Cybersecurity

APT in 2020: More abuse of personal information

Kaspersky researchers have shared their vision on Advanced Persistent Threats (APTs) in 2020, pointing out how the landscape of targeted attacks will change in the coming months. The overall trend shows that threats will grow in sophistication and become more targeted, diversifying under the influence of external factors, such as development and propagation of machine learning, technologies for deepfakes development, or tensions around trade routes between Asia and Europe.

The predictions were developed based on the changes that the Global Research and Analysis Team witnessed over the year 2019 to support cybersecurity community with some guidelines and insights. The latter, along with a series of industry and technology threat predictions, will help to prepare for the challenges that lie in the coming 12 months.

“The future holds so many possibilities that there are likely to be things that are not included in our predictions. The extent and complexity of the environments in which attacks play out offer so many possibilities. In addition, no single threat research team has complete visibility of the operations of APT threat actors. We will continue to try and anticipate the activities of APT groups and understand the methods they employ while providing insights into their campaigns and the impact they have,” said Vicente Diaz, security researcher at Kaspersky.

Have you read “Korean-speaking APT groups prey on victims in SEA, Korea”?

The abuse of personal information: From deep fakes to DNA leaks

After a number of personal data leaks that happened in the past years, the number of personal details available made it easier for attackers to perform targeted attacks, based on victims’ leaked info. The bar has been raised, and in 2020 the threat actors will dive deeper, hunting for more sensitive leaks, such as biometric data.

The researchers pointed out a number of key technologies, which could lure victims of personal data abuse in the attackers’ traps, among them is publicly discussed video and audio Deep Fakes that can be automated and support profiling and creation of scams and social engineering schemes.

Other targeted threat predictions for 2020 include:

False flag attacks reach a whole new level. This will develop further, with threat actors seeking not only to avoid attribution but also to actively lay the blame on someone else. Commodity malware, scripts, publicly available security tools or administrator software, mixed with a couple of false flags, where security researchers are hungry for any small clue, might be enough to divert authorship to someone else.

Ransomware shifts toward targeted threats. A potential twist might be that, instead of making files unrecoverable, threat actors will threaten to publish data that they have stolen from the victim company.

New banking regulations in EU open new attack vectors. As banks will be required to open their infrastructure and data to third parties who wish to provide services to bank customers, it is likely that attackers will seek to abuse these new mechanisms with new fraudulent schemes.

More infrastructure attacks and attacks against non-PC targets. Determined threat actors have, for some time, been extending their toolsets beyond Windows, and even beyond PC systems, VPNFilter and Slingshot, for example, targeted networking hardware.

Cyber attacks focus on trade routes between Asia and Europe. There are several ways this could play out. They include a growth in political espionage as governments seek to secure their interests at home and abroad. It is likely to extend also to technological espionage in situations of potential or real economic crisis and resulting instability.

New interception capabilities and data exfiltration methods. The use of supply chains will continue to be one of the most difficult delivery methods to address. It is likely that attackers will continue to expand this method through manipulated software containers, for example, and abuse of packages and libraries.

Mobile APTs develop faster. There are no good reasons to think this will stop any time soon. However, due to the increased attention given to this subject by the security community, we believe the number of attacks being identified and analyzed in detail will also increase.

Personal information abuse grows, armed with AI. It is very similar to some of the techniques discussed for driving election advertisements through social media. This technology is already in use and it is just a matter of time before some attackers take advantage of it.

The predictions have been developed thanks to Kaspersky threat intelligence services from around the world.

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.