Top Nine cyber security trends for 2012? They are too few, isn’t it?

In this article I intend to read with you an interesting document, distributed by Imperva, in which they emphasized, the main threats that could cause significant problems in the coming year.

Please carefully read the entire article, first we discuss the nine threats that worry Imperva, then I will introduce the most dangerous threats from my point of view.

Do not spend days where you do not hear of cyber threats, risks and possible defense strategies implemented. Governments but also private companies, begin to seriously consider this type of threat allocating large amounts of money to ensure an adequate level of protection. But what are the main targets of these threats … there is for everyone, from critical infrastructure to private companies, no one can be considered safe and the direct and indirect impact on society is considerable.

 

What I want to do with your help is to analyze the published list,  completing it and identifying what are the threats that are of particular concern.

  • Trend #9:  SSL Gets Hit in the Crossfire
  • Trend #8:  HTML 5 Goes Live
  • Trend #7:  DDoS Moves Up the Stack
  • Trend #6:  Internal Collaboration Meets Its Evil Twin
  • Trend #5:  NoSQL = No Security?
  • Trend #4: The Kimono Comes Off of Consumerized IT
  • Trend #3:  Anti-Social Media
  • Trend #2:  The Rise of the Middle Man
  • Trend #1: Security (Finally) Trumps Compliance

Lets go to analyze in detail each point:

Trend #9:  SSL gets hit in the crossfire – Attackers are exploiting vulnerabilities in the various implementations of the SSL protocol. It is possible that during the next year we will see a rise in attacks which target the worldwide infrastructures that supports SSL. Impervia expects that these attacks will reach a tipping point in 2012. According their forecast it will be the year of the “break point” inducing serious discussion about real alternatives for secure web communications. My point of you is quite different. From my prospective SSL is a fine session encryption protocol that is being inappropriate to protect security for Internet based transaction systems because it was not designed for this purpose and it is dated. Several critics can be addressed to the model, for example the incredible number of Certification Authority and their way to protect their “trust chain”. Comodo case is the worst case we have observed during last year. Which could be valid alternatives … well, the “Convergence” model launched by Marlinspike is a good one , a secure replacement for the certificate authority system with excellent performances.

Trend #8: HTML 5 goes live –

The main problem is that HTML5 is not scheduled for official approval by the World Wide Web Consortium (W3C) until 2014. Developers, meanwhile, want to run the latest technology now. So they will either use proprietary plug-ins such as Flash or protocols considering them a standard.

During last few years, vulnerabilities in browsers’ add-ons (third party components such as adobe’s Flash Player or Oracle’s Java) were the significant cause of “zero-day” exploits.  Consider that the HTML 5 standard was created to enable browsers to support a richer end user experience in a standardized way. While the new features are attractive to web developers, they are also very beneficial for hackers. I totally agree on this point the events occurred during the last couple of months of 2011 are demonstrating it.

Trend #7: DDoS moves up the stack – For many reasons this will be one of the main threats of the new year. The year 2011 was a terrible year regarding the number of attacks perpetrated suing this technique. Attacks of this type are widely used for expression of dissent and hacktivism … and dissent is unfortunately destined to grow. I’m concerned about the conjunction DDOS with other dangerous attacks like spear phishing , because similar techniques used in the same time could create very powerful offensive action.

Trend #6: Internal collaboration meets its evil twin I disagree and do not perceive the criticality as proposed.

Trend #5: NoSQL = No Security? – I share the concern. I believe that inadequate security mechanisms of distributed  data sources will create several problems like it is happened during the current year.

Trend #4: The kimono comes off of consumerized IT –

Frankly I have not understood the magnitude of the threat and materialize in the coming year. What would make this threat so terrifying the next year? Frankly I did not understand …and you?

Trend #3:  Anti-social media  As many more organizations are making their way into the social media space, we expect to see a growing impact to the integrity and confidentiality of the enterprise’s information. Moreover, we expect hackers will continue to automate social media attacks, exacerbating the problem.

The openness to new forms of communication brings undoubted benefits but surely increases the attack surface of each company. The exhibition is expected to increase considerably in 2012 … it is hoped that together increase the security mechanisms needed to countless threats related to such exposure.

Trend #2: The Rise of the middle man – I share the prediction on the rise of the cyber broker. This individual matches the buyers of stolen data or compromised machines (aka “bots”) with the sellers of the data (or bot renters).  In the same way stocks and investors gave rise to stock markets, hackers need a middleman. That is an interesting scenario!

Trend #1: Security trumps compliance – In the past, security decisions were usually driven by compliance.  However, in 2012 we expect to see security decisions driven by security. Considering that the cost of a breach rising, industrialized hacking impacting many organizations and the need to protect of intellectual property, this means that we will probably see more companies making cyber security decisions based on security.

Despite I consider really interesting the Imperva experts’ analysis I believe it is an incomplete list of some of the threats which I consider among the most worrisome.
Which one? Following my supplementary list:

My Supplementary Trend: #1The spread of the cloud paradigm will bring with it a series of problems far from negligible.The cloud platforms today are daughters of an aggressive marketing and immature security modelsWhat if cloud platforms were used as a strike force against a predetermined targetIt would be a catastrophean offensive before which any system would be helpless.

My Supplementary Trend: #2 – Socialmedia diffusion will be really high. It was becoming a weapon and a battlefield. Governments and private companies have understood the critical of new media platform like social network. Through social network you can collect information, you can perform complex data mining researches, but you can also spread malware and influence common sentiment and event perception … that is a really a big threat.

My Supplementary Trend: #3 – Improved Social Engineering Attacks. Attackers will increasingly make use of social-engineering tactics to bypass technological security controls, fine-tuning their techniques to exploit natural human predispositions. We’ve already seen such approaches succeed at influencing victims into clicking on questionable links, opening exploit-laden attachments, and installing malicious software. 

My Supplementary Trend: #4 –  Large diffusion of  Custom Malware developed to attack specific target, Stuxnet Virus and Duqu malware are a good examples. Which will be their evolutions?

My Supplementary Trend: #5 –  2012 will be the year of the IPv6 consolidation? Well consider that its implementation has today to much obscure issues.

My Supplementary Trend: #6 –  Sensible grow for firmware and hardware hack.

My Supplementary Trend: #7 –  Mobile Security Issue. Increasingly sophisticated mobile devices and for which there is  low perception of threats that can compromise the integrity and security.

Some examples are Ransomware ” (an infection that holds a device “hostage” until a “ransom” payment is delivered) to Take Mobile Devices Hostage and worming into Android platform that are able to quickly propagate from one device to another.

As you can see the threats listed by me and not on the initial list Imperva is far from negligible, in fact likely to become soon the nightmares of those responsible for security in the coming months.
Are you agree?

Pierluigi Paganini

References

http://www.imperva.com/docs/HI_Security_Trends_2012.pdf

http://www.sans.edu/research/security-laboratory/article/security-predict2011

http://www.reuters.com/article/2011/12/06/idUS96123+06-Dec-2011+HUG20111206

http://blogs.wsj.com/tech-europe/2011/07/28/html5-poses-threat-to-flash-and-the-app-store/

http://www.gartner.com/technology/research/predicts/

 

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

North Korea-linked APT groups target South Korean defense contractors

The National Police Agency in South Korea warns that North Korea-linked threat actors are targeting…

10 hours ago

U.S. Gov imposed Visa restrictions on 13 individuals linked to commercial spyware activity

The U.S. Department of State imposed visa restrictions on 13 individuals allegedly linked to the…

22 hours ago

A cyber attack paralyzed operations at Synlab Italia

A cyber attack has been disrupting operations at Synlab Italia, a leading provider of medical…

23 hours ago

Russia-linked APT28 used post-compromise tool GooseEgg to exploit CVE-2022-38028 Windows flaw

Russia-linked APT28 group used a previously unknown tool, dubbed GooseEgg, to exploit Windows Print Spooler…

1 day ago

Hackers threaten to leak a copy of the World-Check database used to assess potential risks associated with entities

A financially motivated group named GhostR claims the theft of a sensitive database from World-Check…

2 days ago

Windows DOS-to-NT flaws exploited to achieve unprivileged rootkit-like capabilities

Researcher demonstrated how to exploit vulnerabilities in the Windows DOS-to-NT path conversion process to achieve…

2 days ago

This website uses cookies.