Virtualization Technology News and Information
Article
RSS
Bugcrowd 2023 Predictions: The Rising Threat from Chaotic, Asymmetric Cyberattacks

vmblog-predictions-2023 

Industry executives and experts share their predictions for 2023.  Read them in this 15th annual VMblog.com series exclusive.

The Rising Threat from Chaotic, Asymmetric Cyberattacks

By Casey Ellis, Founder and CTO of Bugcrowd

Cybercriminals are motivated by money, while nation-states are motivated by national interests. So, while neither of these adversaries play by the rules, both of their actions are somewhat predictable. The most dangerous aspect, in my opinion, is that most security organizations have spent the last five-plus years developing symmetric defensive strategies based on such threat actors with reasonably well-defined goals. However, when a chaotic threat actor is introduced into the mix, the game tilts and becomes asymmetric. 

For example, consider the attacks we saw earlier this year by the extortion group Lapsus$, which were focused on opportunistic data thefts and subsequent threats to publicly release the stolen data. My main concern about Lapsus$ and other similar actors is that defenders haven't really been preparing for this type of threat for quite some time. Lapsus$ relies heavily on social engineering to gain an initial foothold, so assessing your organization's readiness for social engineering threats, both on the human training and technical control levels, is a prudent precaution to take here.

While the stated goals of Lapsus$ and Anonymous/Antisec/Lulzsec are very different, I believe they will behave similarly as threat actors in the future. The evolution of Anonymous in the early 2010s saw various sub-groups and actors rise to prominence, then fade away, to be replaced by others who replicated and doubled down on successful techniques. Perhaps Lapsus$ has vanished completely and forever, but as a defender, I wouldn't rely on this as my primary defensive strategy against this type of chaotic threat.

Returning the Focus to Essential Security Controls

The recent case of the Senate whistleblower Peiter Zatko - Twitter's former head of security, better known as Mudge - produced some uncomfortable allegations about security failures and coverups. Yet the cybersecurity challenges that Mudge pointed out are not uncommon outside of Twitter, although they may vary to the degree by which they exist within different organizations. 

To me, there are two opportunities for lessons learned here: The first is for security leaders and teams to step back for a moment and consider how they are going about prioritizing, managing, and burning down the basics. There are no shortages of "shiny objects" in cybersecurity, and it can be easy to get caught focusing on esoteric controls and threats when the simpler (and for an attacker, just as effective if not more effective) issues go unaddressed. The second takeaway would be to table-top the scenario from Twitter's point of view. Regardless of the validity of the reason for whistleblowing, it is a useful exercise to consider the cybersecurity impact, as well as the impact on trust and brand, if your own security deficiencies as an organization were suddenly to become an issue of public record.

Election Security Will Be Top of Mind 

From this year's mid-term elections through 2024, election security will be a top of mind. Several states are testing out the idea of risk-limiting audits and have passed legislation moving them toward hand-marked paper ballots.

At least six states rely on modems to transmit unofficial results, which introduces more hacking risk, Politico recently reported. Michigan says it's phasing them out entirely and the "vast majority" no longer use them, as the Detroit Free Press put it, citing the secretary of state's office.

We should see additional adoption of VDP and crowdsourced testing by states and voting machine manufacturers, as misinformation continues to be the most pressing real risk.

##

ABOUT THE AUTHOR

Casey-Ellis 

Casey is the Founder, Chairman, and CTO of Bugcrowd. He is an 18-year veteran of information security, servicing clients ranging from startups to multinational corporations as a pentester, security and risk consultant and solutions architect, then most recently as a career entrepreneur. Casey pioneered the Crowdsourced Security as a Service model launching the first bug bounty programs on the Bugcrowd platform in 2012, and co-founded the disclose.io vulnerability disclosure standardization project in 2016.

A proud ex-pat of Sydney Australia, Casey lives with his wife and two kids in the San Francisco Bay Area. He is happy as long as he’s passionately pursuing potential.

Published Wednesday, December 28, 2022 7:30 AM by David Marshall
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
Calendar
<December 2022>
SuMoTuWeThFrSa
27282930123
45678910
11121314151617
18192021222324
25262728293031
1234567