By Diana-Lynn Contesti, CISSP-ISSAP, ISSMP, CSSLP, SSCP
John Martin, CISSP-ISSAP, CISM
Richard Nealon, CISSP-ISSMP, SSCP, SCF
In part one of this blog series, we discussed privacy, remote access (aka Work from Home), insider threats, data leakage, Zero Trust Architecture (ZTA) and security architecture. To continue this discussion, we believe that 2021 will still see folks working from home; thus, the risks due to insider threats and data leakage will continue to grow. However, we believe that there are other concerns for information security professionals, including edge computing, 5G, IoMT/IoT, AI and ransomware.
Edge Computing is a distributed computing framework that brings enterprise applications closer to data sources such as IoT devices or local edge servers. This proximity to data at its source can deliver strong business benefits, including faster insights, improved response times and better bandwidth availability. Gartner estimates that by 2025, 75% of data will be processed outside the traditional data center or even cloud platforms. Sending all that device-generated data to a centralized data center or to the cloud causes bandwidth and latency issues. Edge computing offers a more efficient alternative. Data is processed and analysed closer to the point where it is created. Because data does not transverse over a network to a cloud or data center to be processed, latency is significantly reduced.
Some of the issues to be faced are likely to be machine to machine communication, as well as person to machine communication. Can we trust the authentication capabilities from a machine to another machine to actually exchange information securely? This means Zero Trust Security and architecture needs to be put in place.
As 2020 draws to a close and 2021 looms in, we believe that 5G will play an integral role in security with it being everywhere and always connected.
The business case for 5G:
There are a small number of industries that will greatly benefit from the wider bandwidth and capacity to support a large number of IoT devices with greater reliability.
However, in our opinion the primary motivation to move networks to 5G is being driven by the network providers in their effort to recoup the major investment costs necessary to implement the technology. What this fundamentally means is that 5G is being sold to the general public as a must have by marketing machines, when in reality (with a small number of commercial exceptions) most of us just DON’T NEED IT and are serviced perfectly well by 3G and 4G, where these are generally available.
When we look at a global coverage map for 5G a couple of things really stand out:
Risks around 5G include:
Failures are likely to be due to underinvestment. If manufacturers treated IoT devices like endpoints, then real time endpoint detection and response agents could be installed on them. This would allow security staff to investigate attacks as incidents occur and respond by remotely taking action on the IoT devices, such as isolating them on the network, wiping them or reimaging them.
Foundational Cybersecurity Activities for IoT Device Manufacturers NISTIR 8259 May 2020 – https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8259.pdf
If you are interested in contributing to 5G cybersecurity, then go to the National Cybersecurity Center of Excellence (NCCoE) and sign up. Also have a close look at the building blocks, another mention of Zero Trust Architecture along with other elements.
The security of 5G is inextricably linked to IoT. There are some minor (security/operational) concerns about the technology itself (e.g., the expanded number of points-of-contact required, the operational ability to monitor them and keep them updated), but the major security concerns of 5G are really the major security concerns about the IoT devices attached to the network as endpoints (see below).
Internet of Things (IoT)
We have been discussing IoT for several years and we are now seeing standards being developed. According to various reports, 75% of all IoT projects fail due to the technical and business challenges these projects face. We anticipate that this trend will continue into 2021; however, we feel that there will be a shift to more successful projects as we are finally seeing standards for manufacturers to follow and implement. The security professional will still be faced with the challenge of choosing the best devices for their environment.
Many folks are still not familiar with all the terminology and technology associated with IoT. This is a quick reference:
We believe that 2021 will see the emergence of the Internet of Medical Things (IoMT). What is it? Simply put, it is a wireless communication network (medical devices and people) that allows the exchange of medical information. This implementation will allow medical staff to provide a better quality of service related to patient care. We anticipate that, along with IoT, we will see standardization of the protocols for these devices.
For purposes of this discussion, IoT is broken down into several subsections:
The growth in consumer IoT has provided (as a side product) the largest attack vector ever imagined by cyber criminals. The estimated number of IoT devices at the time of writing is somewhere between ten and twenty billion, and this is expected to double in the next four to five years  . The vast majority of these are consumer based (voice-controlled streaming, lighting, and heating sensors and controllers, doorbells and security cameras, smart TVs, etc.) devices with a low (i.e., $10 – $80 per unit) and medium ($300 – $1,000) retail cost.
This group poses a risk as we see an increase in these devices being brought into the workplace, whether it be work from home or the corporate office, and the loss of critical data can be realized.
We are seeing organizations (such as DigiCert) engaging with various manufacturers to install digital certificates on IoT devices while keeping the cost to the consumer low. However, we believe that some organizations/manufacturers will continue to avoid the issue of security or, if they address it, they will pass all costs on to the consumer. However, there are still outliers who will not comply with regulations or security safeguards, so it is still a buyer-beware marketplace.
Gone are the days when these systems were standalone bastions that could not be accessed via the Internet (some of us remember the old GPAC systems that worked like trojans and never needed to be patched; however, we believe this is an attack vector that has recently come into its own. The recent supply chain attack using technology such as SolarWinds highlights this.
For additional assistance, we found the GICSP – GIAC Global Industrial Security Professional certification, which used the DoD i140 (DoDD 8570 baseline information assurance. https://www.giac.org/certifications/dodd-8140
Internet of Medical Things (IoMT)
We believe that attacks on IoMT will become the emerging vector. To be beneficial, these devices must be instrumented – measuring, sensing and visualizing the exact condition of a patient even remotely; Interconnected, communicating and interacting with each other and intelligently responding to change, predicting and optimizing future events.
They are all interconnected and form a complete ecosystem between the electronic distributors, software and connectivity, homecare givers, health-related services, healthcare providers and those who pay for such services. This is an area which is underestimated. In light of COVID-19, and with lack of security intelligence, monitoring and incident response, this will become a major battle ground in 2021 and the future. This is another area where ransomware can encroach on health providers and directly access patients’ lives – hence the reason why many health providers simply pay up because lives are at stake. They are simply not prepared to be attacked and do not have the expected security hygiene.
Ransomware will continue to increase not only in the sheer numbers but also the types of organizations that are being targeted. We believe it will continue to be the fastest growing cybercrime in 2021 with a focus on manufacturing, targeting industrial control systems (ICS). Tied to the growing IoT marketplace, we foresee this attack vector increasing. In 2020, we saw an increase of 145% in the growth of these attacks and anticipate seeing an additional growth in this arena in 2021 of about 100-150%.
To understand the motivation for the growth in ransomware, it’s best to remember the quote (mistakenly attributed to Willie Sutton but allegedly made up by a reporter)
“So, Willie, why do you rob banks?
Because that’s where the money is!”
Ransomware, to its perpetrators, is a faceless attack that generally causes little impact on its victims. It’s perceived by them to be almost 100% successful; cheap and easy to carry out and carries almost 0% chance of prosecution and conviction (i.e., it’s the perfect way to get “free” money).
The average ransom demand has doubled over the years.
Ransomware families have started collaborating with each other for better efficiencies and greater opportunities.
Topical events, such as the COVID-19 pandemic, are being weaponized to craft malspam.
Ransomware operators are expected to refine their strategies that are already successful, instead of developing newer ones. Thus, in 2021, organizations should expect more targeted attacks, especially on large firms that have a lot to lose. Which means, your cybersecurity insurance premiums will be going up accordingly. The FBI and other government agencies have been asking organizations to not pay ransoms. However, companies have been seen negotiating and paying to get their data back. If payments are made and companies agree to pay double and triple the initial ransom demand, targeted ransomware attacks will continue even beyond 2021.
It will continue to run rampant. You can assist clients by emphasizing that the use of encryption for private data is crucial to your operations, or invest in a solid backup scheme. This will improve their cybersecurity posture and blunt the impact of a ransomware attack.
A good approach is to ensure you commence using Full Homomorphic Encryption (FHE), which has been years in development, but it is now available as a cloud service or as a development kit.
This of course is far from reality. The real cost of ransomware is endured by society (even when it’s targeted at large corporations, it’s passed on to their customers). As one insurance fraud ad says, “It’s like them putting their hand into your pocket and taking your money.” More worrisome is when ransomware is targeted at critical infrastructure. While the death of a German hospital patient  in September of last year cannot be directly attributed to ransomware, the fact remains that she had to be diverted more than 30km from her nearest hospital because it was undergoing a ransomware attack. Similarly, a wave of ransomware attacks hit U.S. hospitals in October of this year as COVID-19 cases spiked.
As ransomware attacks continue to be more and more profitable, the conclusion is that it will continue to grow as one of the “easiest/no risk” crimes for both small-time criminals and large organized gangs. In the Netherlands, for example, there has only been one successful prosecution in relation to ransomware. Two brothers, the authors of ‘CoinVault’ and ‘Bitcryptor’ ransomware were arrested, convicted, and sentenced in 2018 to 240 hours of community service. 
These compromises will continue to target medical systems, medical development, ICS systems and also financial systems. We do not believe that any industry will not be targeted.
The cost to industry will continue to grow and we recommend that security professionals ensure:
Artificial Intelligence/Augmented Intelligence (AI)
For this blog, we will be discussing Augmented Intelligence as we do not believe true Artificial Intelligence is available.
Note: The term Augmented Intelligence is used rather than Artificial Intelligence, as no one has successfully passed Alan Turing’s original test so far.
Augmented Intelligence is changing the game for cybersecurity, analyzing massive quantities of risk data to speed response time and augment under-resourced security operations.
How Augmented Intelligence helps: AI technologies like machine learning and natural language processing enable analysts to respond to threats with greater confidence and speed.
The key issue here is ethics and integrity. Assume that Augmented Intelligence (AI) is already within our living rooms and cars, and even our pockets. The issues are:
There is no universally accepted ethical system for AI. AI can be used for social good, but it also be used for other types of social impact in which one man’s good is another man’s evil. We must always remain aware of this.
Cybercriminals are leveraging artificial intelligence for malicious use, both as an attack vector and an attack surface, according to Europol, the United National Interregional Crime and Justice Research Institute (UNICR).
“We expect to see criminals exploiting AI in various ways in the future. It is highly likely that cybercriminals will turn to AI with the goal of enhancing the scope and scale of their attacks, evading detection, and abusing AI both as an attack vector and an attack surface.
We foresee that criminals will use AI to carry out malicious activities to victimize organisations via social engineering tactics. Using AI, cybercriminals can automate the first steps of an attack through content generation, improve business intelligence gathering, and speed up the detection rate at which both potential victims and business processes are compromised. This can lead to faster and more accurate defrauding of businesses through various attacks, including phishing and business email compromise (BEC) scams.
AI can also be abused to manipulate cryptocurrency trading practices. For example, we saw a discussion on a blackhatworld[.]com forum post that talks about AI-powered bots that can learn successful trading strategies from historic data to develop better predictions and trades.
Aside from these, AI could also be used to harm or inflict physical damage on individuals in the future. In fact, AI-powered facial recognition drones carrying a gram of explosive are currently being developed. These drones, which are designed to resemble small birds or insects to look inconspicuous, can be used for micro-targeted or single-person bombings and can be operated via cellular internet.
According to a recent article by Trend Micro ( https://www.trendmicro.com/en_us/research/20/k/the-dangers-of-ai-and-ml-in-the-hands-of-cybercriminals.html ), “AI and Machine Learning (ML) technologies have many positive use cases, including visual perception, speech recognition, language translations, pattern-extraction, and decision-making functions in different fields and industries. However, these technologies are also being abused for criminal and malicious purposes. This is why it remains urgent to gain an understanding of the capabilities, scenarios, and attack vectors that demonstrate how these technologies are being exploited. By working toward such an understanding, we can be better prepared to protect systems, devices, and the general public from advanced attacks and abuses. “
Well, it seems that this second blog was longer than expected and we have not touched on digital transformation, supply chain or MSSPs. Watch for our third blog on these topics. Seems that 2021 and 2022 may be years to watch for information security.
18 Most Popular IoT Devices in 2021 (Only Noteworthy IoT Products)
lord and taylor cc buy cc from dark web