Vous êtes sur la page 1sur 8

FORTIGUARD 2018

THREAT PREDICTIONS

WHITE PAPER
WHITE PAPER: FORTIGUARD 2018 THREAT PREDICTIONS

Change is happening rapidly. It’s hard to believe that the new opportunities that this new digital society provides.
first smartphone was only introduced a little over a decade The proliferation of online devices accessing personal
ago, because universal connectivity is now literally affecting and financial information, and the growing connection
every aspect of our lives. The rising generation will never of everything – from armies of IoT devices and critical
know a time when the world around them wasn’t filled infrastructure in cars, homes, and offices, to the rise
with connected devices able to immediately solve their of smart cities – have also created new disruptive and
problems or meet their needs. destructive opportunities for cyber criminals and other
Individuals have a growing expectation for instant access threat actors.
to highly personalized information and services through a
THE GROWING THREAT LANDSCAPE
variety of interconnected devices. This demand is driving
the digital transformation of society. Businesses that want WAR OF THE AI
to succeed in this new digital marketplace need to create The cybercriminal marketplace has proven itself to be very
a culture of adaptability to stay ahead of demand from skilled at adopting the latest advances in such things as
both consumers and employees. Organizations still in the artificial intelligence in order to more effectively detect and
process of adopting virtualization and the cloud have had exploit vulnerabilities, evade detection, adapt to complex
to begin transforming their networks yet again with things network environments, and maximize profitability.
like machine learning and artificial intelligence in order
Supervised vs Unsupervised Learning
to accelerate their ability to see, predict, and respond to
market trends. Elon Musk has stated that whatever organization manages
to ‘master’ AI will have access to global control. That’s
And as with most technological and social change, there
not just hyperbole. Without proper controls in place, truly
is also a growing criminal element looking to exploit the
autonomous and self-learning artificial intelligence would

2
WHITE PAPER: FORTIGUARD 2018 THREAT PREDICTIONS

be able to move freely through our hyperconnected digital security fabric. Just as with AI, whoever can get the fabric-
world, adapt to new digital environments, and access based security system right, leveraging things like machine
virtually any digital resources. learning and AI, will have a highly aware and proactive
It sounds like something from a science fiction movie, but security defense system better able to keep pace with new
there are a growing number of experts who see real risks automated, self-learning AI-based attacks.
posed by AI, especially in a world where connectivity has Automation and Machine Learning
outpaced security, and they are calling for regulations
We’re not talking about future visions or something far
and controls.
down the road. Indeed, Black Hats are already leveraging
Part of the risk is related to the way that AI systems are automation and machine learning in their attack tactics,
able to learn. Highly supervised incubators can spend techniques, and procedures (TTP). We already see attacks
years carefully cultivating an artificial intelligence to perform with automated front ends mining for information and
specific tasks in a predictable way. These are usually then vulnerabilities, combined with AI-based analysis to correlate
integrated into a Centaur Model where humans work vast amounts of pilfered structured and unstructured data.
alongside automation and AI.
Of course, these sorts of strategies require massive
But even in a supervised environment, small errors amounts of computing power. Which is why cybercriminals
in learning models at the beginning can result in very are already using cloud services and public infrastructure
unexpected and even dangerous outcomes. A target to launch and manage attack campaigns. For example,
shooting comparison helps illustrate this point. If the barrel cybercriminals have been using stolen credit card
of a rifle being aimed at a target several hundred yards information to access cloud services for many years. Today,
away is off by even a fraction of a millimeter, the shot will most cybercriminal organizations use high performance
not only miss the bulls eye, but probably the entire target computing (HPC) for CPU-intensive attacks such as
itself. AI systems are orders of magnitude more complex, bit-coin mining or cloud password cracking. They also
and responsible researchers are willing to go slowly use distributed computing and processing modes to
because they are aiming for accuracy and predictability. autonomously discover and learn about weak spots in
Cybercriminals, however, are not so concerned. The security systems.
unsupervised learning models they are likely to use in We are now seeing the first attempts at automatically
developing AI-based attacks, where speed of development generating code in order to effectively strike at vulnerable
is more important than predictability, are especially targets using techniques such as fingerprinting and
dangerous and could potentially be devastating. In such blueprinting.
scenarios, things can go sideways quickly.
In addition, services like Shodan make it easier than ever
Over the past year, for example, we have seen for cybercriminals to detect potential targets. Shodan is a
cybercriminals repeatedly weaponize millions of unsecured specialized search engine that searches for meta data from
IoT devices and use them as a blunt instrument to take out service banners provided by online servers and devices.
systems and networks, such as with Mirai or more recently, It primarily collects data from web servers on ports 80,
with Reaper. As those devices become more sophisticated, 8080, 443, and 8443 (http/https), but it also searches port
and attack methodologies become more intelligent, there 21 (ftp), 22 (SSH), 23 (telnet), 161 (SNMP), 5060 (SIP),
is the real potential to create swarms of compromised and 554 (RTSP). It then catalogues all devices with a
IoT devices that would wreak indiscriminate havoc – think remote interface, including web-enabled servers, network
Africanized bees. devices, home security systems, webcams, traffic signals,
If the best and the brightest of the cybersecurity research video projectors, routers, home heating systems, and
community are calling for regulation, you can bet it’s even SCADA systems. Since many of these devices are
because they see that the cybercriminal community is set to accept default logins, once a device is located it is
looking seriously at building these things, and are likely to often a fairly simple process to then own and compromise
release them unsupervised into the wild. that device.

The best defense against such intelligent and automated


threats is an integrated, collaborative, and highly adaptive

3
WHITE PAPER: FORTIGUARD 2018 THREAT PREDICTIONS

of exploits based on the unique characteristics of that


detected weakness. It’s a natural evolution of tools that
already exists. Current polymorphic malware, which has
been around for decades, uses learning models to evade
security controls, and can produce more than a million
virus variations per day. But so far, this is just based on an
algorithm, and there is very little sophistication or control
over the output.

We are also seeing advanced services being offered on


darkweb marketplaces that leverage machine learning.
For example, a service known as FUD (fully undetected)
is now part of several Crime-as-a-Service offerings. This
service allows criminal developers to upload attack code
and malware to an analysis service for a fee, and then
receive a report as to whether security tools from different
vendors are able to detect it. This allows them to refine
their malware in order to strengthen the element of surprise
by circumventing security devices used by the targeted Next-gen “Morphic Malware,” however, will use entirely
company or government agency. new, customized attacks that will not simply be variations
based on a static algorithm, but will employ automation
In order to do this, these criminal service providers have
and machine learning to customize them to a unique target
begun creating their own computing clusters, similar to
while making them far harder to detect and mitigate.
those used by groups such as VirusTotal, leveraging their
own and hijacked compute resources that include security
tools from a variety of vendors in order to perform scanning
to test and refine malware. To shorten the development
cycle, it’s also now possible to leverage machine learning
in order to modify code on the fly based on how and
what has been detected in the lab in order to make these
cybercrime and penetration tools more effective and
undetectable.
Security vendors and researchers already use machine
learning to analyze a piece of code to determine if it is
good or bad, or whether or not it is malicious. Sandbox
BIG PREDICTION: THE RISE OF HIVENETS AND
tools, for example, bolstered with machine learning,
SWARMBOTS
allow us to quickly identify previously unseen threats and
dynamically create protections. There is no reason why this Over the past few years, we have seen the development of
same approach couldn’t be used in the other direction: predictive software using artificial intelligence techniques.
for mapping networks, finding attack targets, determining The latest advances in these sorts of tools use swarm
where those attack targets are weak, blueprinting a target technology to leverage massive databases of expert
to conduct virtual PEN testing, and then building and knowledge, comprised of billions of constantly updated
launching a custom attack. All done at the AI level and fully bits of data, to make accurate predictions. Such systems
automated. can be used to offer advice, make medical diagnoses,
or increase trading profitability on the stock exchange.
We are likely to begin seeing malware entirely written by
This sort of predictive analysis represents an entirely new
machines based on automated vulnerability detection
paradigm for how computing resources will be used to
and complex data analysis, followed by the development
transform our world.

4
WHITE PAPER: FORTIGUARD 2018 THREAT PREDICTIONS

Likewise, we predict that cybercriminals will begin to approach based on identifying potential attack vectors
replace traditional botnets with intelligent clusters of and engineering vulnerabilities out of a network. Simply
compromised devices built around swarm technology building in things like redundancy, automated backups,
to create more effective attacks. If you think about it, and distributed network segmentation can go a long way
traditional botnets are mindless slaves – they wait for towards effectively mitigating the impact of such attacks.
commands from the bot herder (master) in order to execute The next step is to replace existing security tools with an
an attack. But what if these nodes were able to make adaptive security fabric of integrated security devices.
autonomous decisions with minimal supervision, use their Unlike the separate and isolated security devices most
collective intelligence to solve problems, or simultaneously organizations have in place, a security fabric is able to:
target multiple vulnerability points in a network using a
nnSee every device across the distributed network
variety of penetration and exploit techniques?
nnDetect unknown threats, including the attack patterns
The result would be a Hivenet instead of a botnet. Such
used by swarmbots
a tool can leverage peer-based self-learning to effectively
target vulnerable systems at an unprecedented scale. nnShare and correlate threat intelligence in real time to
Hivenets will be able to use swarms of compromised harden systems and repel invaders
devices, or swarmbots, to simultaneously identify and nnDynamically segment the network to prevent the lateral
tackle different attack vectors. Hivenets are especially spread of infection across the network
dangerous because, unlike traditional botnet zombies,
nnIsolate compromised devices and systems
individual swarmbots are smart. They are able to of talk to
each other, take action based on shared local intelligence, nnRespond to attacks in a coordinated fashion, such
use swarm intelligence to act on commands without the as automatically shutting down attack vectors by
botnet herder instructing them to do so, and recruit and dynamically reconfiguring the fabric as attack patterns
train new members of the hive. As a result, as a Hivenet and methods become better defined through the real-
identifies and compromises more devices it will be able time correlation of threat intelligence
to grow exponentially, and thereby widen its ability to
simultaneously attack multiple victims.
While IoT-based attacks such as Mirai or Reaper are not
using swarm technology yet, they already have the footprint
necessary. Reaper is especially concerning because it
uses a Lua engine with additional Lua scripts. Lua is an
embedded programming language designed to enable
scripts to run, allowing an attacker to switch from one
attack to another fairly easily. Upgrading to this sort of code
to leverage emerging swarm behaviors and AI would have
devastating consequences.

Responding to a Swarm Outbreak


There is currently very little that can be done to effectively CLOUD SERVICE PROVIDERS - TARGETED
fight off such an attack. Traditional security tools allow RANSOM AND THE SINGLE POINT OF FAILURE
organizations to simultaneously fend off a single or even The next big target for ransomware is likely to be cloud
several attackers. But a swarm is a completely different service providers. We have already seen the beginnings of
sort of challenge. In many cases, especially sustained this sort of attack in South Korea, where a hosting provider
multiple DDoS attacks, there’s simply not enough recently paid a US$1 million ransom to get their services
mitigation capacity. Even today, with all of our advances back online. To understand why this is an attractive target
in technology, when a swarm of killer bees is headed your for cybercriminals, let’s break down how much revenue
way the best solution is to simply run away. these services drive, the weak points in the system, and
Protecting networks and services, including critical how these big fish are going to be targeted for high value
infrastructure, from a swarm attack will require a systematic ransoms.

5
WHITE PAPER: FORTIGUARD 2018 THREAT PREDICTIONS

The financial opportunities are clear. Cloud computing is


expected to grow to $162B by 2020, with a compound
annual growth rate (CAGR) of 19%. In addition,
successfully taking down a cloud provider is a one-to-many
opportunity. The complex, hyperconnected networks that
cloud providers have developed can produce a single point
of failure for dozens or even hundreds of businesses. (Think
Mirai taking out a DNS hosting provider.)
Cloud services are also centralized and therefore present
a huge potential attack surface. Rather than hacking
businesses individually, criminals that are able to infiltrate HEALTHCARE & CRITICAL INFRASTRUCTURE –
a single cloud environment would potentially have access AN ARMS RACE
to data from dozens or hundreds of organizations, or be Of all the industries that could potentially be affected by
able to wipe out an entire range of services with a single advances in cybercrime techniques, healthcare and critical
attack. The disruption or ransom of Commercial Services infrastructure providers continue to be at the top of the
represents high value to cybercriminals list in terms of risk. These organizations are in a difficult
And it’s not just businesses that would be affected. position because their networks protect vital services and,
Government entities, critical infrastructure, law quite often, even human lives. At the same time, shifting
enforcement, healthcare, and a wide range of industries of consumer demands are forcing these organizations to
all sizes all use the cloud – and many of the use the same adapt to new market pressures, and as a result, security
cloud provider. If a cyber terrorist were able to take down can sometimes be seen as an inhibitor to success. As a
a single major cloud service provider, the results would be result, the pressure to sacrifice security for productivity
devastating. has left many providers vulnerable. Given the state of
This isn’t new. Cybercriminals have successfully targeted cyberthreats today, it is imperative that these organizations
cloud-based web hosting services in the past in order to act now to shore up their defenses before it’s too late.
inject code into multiple high traffic web domains rather Part of the challenge is that most critical infrastructure and
than trying to do that one at a time. With new cloud OT networks are notoriously fragile, and were originally
offerings, these criminals are not only able to continue that designed to be air-gapped and isolated. But the need
sort of attack, but they also have access to things like data to respond at digital speeds to employee and consumer
and PII (personally identifiable information) which can have demands has begun to change that, making everything
high resale value on the dark web. The fact that there is so exposed (think cloud-enabled SCADA services.) Applying
much more at stake makes cloud providers increasingly security as an afterthought once a network designed to
tempting targets. operate in isolation is connected to the digital world is rarely
As a result, we predict that cybercriminals will begin to very effective.
combine AI technologies with multi-vector attacks to scan Because of the high value of these networks, and
for, detect, and exploit weaknesses in a cloud provider’s the potential for devastating results should they be
environment. Successfully crippling a service that generates compromised or knocked offline, critical infrastructure and
millions of dollars a day for the provider, while disrupting healthcare providers are now finding themselves in an arms
service for potentially hundreds or thousands of businesses race with cybercrime organizations. This puts them in a
and tens of thousands or even millions of their customers, difficult position, one the one hand, they are being forced
would not just represent a massive payday for a criminal to trust new connected systems to provide both increased
organization. It would also undermine the fragile trust that intelligence and security, on the other, the risks are real.
many organizations already have when it comes to cloud- Complicating matters further, the advances being made
based computing, and could have a devastating effect on by cybercriminals will soon be able to subvert current
digital transformation and our digital economy. security technologies. Cyberterrorists, for example, will

6
WHITE PAPER: FORTIGUARD 2018 THREAT PREDICTIONS

begin weaponizing cybercrime tools, converting them are also beginning to see business and public sector
into militarized malware, or ‘Milware,’ designed to cause systems start to overlap to ensure that things like energy,
maximum damage to things like critical infrastructure. And water, or other critical infrastructure systems are able to
once the AI singularity takes place, offense vs. defense more effectively and efficiently respond to the needs of
(time to breach vs time to protect) will be reduced to a manufacturing floors, agriculture, or energy production.
matter of milliseconds rather than the hours or days it does And at the same time, cyberterrorism and business-
today. oriented cybercrime are also beginning to converge as their
The security these cloud systems currently have in place tools and techniques overlap. For example, disrupting a
will not be enough, which is why it is imperative that business can have political implications and vice-versa.
organizations migrate to advanced security systems built Which is why expert security systems need to be
around quality intelligence, and adopt an integrated security developed further to enable the critical sharing of
fabric strategy that can see across the distributed network, intelligence, allowing security architectures to work
counter the sophisticated attack systems being developed in concert to root out and stop advanced threats. In
and deployed by attackers, implement consistent security addition to integrating multi-cloud and mobile devices,
policy everywhere, and easily integrate advances in both unsegmented and unsecured networks need to be actively
collaboration and AI. monitored and secured. To make this happen, isolated
security devices will need to be identified and replaced
with those designed to operate as part of a more complex,
RESPONSE: SYSTEMS WILL BECOME MORE integrated system.
INTELLIGENT AND INTEGRATED – THE RISE OF
One of the biggest challenges will be the last mile of
“EXPERT SYSTEMS” security – finding the will and the way to automate basic
One critical response to advancements in malware and security hygiene, such as patch and replace, hardening
cybercriminal technologies is the development of “expert systems, and implementing two-factor authentication.
systems.” An expert system is a collection of integrated Complex, multi-cloud ecosystems and hyperconverged
software and programmed devices that use artificial networks that span physical and virtual environments
intelligence techniques to solve complex problems. For make performing these basic security practices extremely
example, expert systems use databases of knowledge to difficult to resolve. AI and automation need to fill this gap
offer advice, perform medical diagnoses, or make educated by replacing basic security functions and day-to-day tasks
decisions about trading on the stock exchange. currently being performed by people with an integrated
These expert systems cannot effectively operate expert security system that is able to:
independently. Part of their success depends on different nnDetermine device vulnerabilities, track and patch
systems operating together to solve complex challenges. devices, and apply security protocols or an IPS policy
We have already begun to see this sort of advancement in to protect vulnerable devices until a patch is available or
military applications. For example, new software designed they can be replaced
to function as an expert system now allows individual nnDevice misconfiguration is another huge problem.
fighter jets to integrate with each other in order to more
Expert systems need to be able to configure both
effectively carry out complex missions or respond to threats
security and network devices, monitor those
with orchestrated countermeasures. These advanced
configurations, and make appropriate changes as the
flight and targeting technologies enable them to make
network environments they operate in continue to shift.
autonomous and semi-autonomous decisions about
nnAutomatically rank devices based on levels of trust,
locating a target, evading an attack, or out-maneuvering an
dynamically segment traffic, especially from the growing
opponent.
number IoT devices, even in highly elastic environments.
Smart cities operate in much the same way, coordinating
They then need to be able to identify and isolate
critical resources to respond to things like traffic,
compromised devices to stop the spread of infection
emergency services, or even energy consumption. We
and initiate remediation.

7
WHITE PAPER: TITLE…

RESPONSE: ADVANCED CTI (CYBER THREAT CONCLUSION


INTELLIGENCE) Make no mistake. Cybercriminals are organized, well
The days of being able to detect and thwart an attack using funded, and highly motivated. They are deploying
an isolated firewall positioned at a network access point are advanced malware, leveraging cloud-based computing
over. IP addresses, malware, traffic behaviors, and domains resources, and developing cutting edge tools based on
are the basic building blocks of cybercriminals, and they AI and machine learning to not only circumvent advanced
can be easily changed and moved to make them harder to security defenses, but to also widen the scope and scale
detect. Add things like multi-vector attacks, polymorphic of their attacks. There are still wide-open, greenfield
malware, and the ability to masquerade as legitimate opportunities for enterprising criminals that are being driven
network traffic and most traditional security solutions by such things as cloud computing and IoT that are just
quickly become virtually obsolete. waiting for the right tools to be compromised.
Instead, threat Intelligence needs to contextualize As a result, over the next couple of years we will see the
information beyond IP addresses and file hashes and focus attack surface expand through the use of automation
on things that are harder for cybercriminals to change. One and tools that are able to make autonomous or semi-
of these is attack patterns and techniques. By aggregating autonomous decisions. The challenge is that we are at
and correlating intelligence from tightly integrated fabric a very delicate moment in our transformation to a digital
solutions that span the distributed network with real-time society and economy. Once we arrive at the singularity –
data from global threat feeds, sophisticated analysis will be when AI takes on a life of its own without human interaction
able to provide a fingerprint of malicious behavior that can – massive disruptions caused by autonomous malware
be quickly identified and tracked. could have devastating implications and permanently
Finally, all threat actors have unique behaviors, signatures, reshape our future.
and patterns. Once you are able to identify and isolate Organizations need to respond by insisting on
different threat actors based on the fingerprint of their manufacturers developing more and better security controls
criminal activity, organizations will be able to predict built around integrated security technologies, quality threat
malicious behavior based on historical trends, detect intelligence, open standards, and dynamically configurable
attacks in their very earliest stages, and dynamically security fabrics. Security will also need to be able to
implement effective countermeasures based on known operate at digital speeds, which means automating security
attack stages. responses and applying intelligence and self-learning
so that networks can make effective and autonomous
decisions. This will allow us to replace organically
developed accidental network architectures with intentional
design that can not only withstand serious and sustained
attacks, but also automatically adapt and respond.
Like it or not, this is a winner-takes-all arms race.
Organizations that fail to prepare now may not be able to
catch up once it moves to the next level of sophistication.

GLOBAL HEADQUARTERS EMEA SALES OFFICE APAC SALES OFFICE LATIN AMERICA HEADQUARTERS
Fortinet Inc. 905 rue Albert Einstein 300 Beach Road 20-01 Sawgrass Lakes Center
899 Kifer Road 06560 Valbonne The Concourse 13450 W. Sunrise Blvd., Suite 430
Sunnyvale, CA 94086 France Singapore 199555 Sunrise, FL 33323
United States Tel: +33.4.8987.0500 Tel: +65.6513.3730 Tel: +1.954.368.9990
Tel: +1.408.235.7700
www.fortinet.com/sales

Copyright © 2017 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common
law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance
and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether
express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified
performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same
ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this
publication without notice, and the most current version of the publication shall be applicable. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to
change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable. 141670 0 A4 EN November 20, 2017 12:21 PM
Macintosh HD:Users:wbrandthiatt:Documents:Egnyte:Shared:CREATIVE SERVICES:Team:Whitney-Brandt-Hiatt:White-Paper-FortiGuard-2018-Threat-Predictions-EMEA:WP-FortiGuard-2018-Threat-Predictions-A4

Vous aimerez peut-être aussi