloud Incursions: The Top Three Security Trends Coming in 2019

This year has seen some extremely damaging consequences due to the increased frequency of ransomware and related viruses, as well as online fraud and other malicious incursions against IT infrastructure in both the public and private sector.

In many cases, these attacks might have been less damaging if better cyber hygiene had been implemented, or if employees knew more about what to do - and what not to do - to avoid the spread of  malicious code or other attacks.

As we look ahead to 2019, it's clear that while cyber hygiene is still essential, it is not sufficient to stem the rising tide of cyber security problems. Enterprises must be diligent in developing and maintaining data protection strategies, combining data backup and recovery plans with infrastructure management and advanced cyber security practices. Without these data protection strategies, we as an industry will not be able to stay ahead of the advancements that bad actors are making in their dirty work.

That said, here are the three most likely things that government and business should prepare for in the coming year.

Retaliatory hacking.

One of the main scenarios that is likely to emerge is a boost in hacking activities from China and other nation-states that have found themselves in the political spotlight.

China, for example, already number one in cyber crime and other nation-state hacking activities, will likely be motivated to do more in 2019. If the arrest and detainment of Huawei CFO Meng Wanzhou in Canada is any indication, China will definitely respond with all the tools at its disposal.

So far, China has responded to the arrest by incarcerating several Canadians in China, sentencing them to "administrative punishment." But these responses are likely to be compounded by cyber attacks on both Canada and the US.

It already appears that China is behind several recent high-profile hacks, such as the one perpetrated against the Marriott hotel chain. Unless the political fervor cools, it's likely that China will expand its chess game and come after both Canada and the US even harder, with attacks on their typical targets in the

financial, legal, healthcare, and hospitality industries.

And China is not the only likely source of retaliatory hacking. If economic sanctions are held in Iran, we will see bad actors in that country also responding with increased cyber attacks. In fact, the recent Shamoon based destructive malware attack already out in Europe and the Middle East, is confirmed to originate from Iran and literally wipes out infected computers by overwriting all of the data with garbage. Iranian cyberattacks are not only geared for making money, but also for optimum destruction. After all, the nefarious SamSam virus was created by two Iranian hackers.

To date, that virus has taken down several US state agency IT infrastructures as well as corporate systems. Let's hope that political tensions will cool before they escalate in the IT realm.

AI in hacking.

Another trend to watch is bad actors using machine learning and artificial intelligence to cripple organizations in both the public and private sectors.

In the most recent quarterly Fraud Index Report from DataVisor, findings based on hundreds of millions of user accounts showed that fraudsters are beginning to outsmart conventional approaches to machine learning.

Sophisticated fraud attacks are on the increase, and their scope is on average more than twice the size of less sophisticated attacks typical in social media. According to the DataVisor study, fraudsters are lying in wait for over a year after establishing bogus accounts, conducting only normal transactions on those accounts while they test how much they can get away with.

These more sophisticated attacks are starting to use cyber experts' own tools against them, by incorporating machine learning and artificial intelligence technology into their attack strategies.

It's extremely likely that bad actors will begin building variants of ransomware, to make such viruses more intelligent and less susceptible to detection. Both China and North Korea will be increasingly involved in this type of malicious activity. North Korea has had considerable success in developing artificial intelligence, and may soon end up taking the lead on money extorted from victims of ransomware attacks. We may even see collaboration among bad actors to broaden the reach and potential damage from cyber attacks.

Good cyber hygiene and best practices need to be implemented in both the public and private sectors to defend against such attacks before AI makes it even harder to stop. Unfortunately, many people are not particularly well educated in what to do and what not to do to recognize possible hacking efforts. Without private and public sector initiatives to educate users in addition to improvements in overall cyber hygiene, as a result, we may see these smarter hacking activities result in crippling consequences in both business and government.

Cloud infrastructure hacking on the rise.

In the coming year, we will almost certainly hear of increased hacking efforts leveled against cloud providers. As we migrate to the cloud, we are relying on these companies for infrastructure security.

Bad actors are going to begin looking to damage the major public cloud providers directly, in addition to infiltrating enterprises. That raises some very troubling questions. Can hackers possibly have the wherewithal to take down an availability zone? Could hackers have the sophistication to possibly take down an entire region or data center? That can happen through denial of service attacks and other technologies.

The back door to hacking of cloud service providers could likely come in the form of businesses not paying enough attention to the "Shared Responsibility" requirements outlined by CSPs like Amazon Web Services and Microsoft Azure. Those requirements make it clear that CSPs are responsible for security OF the cloud, and clients are responsible for security IN the cloud.

Unfortunately, while cloud users are still responsible for protecting whatever they put into the cloud, it's not happening consistently. We could see infections that take hold in an enterprise, and since that enterprise is connected to cloud services, the infection spreading to the CSP. If the sophistication of malware increases we could begin to see it move cross platform. Once it's in there, you can be sure that the bad guys will begin digging for more back doors and other vulnerabilities they can exploit.

Time will tell how damaging these trends may be to the networking world, but one thing is for certain: Organizations need to get a better handle on their data protection strategies if they hope to come out unscathed at the end of the year.

##

About the Author

 

Joe is a talented and seasoned executive with over 30 years of extensive experience in cloud services, information technology, cybersecurity, and data communications with a diverse background in both private / corporate as well as public sector settings.

With more than 30 years of experience in the areas of Development, Engineering, Marketing, Product Management and Network Operations, Mr. Merces brings a great depth of experience drawn from his many years in the Information Technology, Telecommunications and Manufacturing industries.

Joe holds 3 patents in data communications, is a graduate of Stevens Institute of Technology, where he received a Master of Science degree in the Management of Technology and has a Bachelor of Science degree in Computer Science from Kean University.

Published Wednesday, January 09, 2019 10:01 AM by David Marshall
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
top25
Calendar
<January 2019>
SuMoTuWeThFrSa
303112345
6789101112
13141516171819
20212223242526
272829303112
3456789