Top Cyber Risks Businesses Should Prepare for in 2018
This year's top six cyber risks for businesses, according to The Chertoff Group principal Adam Isles, include: increase in destructive attacks targeting…
January 05, 2018 at 12:45 PM
6 minute read
The original version of this story was published on Law.com
This year's top six cyber risks for businesses, according to The Chertoff Group principal Adam Isles, include: increase in destructive attacks targeting industrial control systems, expansion of IoT as a threat vector, evolution in nation-state activity tradecraft, advances in identity subversion as a tactic, increased use of software subversion to bypass security controls and increase in third-party risk.
Every five years, the U.S. intelligence community releases a Global Trends Report, and the one released in January 2017 cited destruction of important civilian infrastructure as an increasingly likely form of emerging warfare. The rise in attacks targeting industrial control systems (ICS) can be attributed to factors including the relative ease at brute forcing default or weak passwords on ICS equipment, an increase of the number of ICS accessible to the public and an uptick in motivation by malicious actors to control ICS for political influence or monetary gain.
“Threat is a function of motivation, capability and opportunity,” said Isles. “2018 is expected to bring additional advances particularly regarding autonomous/artificial intelligence-enabled systems and their use in both private and professional settings. As this trend advances, so too does the opportunity to exploit such devices for malicious purposes.”
In the last few years, many cyber-attacks were seen using IoT devices like CCTV cameras in large-scale DDoS attacks, including an October 2016 attack that disrupted Internet services throughout the U.S. for almost a full day. These attacks highlight large-scale challenges in ensuring that IoT devices are properly configured to prevent a compromise of those devices. Even if U.S. authorities were to introduce legislation for producers to lock down IoT vulnerabilities, the threat from exposed devices from other countries does not diminish, per Isles.
“Where malicious activity can be attributed to state actors, U.S. authorities have worked with allied governments to take responsive action–for example, sanctions and criminal indictments plus related cooperation through extradition and mutual legal assistance treaties,” he explained. “So, the ability to act without the attendant consequences of attribution will be of increasing utility to threat actors. In that vein, state actors are increasingly relying on capabilities–people and technology–with roots in organized crime.”
Per the 2017 indictment of individuals allegedly involved in the Yahoo breach, including officers of Russia's Federal Security Bureau (FSB): “One of the criminal hackers has been the subject of an Interpol 'Red Notice' and was listed as one of the FBI's 'Most Wanted' hackers since 2012. He resides in Russia, within the FSB' s jurisdiction to arrest and prosecute. Rather than arrest him, however, the FSB officers used him.”
In addition, while state actors have access to zero-day exploits, the state of unremediated vulnerabilities makes it more likely they will use recycled malware and hacking tactics to minimize chances of attribution. The security vulnerabilities of passwords are well-covered in security literature, and we are now seeing significant consequences of compromised passwords via “credential stuffing” attacks, which involve automated machine-gun style access attempts via compromised username/password pairs. So, according to Isles, understanding these risks, organizations are increasingly shifting to the use of multi-factor authentication to reduce risks around single-factor approaches.
“We should expect to see increased reporting across three trends: newly discovered vulnerabilities in multi-factor approaches based on increased focus by security researchers, exploitation of unremediated vulnerabilities by malicious actors and resort[ing] to social engineering to subvert the identity-proofing process that underlies multifactor authentication,” he said.
There is a flaw in the technology underlying token-based authentication systems–they use public-key-infrastructure (PKI) to maintain confidentiality of the supporting keys. This flaw, discovered in the chip underlying the tokens in question, effectively means that it takes much less time than previously thought for a malicious actor to reverse engineer the private key from its public counterpart, per Isles. The consequence is that attacks are more feasible against systems protected by those tokens. In this case, the security researchers who identified the vulnerability worked with the impacted token providers, who themselves aided customers in remediating the vulnerability.
“Likewise, there is an increase in threat reporting around the compromise of text messages that provide one-time passcodes as a second factor,” he said. “In turn, there is also an increase in reporting around social engineering schemes that trick customer support centers into updating the mobile phones associated with an account from the legitimate account holders to that of a malicious actor.”
As seen during the 2017 NotPetya and other incidents, adversaries are using third-party software as an entry vector to deploy malware on targeted systems. Security controls were bypassed through the subversion of trusted third party software, so malicious actors could infiltrate at the source of a supply chain, compromise the third-party software in question, and leverage this compromise to inject malware into victim computer systems, which then spread laterally through those systems. Maersk ported an impact of over $300 million, as did pharmaceutical provider Merck.
“In 2018, we expect to see a greater emphasis on review and securing all phases of the software development lifecycle, not only testing before release but also during the planning, development and update phases as well,” Isles explained.
Allowing partner organizations access to sensitive data, systems can help a company focus on what it does best rather than the extraneous support functions. But the risks from the trend have multiplied as organizations have increasingly offloaded specialized services to others, in particular, cloud service providers. Uber CEO Dara Khosrowshahi said that “external attackers inappropriately accessed user data stored on a third-party cloud-based service that we use to gain unauthorized access to this information. While this compromise did not breach our corporate systems or infrastructure, it did result in the compromise of personal information for 57 million Uber customers around the world.”
Isles added, “Even cloud services that have strong security built-in can entail vulnerabilities if customers do not properly configure and maintain them. Thus, we expect more focus in 2018 on services that can help customers spot misconfigurations and risky levels of access on cloud services.”
Amanda G. Ciccatelli is a Freelance Journalist for Corporate Counsel and InsideCounsel, where she covers intellectual property, legal technology, patent litigation, cybersecurity, innovation, and more.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllMarriott's $52M Data Breach Settlement Points to Emerging Trend
2024 Ransomware Payments Poised to Shatter Record, as Gangs Target 'Big Game'
2 minute readCleared in HP Fraud Trial, British Tech Tycoon Mike Lynch Now Missing at Sea
Trending Stories
- 1'Ridiculously Busy': Several Law Firms Position Themselves as Go-To Experts on Trump’s Executive Orders
- 2States Reach New $7.4B Opioid Deal With Purdue After SCOTUS Ruling
- 3$975,000 Settlement Reached After Fall on Sidewalk
- 4'Where Were the Lawyers?' Judge Blocks Trump's Birthright Citizenship Order
- 5Big Law Sidelined as Asian IPOs in New York Are Dominated by Small Cap Listings
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250