Page 47 - Cyber Defense eMagazine for September 2020
P. 47

• Enhanced versions of previously used malware and attack vectors

            Hackers have started to refurbish and use enhanced versions of previously used malware and attack
            vectors.

            One such example is the BlackEnergy malware in Ukraine. Recently, this malware has been upgraded
            (now known as BlackEnergy 3) and sold on the dark web. It now adds the SSH keys of the attacker to
            the  victim's  machine  in  a  list  of  authorized  key  files,  which  then  trusts  the  attacker's  key  to  secure
            communication.  Similarly,  CYFIRMA's  threat  intelligence  algorithm  caught  a  suspected  Vietnamese
            state-sponsored group, OceanLotus, exploiting old vulnerabilities and using existing malware to attack
            opinion leaders, influencers, banks, media houses, real estate agencies, and foreign companies across
            a number of countries , including China, Laos , Thailand, and Cambodia.



            • Emerging and Elastic Attack Surface

            New  technologies  such  as  5  G  Internet  of  Things  (  IoT),  autonomous  critical  infrastructure,  artificial
            intelligence, industry 4.0, cryptocurrency, cloud, virtual reality ( VR), augmented reality ( AR), drones and
            many more have also increased the attack surface.

            CYFIRMA 's  intelligence  research  has revealed new  attack  vectors  such  as  identity theft, fraudulent
            transactions,  asset  theft,  impersonation,  malicious  code  injection,  on-boarding  and  off-boarding  of
            accounts  and  fictitious  applications  that  cyber  criminals  could  use  to  attack  financial  institutions,
            cryptocurrency exchanges, trading platforms and retail organisations.



            • Cyber-criminals will engineer public opinion

            Cyber-criminals are actively involved in changing the social and economic configuration of society by
            influencing  public  opinion,  including  tampering  with  state  elections.  CYFIRMA's  threat  intelligence
            revealed the escalating interests of hackers towards national apparatuses such as government policy-
            making  agencies,  rating  agencies,  and  other  organizations  that  can  influence  decision-making.  The
            overall objective is to bring about social stratification and division.

            The fact that cyber warfare is not physical compared to traditional combat warfare does not mean that it
            can be less harmful. We have already seen evidence of monetary and physical disruption that could
            cause  businesses,  governments  and  civilians  alike,  such  as  the  Sony  Pictures  hack,  the  Ukrainian
            BlackEnergy  attack  on  SCADA  and  Stuxnet.  Government,  businesses,  and  civilians  all  need  to  be
            protected  from  cyber-war  chaos,  and  CYFIRMA's  DeCYFIR  provides  early  threat  detection  and
            containment.

            DeCYFIR  is  a  cloud-based  AI  (Artificial  Intelligence)  and  ML  (Machine  Learning)  platform  for  cyber
            security and threat intelligence.

            DeCYFIR consists of a number of key modules – Threat Visibility and Intelligence, Cyber Situational
            Analytics, Cyber Incident Analytics and Cyber Education.




            Cyber Defense eMagazine – September 2020 Edition                                                                                                                                                                                                         47
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   42   43   44   45   46   47   48   49   50   51   52