Page 147 - CDM-CYBER-DEFENSE-eMAGAZINE-December-2018
P. 147

states  have  launched  huge  distributed  denial-of-service  (DDoS)  attacks  that  can  take  down  entire
            countries’  infrastructure  and  could  certainly  hamper  communications  systems.  The  U.S.  government
            claims foreign actors have already been targeting and probing the defenses of public utility and energy
            systems. We’ve seen these nation-sponsored attacks targeting financial systems like SWIFT to steal
            millions. Nation-states have also used social media and other communication systems to poison public
            perception with fake news.

            In summary, each of these individual types of attack are already possible. It’s just a matter of time before
            some country combines many attacks as a smoke screen for a larger operation.



            5) Prediction: Fileless, Self-Propagating “Vaporworms” Attack


            Description:
            In  2019,  a  new  breed  of  fileless  malware  will  emerge,  with  wormlike  properties  that  allow  it  to  self-
            propagate through vulnerable systems and avoid detection.

            It has been over 15 years since the Code Red computer worm spread through hundreds of thousands of
            vulnerable Microsoft IIS web servers in an early example of a fileless worm. Since then, both worms and
            fileless malware have impacted networks worldwide individually, but rarely as a combined attack.

            Fileless malware, which runs entirely in memory without ever dropping a file onto the infected system,
            continues to grow in popularity. Sophisticated attackers prefer this method because without a malicious
            file to scan, traditional endpoint antivirus controls have a hard time detecting and blocking fileless threats.
            This results in higher infection rates. Pair this with systems running unpatched and vulnerable software
            that’s ripe for worm exploitation, and you have a recipe for disaster.

            Last year, a hacker group known as the Shadow Brokers caused significant damage by releasing several
            zero  day  vulnerabilities  in  Microsoft  Windows.  It  only  took  a  month  for  attackers  to  add  these
            vulnerabilities to ransomware, leading to two of the most damaging cyber attacks to date in WannaCry
            and NotPetya. This isn’t the first time that new zero day vulnerabilities in Windows fueled the proliferation
            of a worm, and it won’t be the last. Next year, “vaporworms” will emerge; fileless malware that self-
            propagates by exploiting vulnerabilities.


















                                 147
   142   143   144   145   146   147   148   149   150   151   152