Virtualization Technology News and Information
Article
RSS
CyberArk 2023 Predictions: The Identity Security threat landscape heats up

vmblog-predictions-2023 

Industry executives and experts share their predictions for 2023.  Read them in this 15th annual VMblog.com series exclusive.

The Identity Security threat landscape heats up

By Lavi Lazarovitz, Senior Director of Security Research at CyberArk

With 2022 behind us, this year's major cyber incidents have unveiled a glaring trend. From MFA fatigue to data exfiltration and elevated phishing schemes, Identity Security threats were the primary method of choice for this year's modern cyber criminals. The CyberArk Labs team had a front row seat to these attacks, observing the ways in which adversaries were increasingly leveraging identities-human and machine-to steal credentials and bypass access to some of today's most secure enterprises.

Reflecting on the threats and attacks we witnessed last year is critical as business leaders start making key business decisions for 2023. I have some thoughts about the new cybersecurity challenges that the next year will present, as well as how modern organizations can defend against elevated threats.

Forget New Year's diets - your cookies will be too irresistible

Attackers are getting more sophisticated in snagging session cookies - which establish access to these third-party applications - to bypass both primary authentication and MFA and hijack accounts. As organizations continue to adopt more SaaS applications and consolidate them on the browser, session cookies will become even more critical and more vulnerable. Additionally, with digital marketplaces specializing in stolen session cookies growing in popularity, threat actors will seek ways to further automate and scale these session hijacking attacks to boost profitability next year.

2023 will present a silver lining in the commoditized credential age

If I were to ever become a cyber criminal, 2023 is the year I would begin my career in cybercrime. Thanks to the commoditization of the credential, would-be attackers who lack skills can simply browse on a marketplace, fill their carts with cheap lists of stolen credentials and cookies or off-the-shelf ransomware, phishing and exploit kits and check out - no attack legwork required. In this environment, MFA and two-factor authentication won't be enough. Yet there will be a silver lining for security teams that take a defense in depth approach - one that could swing the pendulum in their favor. Rushing to get rich quick, many cybercriminals will make rookie mistakes or create far too much noise on the network, foiling their plans.

What's old will be new again as threat actors revisit familiar tricks

The next "big thing" isn't likely to be a massive zero day - especially as prices for vulnerabilities reach upwards of $10 million on darknets and other underground marketplaces. Most cyber criminals will use alternative ways to infiltrate organizations and move laterally toward their targets. And at the end of the day, why would they spend so much cash on a specialized exploit or time contriving new methods when old tricks like phishing, credential theft and social engineering, or one-day kernel-level or memory corruption exploits work just fine?

Geopolitical "Winter is Coming," along with increased attacks on critical infrastructure

As conflict in Ukraine continues (and other geopolitical tensions persist), criminal groups will ramp up financially motivated attacks and shift their gaze in decentralized infrastructure's direction. Meanwhile, as Eastern Europe enters the coldest parts of the year, we can expect attacks on critical infrastructure to increase as temperatures plummet, driving global energy prices up even higher.

As the attack surface continues to broaden and escalate as a result of geopolitical tensions, increased use of hybrid cloud environments, and the uptick in next-level attacks leveraged by modern cybercriminals, it becomes more critical to understand how the cyberspace will evolve next year-and how to best defend ourselves.

##

ABOUT THE AUTHOR

Lavi-Lazarovitz 

Lavi Lazarovitz, Senior Director of Security Research on CyberArk's Labs team, leads a team of security researchers who do, think, write, and code cybersecurity. He researches the methods and tactics employed by hackers to penetrate and exploit organizational networks and is responsible for devising effective detection and mitigation techniques to thwart cyberattacks. The labs team, under Lavi's direction, innovate security solutions and research offensive security. Before joining CyberArk, Lavi served 11 years as a pilot and intelligence officer in the Israeli Air Force and led a professional services team of web security engineers at Fireblade.

Published Thursday, January 26, 2023 7:30 AM by David Marshall
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
Calendar
<January 2023>
SuMoTuWeThFrSa
25262728293031
1234567
891011121314
15161718192021
22232425262728
2930311234