Cybersecurity

Report: Threat actors weaponizing hyper-connectivity with new strategies

BlackBerry Limited recently released its annual 2020 Threat Report, which examines the latest adversarial techniques and tactics analyzed by BlackBerry Cylance threat researchers, and provides guidance organizations can leverage to mitigate risk. Key findings include the continued evolution of nation-state backed threat actor groups, the increased availability of sophisticated attack toolsets, as well as analysis on which targets are becoming more appealing to attackers and why.

The report also details more select threats focused on targets like embedded technologies in connected vehicles, manufacturing, and mobile devices, and those taking advantage of misconfigurations in cloud computing deployments.

“New techniques to obscure malicious payloads and distribute attacks across multiple organizations paid off for threat actors in 2019,” said Eric Cornelius, chief technology officer at BlackBerry Cylance.

“With the increasing ease of access to attack toolkits combined with the explosion of endpoints connected to organizations’ networks, the global threat landscape for emerging threats will only continue to escalate in 2020.”

Have you read “How The IoT Is Changing Mass Manufacturing”?

Automotive, retail

The search to find and exploit vulnerabilities in the expanding attack surface has caused a shift in the industries most often targeted by malicious actors, particularly toward the automotive sector. For example, BlackBerry Cylance researchers discovered new backdoors being deployed by APT group OceanLotus (APT 32) in a 2019 campaign targeting multinational automotive manufacturers. As more vehicles become connected – and the attention given to potential outcomes of cyberattacks on vehicles increases — attacks against this sector are anticipated to grow. As such, the industry must continue investing in cybersecurity processes and secure connected software to ensure public trust in the transportation technologies of the future.

Cylance researchers found that retail and wholesale remained the most targeted sectors, where almost a quarter (23%) of all retailers suffered a compromise of sensitive financial information. Three of the most prevalent threats of 2019 — Emotet, Ramnit, and Upatre — all focused on retail organizations. Coinmining operations also had a focus on retailers, with 47% of attacks impacting that sector.

The report also highlighted other unique threats facing a range of industry verticals including:

Technology/Software: Where attacks typically have a focus on stealing intellectual property, over a quarter (26%) were victims of ransomware specifically.

Service Providers: This industry’s customer base was leveraged by threat actors to increase malicious distributions using remote management tools like Go2Assist and NinjaRMM.

Healthcare: Healthcare organizations were more likely to pay ransoms than other industries due to the critical nature of the targeted data.

Government: Attacks against government entities can have cascading effects that not only impact critical national infrastructure, but impact individuals as well given the significant quantities of personally identifiable information they store.

“Threat intelligence on APT groups can help organizations understand who is attacking their enterprise, and the actor’s mode of operations and motives, in order to be more proactive in protecting vulnerable systems against advanced threats,” said Brian Robison, chief evangelist at BlackBerry Cylance. “In 2020, AI and machine learning will continue to prove critical for threat prevention and remediation strategies because of the advantage they offer through continuous learning and proactive threat modeling of attacks that continue to become more complex.”