Page 71 - Cyber Defense eMagazine for July 2020
P. 71

More variants: 439,000 new malware variants were detected in 2019. That’s a 12.3% increase over the
            previous year.

            More capable: Modern malware threats are far more capable than the old viruses spreading through
            illegal copies of software distributed via floppy-disks. Today’s malware can steal passwords, exfiltrate
            sensitive data, encrypt and delete data, and much more.

            Harder to detect: Malware authors work hard to make their software difficult to detect. This includes hiding
            it  in  legitimate  documents (aka “weaponizing” Word,  PDF  and  Excel  documents),  utilizing  detection-
            evasion mechanisms (like avoiding execution in sandboxed environments), and using legitimate software
            update mechanisms, all to make the work of the defenders harder.

            More aggressive: Some malware types are extremely aggressive; they scan for open RDP ports, brute-
            force  their  way  onto  a  device,  and  then  move  laterally  within  the  organization’s  network,  abusing
            password-protected servers and seeking sensitive data, all without the knowledge of the victim.

            Fast:  contemporary  malware  is  extremely  fast  and  works  at  machine-speed  to  bypass  protection
            mechanisms  and  achieve  its  goals—ransomware  like  “WannaCry”  disabled  entire  organizations  in
            minutes.



            Adopting Cybersecurity Response to Fight Covid-19

            To mitigate today’s plethora of rapidly evolving cyber threats, the cybersecurity industry has developed
            several  methodologies.  These  (after  adaptation)  could  be  used  to  reduce  the  spread  of  malicious
            software and to mitigate its effects. I will refrain from discussing the obvious virus/Anti-virus analogy.
            Obviously, a vaccine for a computer “virus” would be the answer, but estimates suggest that such a
            vaccine would not be available in the next 12-18 months, and there’s a lot we can do until then:

            Zero trust policy- A methodology that defies the traditional security assumption that everything inside the
            perimeter (protected by the firewall) is trusted. The main principle of Zero Trus is “never trust, always
            verify”. This means that every user is asked to verify their credentials every time they wish to “enter” the
            organization and that every file and process are being constantly monitored – even if they have been
            “authorized” to run on the computer.

            In a similar manner, humans should consider that other humans are carriers, and only “trust” them after
            they have been tested negative (or at the minimum, have had their temperature taken).

            Detection beats prevention: following a similar line of thought, most organizations today operate under
            the “Assume a Breach” paradigm. Instead of striving to identify and mitigate 100% of threats 100% of the
            time, they assume that some threats would be able to infect them and concentrate their efforts on quickly
            finding these and stopping them before they could do more harm.

            Similarly, it is prudent to assume that humanity would not be able to vanquish this virus, and we will be
            playing “whack-a-mole” with it for the foreseeable time. Given that this is the case, it’s prudent to invest
            in rapid detection of the infection (quick detection kits, even home detection kits), ensure those that are
            sick are given quick treatment, and continue to monitor the entire population for outbreaks.




            Cyber Defense eMagazine –July 2020 Edition                                                                                                                                                                                                                         71
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   66   67   68   69   70   71   72   73   74   75   76