This article is part of Panther’s new Future of Cyber Attacks Series which features interviews with cyber security experts, thought leaders, and practitioners with a goal of better understanding what organizations can do to prepare themselves for the future of cyber attacks.
The following is an interview we recently had with Purandar Das, Chief Security Evangelist and Co-founder of Sotero
Cyber-attacks have both stayed constant and evolved simultaneously. The traditional style attacks of attacking perimeter weaknesses, software bugs, unpatched servers and phishing attacks have continued. However, these vectors are now also being used as a staging platform for far more sophisticated attacks.
Cyber-attacks have evolved along multiple dimensions. They have increased in volume as well as complexity and sophistication. The interesting thing about the evolution is that only one of the attack vectors is a new one, while the rest of them are either enhancements or combinations of existing attack vectors. The other point on note is that the new attacks have not slowed down the old attack vectors. Ransomware has evolved into a long play both in its sophistication and the ability to monitor traffic patterns while exfiltrating data. The data as well the systems are being held hostage. Ransomware has also evolved from the old social engineering approach to piggy backing on legal third-party software deployment mechanisms and vulnerabilities. Automation and sophistication both in the attack methods as skills are now the hallmarks of cyber-attacks.
The combination attacks are having the effect of overcoming security mechanisms as one weakness is being used to mount more sophisticated and widespread attacks. Using third party software vulnerabilities to monitor email or to deliver malicious payloads is a recent development.
Some of the areas that are being highlighted relate to a legacy mindset in security defensive postures. The traditional approach of network & perimeter security coupled with “at rest” data protection is being exposed. Another weakness that is being exposed is the traditional focus on internal systems and leaving third party platform and software security to the providers and vendors. Yet another area that is being exposed is the lack of security skills and knowledge of cloud security. Traditional approaches of migrating on premise security systems to the cloud is being exposed as inadequate. Every area of integration and collaboration involving data and applications are being exposed as points of weakness.
The lessons that are evident are the obvious ones.
While it is hard to accurately predict what attacks will look like in the future some trends are obvious. In addition, traditional assumptions around security no longer hold true. Starting with the basic assumptions that will no longer hold true.
Some areas that will continue to evolve as it relates to cyber-attacks:
Needleless to say this is a time of reckoning for most organizations. As evidenced by recent developments the federal government along with some of the largest private technology companies have committed to investing billions of dollars in improving cyber security. Motivations range from existential threats to severely impacted earning abilities. Regardless of the motivation, the underlying message is clear: Cyber threats have grown in scale to a point where they are threatening the very existence of a country’s security & economy.
Getting ahead of this threat(s) will require basic reassessment towards how this is addresses: