{"id":33847,"date":"2020-12-16T19:00:26","date_gmt":"2020-12-16T15:00:26","guid":{"rendered":"https:\/\/blog.dubaicityguide.com\/site\/?p=33847"},"modified":"2020-12-16T19:00:26","modified_gmt":"2020-12-16T15:00:26","slug":"cyber-attacks-set-to-become-more-targeted-in-2021-according-to-hp-inc","status":"publish","type":"post","link":"https:\/\/blog.dubaicityguide.com\/site\/cyber-attacks-set-to-become-more-targeted-in-2021-according-to-hp-inc\/","title":{"rendered":"Cyber-Attacks Set To Become More Targeted In 2021, According To HP Inc."},"content":{"rendered":"<p>HP released its 2021 predictions on how security threats \u2013 such as human-operated ransomware, thread hijacking, unintentional insider threats, business email compromise and whaling attacks\u2013 are set to increase in the next 12 months.<\/p>\n<p>HP\u2019s cybersecurity experts including \u2013 Julia Voo, Global Lead Cybersecurity and Tech Policy; Joanna Burkey, CISO; Boris Balacheff, Chief Technologist for Security Research and Innovation at HP Labs; Dr Ian Pratt, Global Head of Security for Personal Systems; and Alex Holland, Senior Malware Analyst \u2013 and experts from HP\u2019s Security Advisory Board \u2013 Justine Bone, CEO at MedSec; and Robert Masse, Partner at Deloitte \u2013 all gave their predictions for the year ahead.<\/p>\n<p><strong>Weakened organizational security will lead to more unintentional insider threats<\/strong><\/p>\n<p>The dramatic changes to how we work in 2020 and the shift to remote working will continue to create challenges, says Julia Voo: \u201cCOVID-19 has weakened organizational security. Remote access inefficiencies, VPN vulnerabilities and a shortage of staff that can help the business adapt means data is now less secure.\u201d From a cybercriminal\u2019s perspective, the attack surface is widening, creating more opportunities, as Joanna Burkey explains: \u201cWe can expect to see hackers identifying and taking advantage of any holes in processes that were created, and still exist, after everyone left the office.\u201d<\/p>\n<p>Boris Balacheff points out that this also means that home devices will be under increased pressure: \u201cWe have to expect home infrastructure will be increasingly targeted. The scale at which we operate from home increases the incentive for attackers to go after consumer IoT devices and pivot to business devices on the same networks. And as we know, if attackers are successful with destructive attacks on home devices, remote workers won\u2019t get the luxury of having someone from IT turning up at their door to help remediate the problem.\u201d<\/p>\n<p>Burkey also believes there will be more unintentional insider threats: \u201cWith employees working remotely, the lines between work and personal equipment are blurred, and innocent actions \u2013 such as reading personal email on a company machine \u2013 can have serious consequences.\u201d Overall, the pandemic has increased the risk of employees making errors, as Robert Masse explains: \u201cIf you view the pandemic as a war experience, then organizations will be dealing with employee burnout. This can lead to an increased risk of errors in judgement.\u201d<\/p>\n<p><strong>Human-operated ransomware attacks will remain an acute threat<\/strong><\/p>\n<p>Ransomware has become the cybercriminal\u2019s tool of choice, and this is likely to continue in the year ahead, comments Burkey: \u201cWhat we\u2019ll see is a rise in ransomware-as-service attacks where the threat is no longer the \u2018kidnapping\u2019 of data \u2013 it\u2019s the public release of the data.\u201d<\/p>\n<p>The rise of ransomware has fueled the growth of an ecosystem of criminal actors who specialize in different capabilities needed to pull off successful attacks. Malware delivered by email, such as Emotet, TrickBot and Dridex, are often a precursor to human-operated ransomware attacks. \u201cTo maximize the impact of an attack, threat actors use their access to compromised systems to deepen their foothold into a victims\u2019 networks. Many crews use offensive security tools to gain control of a victim\u2019s domain controllers, which are often the best point in a network to deploy ransomware,\u201dexplains Dr Ian Pratt.<\/p>\n<p>This trend is of particular concern to those in the public sector, as Alex Holland explains: \u201cThe rise of \u2018double extortion\u2019 ransomware, where victim data is exfiltrated before being encrypted, will particularly hurt public sector organizations, who process all manner of personally identifiable information. Even if a ransom is paid, there is no guarantee that a threat actor won\u2019t later monetize the stolen data.\u201d<\/p>\n<p><strong>Greater innovation in phishing will see thread hijacking and whaling attacks<\/strong><\/p>\n<p>In 2021, there will be more innovative phishing lures designed to trick users and make attacks harder to identify. \u201cThe most innovative mass phishing technique we see is email thread hijacking, which is used by the Emotet botnet. The technique automates the creation of spear-phishing lures by stealing email data from compromised systems. This data is then used to reply to conversations with messages containing malware, making them appear very convincing,\u201d explains Dr Ian Pratt. We can also expect to see more of these attacks targeting individuals working remotely, says Justine Bone: \u201cThanks to everything relying on strong authentication, as opposed to in-person presence, there is more opportunity for hackers to engage in social engineering to trick employees into divulging credentials.\u201d<\/p>\n<p>The prospect of continued social isolation has encouraged people to share more personal information online, which cybercriminals can weaponize. \u201cWhaling, a form of highly targeted phishing attack aimed at senior executives, will become more prominent with cybercriminals able to take personal information shared online to build convincing lures leading to business email compromise fraud,\u201d comments Masse.Many of these phishing emails will continue to exploit people through fear, according to Voo. \u201cNew fears will be used to drive people to open malicious emails \u2013 whether it\u2019s COVID vaccines, financial concerns related to the lockdown and any political instability.\u201d<\/p>\n<p><strong>Hackers will tailor attacks to target specific verticals \u2013 in particular, critical infrastructure, pharma and healthcare, Industrial IoT and education <\/strong><\/p>\n<p>One of the most at-risk verticals in 2021 will be healthcare. \u201cHealthcare has been a perfect target \u2013 society depends on it and these organizations are typically under-resourced, change-averse and slow to innovate. Education also fits this criterion and could be another prime target,\u201d says Bone. However, this threat extends beyond hospitals and doctor\u2019s surgeries into more critical areas. \u201cDue to the race to develop a new vaccine, pharmaceutical companies and research facilities will also continue to face adverse risk,\u201d comments Masse.<\/p>\n<p>But the next 12 months will also see other targets come into consideration for hackers. \u201cCar makers, particularly EV companies, will become bigger targets as they grow in prestige and profitability, and we can also expect to see critical infrastructure and the Industrial Internet of Things continue to be in hackers\u2019 crosshairs,\u201d explains Masse.<\/p>\n<p><strong>Zero trust is here to stay, but needs to be implemented in a way that is transparent to the user<\/strong><\/p>\n<p>Zero trust as a concept isn\u2019t new, but the increase in remote working means that it is now a reality that organizations need to accept. \u201cThe traditional ways of securing access to the corporate network, applications and data are no longer fit for purpose. The perimeter has become obsolete. Over the years the workforce has become more dispersed, and SaaS adoption has risen \u2013 this means critical data is being hosted outside the enterprise firewall. The time has come for organizations to start protecting against the unknown, which means utilizing zero trust, but in a way that is transparent to the user,\u201d comments Pratt.<\/p>\n<p>COVID-19 will be a key driver behind zero trust adoption and also means we\u2019ll see greater innovation in this area. \u201cZero trust is the best defensive approach for enabling remote working, but for identity and access management to be seamless it needs to be easy to use. Quality authentication methods are a key enabler of zero trust, which is why technologies such as biometrics will be expected by end users in the future,\u201d comments Bone.<\/p>\n<p><strong>A new approach to security is needed<\/strong><\/p>\n<p>\u201c2020 demonstrated that is has become critical to manage highly distributed endpoint infrastructure,\u201d comments Balacheff. \u201cOrganizations need to accept that the future is distributed.Everything from remote workers\u2019 devices to industrial IoT devices have become the new frontlines of the cybersecurity battleground in our increasingly cyber-physical world. To meet this challenge, organizations need to re-think their security architectures and controls, and embrace the necessary innovation in technology and processes to help them support this new environment. For example, modern hardware technology exists that can help not only protect but also recover employees remotely and securely in the face of destructive attack like those we have seen in the last few years.\u201d<\/p>\n<p>\u201cOrganizations face a huge security challenge in the year ahead, with cybercriminals becoming savvier about how to extract the most value out of victims,\u201d comments Ian Pratt. \u201cRelying on detection alone will only result in an unsatisfactory outcome for the organization, so a more architecturally robust approach to security is required; one that builds protection in from the hardware up. Hardware-enforced technologies like micro-virtualization are transparent to the end user \u2013 this means they can click on email attachments and download files as they normally would, but are safe in the knowledge that if anything is malicious, it is rendered harmless. This protection-first approach leaves hackers with nothing to steal and no way to persist, helping organizations to deal with the variety of threats 2021 and beyond will throw at them.<\/p>\n<p>\u201cOrganizations have had a tough 2020. The shift to remote working has widened the attack surface and made life even more difficult for security teams, meaning the days of the hardened perimeter are behind us. Now, more than ever, organizations need to shift their focus to delivering protection where it is most needed: the endpoint. Over the course of 2020, we have seen hackers become increasingly targeted, while also using sophisticated lures to trick users into engaging in risky behaviors. Over the next 12 months we will see more of the same, with targeted and sophisticated attacks directed at users and endpoints,\u201d comments Mathew Thomas, Vice President and Managing Director for Middle East at HP Inc. \u201cOrganizations cannot afford to close their eyes and hope for the best in 2021, which is why it\u2019s critical that they adopt a protection-first approach to endpoint security to keep them a step ahead of cybercriminals.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>HP released its 2021 predictions on how security threats \u2013 such as human-operated ransomware, thread hijacking, unintentional insider threats, business email compromise and whaling attacks\u2013 are set to increase in the next 12 months. HP\u2019s cybersecurity experts including \u2013 Julia Voo, Global Lead Cybersecurity and Tech Policy; Joanna Burkey, CISO; Boris Balacheff, Chief Technologist for [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":33848,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-33847","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.dubaicityguide.com\/site\/wp-json\/wp\/v2\/posts\/33847","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.dubaicityguide.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.dubaicityguide.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.dubaicityguide.com\/site\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.dubaicityguide.com\/site\/wp-json\/wp\/v2\/comments?post=33847"}],"version-history":[{"count":2,"href":"https:\/\/blog.dubaicityguide.com\/site\/wp-json\/wp\/v2\/posts\/33847\/revisions"}],"predecessor-version":[{"id":33850,"href":"https:\/\/blog.dubaicityguide.com\/site\/wp-json\/wp\/v2\/posts\/33847\/revisions\/33850"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.dubaicityguide.com\/site\/wp-json\/wp\/v2\/media\/33848"}],"wp:attachment":[{"href":"https:\/\/blog.dubaicityguide.com\/site\/wp-json\/wp\/v2\/media?parent=33847"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.dubaicityguide.com\/site\/wp-json\/wp\/v2\/categories?post=33847"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.dubaicityguide.com\/site\/wp-json\/wp\/v2\/tags?post=33847"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}