The Future of Ransomware

The Future of Ransomware

Ransomware has evolved from attacks on users to attacks on organizations. In the past, if your data was encrypted by ransomware, you could restore it from your backup. Today, this is no longer the case, as ransomware can also compromise our backups.

Today’s ransomware is sophisticated, it has building blocks and can change its behavior and attacks depending on the customer environment.

In this blog article, I will give you an overview of ransomware, the future of ransomware, and what impact it has on companies.

What is Ransomware?

Ransomware is a type of malware that encrypts data, virtual machines associated files, databases, and others. When it infiltrates the system, it encrypts the data and creates a .txt ransom note with instructions for the victim on how to make a payment and obtain the description key.

It is usually spread via phishing mails (look for QR code scams), social engineering, and other attack methods. Ransomware can attack various targets and their data, including Windows, Linux, MAC, VMWare, Hyper-V, Citrix, databases, and others.

This is how ransomware works

This is how ransomware works

It causes a lot of problems for SMBs, SMEs, governments, healthcare, and all other industries. If there is no operational business data, there is no business.

According to a Ransomware attacks survey, 14.1% of ransomware victims lost data, and 6.6% had to pay the ransom.

14.1% of ransomware victims lost data, 6.6% had to pay the ransom

14.1% of ransomware victims lost data, 6.6% had to pay the ransom

If the victim does not pay, the ransomware group threatens to release the files piece by piece or to sell them to interested parties. In this way, they force the victim to pay.

Exploring the Evolution of Ransomware

Ransomware attacks are not a new development in the cyber world. OK, we may hear them more often because they have been very popular over the last decade.

The first version of ransomware dates back to 1989, when Joseph Popp, the author of the AIDS Trojan, distributed floppy disks in over 90 countries on behalf of the PC Cyborg Corporation.

The AIDS trojan

Anyone who inserted the diskette into their PC was infected with malware.

The malware encrypted their files and demanded payment of $ 567 for the decryption key. Joseph Popp is known as the father of ransomware.

From 2005 to 2010, fake antivirus ransomware was very popular. This fake antivirus program detected a fake threat in the system and asked users to pay for the antivirus license to delete the threat. Payment was made by credit card and ranged from $ 20 to $ 100.

From 2010 to today, we have seen different types of ransomware attacks targeting different systems and industries. It’s not just about a single operating system, but anything that becomes a technological trend (hypervisors, hyper-converged infrastructure, cloud, IoT, IIoT, OT, etc.); quickly becomes a target for ransomware gangs.

In the recent ransomware attack on IxMetro PowerHost, a hosting provider from the US, the ransomware gang encrypted their VMware ESXi and virtual machines and demanded a payment of two bitcoins per affected customer, totaling about $ 140 million.

When IxMetro PowerHost realized that their data could no longer be used, they wanted to restore healthy copies from the backups.

However, that didn’t work well. Their backup was also encrypted.

This is the evolution of ransomware. It started very small and grew significantly, both in terms of damage caused and ransom demands ($ 567 in 1989, and $ 140 million in 2024).

Emerging Trends Shaping the Future of Ransomware

Technology is constantly changing. Ransomware would not be successful if it did not follow technological trends. According to various reports, the number of ransomware attacks doubled in 2022 compared to the previous year and increased by 130% in 2024.

So, ransomware is here to stay.

In this section, we will talk about trends that might determine the future of ransomware.

Tailored ransomware attacks

In the past, ransomware mainly targeted Windows due to its large market share. Today, with the growing market share of Linux, we can observe an increase in ransomware attacks against Linux as well. For instance, the first version of Monti ransomware only targeted Windows, while the newer version also can attack Linux distributions.

In the future, ransomware will be more tailored to different targets and industries. For example, we can see an increase in ransomware attacks on hospitals and pharmacies, transportation industries, financial institutions, education, and other industries.

Industries targeted by ransomware

Industries targeted by ransomware

Additionally, we can see more ransomware attacks in this direction targeting PLCs (Programmable Logic Controllers) in OT networks. PLCs are often operated with Windows or Linux systems. A 10-minute downtime in production can lead to hundreds of thousands in financial losses.

Ransomware as a Service (RaaS)

Hacking used to require extensive knowledge and skills.

RaaS platforms now allow cybercriminals to launch ransomware attacks with minimal technical expertise. These platforms are developed by ransomware gangs to speed up and automate the execution of ransomware attacks. RaaS recruiters recruit people on the internet and ask them to join the ransomware group and participate in the attack.

These platforms have a user-friendly interface, detailed user manuals, forums, and 24-hour support. It is a real (malicious) business method.

Some well-known RaaS platforms are Hive, DarkSide, Revil, Dharma and others.

We will see an increase in the usage of RaaS platforms.

Ransomware in the supply chain

Have you heard about the Solarwinds hack, one of the biggest cybersecurity breaches of the 21st century? Solarwinds provides network monitoring and management tools for IT infrastructures.

Here is what happened.

An attacker injected malware into SolarWinds’ software development process, specifically the Orion software updates. As soon as customers downloaded the update, they also downloaded and installed the malware on their systems.

Antivirus and security tools could not detect it. Attackers gained access to a network of over 30 thousand public and private customers. They had access to their data.

This was one of the biggest supply chain attacks in modern times.

Many products are dependent on third-party services which open a product across different layers. In the future, we will see more and more ransomware attacks delivered via supply chain.

Backup is under attack

When IxMetro PowerHost, a hosting provider from the US, realized their production machines and data were encrypted, they informed customers and started the restoration process.

However, very quickly, they realized backup copies were also encrypted.

Attacking backup copies is becoming a trend. If production and backup are encrypted, the victim has no choice but to pay the ransom, unless they have offsite backup copies and immutable technology in place.

Dark Web Auctions

Governments and security researchers recommend not paying a ransom. The idea behind this is to show ransomware gangs that their malicious activities are not profitable.

Nevertheless, ransomware groups have invested time and resources to hack the system and are looking for all possible ways to monetize their operations.

They have started exposing data on the dark web if the victim refuses to pay for the ransom. This provides them with additional income. We call it double extortion.

Whether the victim pays or not for the ransom, there is no guarantee that the data will not be sold to interested parties.

AI-Powered Ransomware

Today, Artificial intelligence (AI) is used everywhere. It is not strange that ransomware gangs would use it for malicious purposes. We can expect more AI-driven ransomware attacks on various targets and industries.

The National Cyber Security Center (NCSC) predicts that ransomware will benefit the most from AI in the next two years, alongside other cybersecurity attacks.

Ransomware attacks will be more effective and dangerous. AI-driven ransomware will help identify vulnerabilities in systems and adapt the behavior and each attack to the customer’s environment.

Sounds scary!

To respond to ransomware threats driven by AI, security vendors are developing AI-driven defense systems.

This is a game of offense and defense.

Preparing for the Future: Strategies Against Ransomware Attacks

If we look at the reports after the attack, we can see that the attack could have been prevented if stronger security measures had been taken.

Several strategies can help organizations prevent future ransomware attacks. The foundation of prevention is strong IT security measures.

First and foremost, it is important to keep all systems up to date. Systems that are not patched are the first point of attack.

Strategies against ransomware attacks

Strategies against ransomware attacks

Regularly backing up critical data and workloads is extremely important. In the event of a failure, the data or the machine can be easily restored. Since ransomware can also attack backups, it is important to use immutable storage and immutable backup solutions. Immutable technology prevents ransomware from making changes (encrypting) to files.

Implement strong security measures from endpoints and networks to various servers. These measures include hosted and network firewalls, advanced threat detection, IDS (Intrusion Detection System), IPS (Intrusion Prevention System), incident response plans, encryption, and data security.

You should implement strong password policies and use multi-factor authentication.

All of this is important, but if you do not provide adequate security awareness training, you are at high risk. We strongly recommend that you continuously provide cybersecurity training to your employees and teach them how to prevent social engineering and phishing attacks.

We recently published Cyber Security Report 2024 with an in-depth analysis of analysis of the current cyber threat landscape based on real-world data.

What can trigger the change of the malicious business model?

Organizations and technology are prone to change. This happens due to market trends, government regulations, or simply a change in the business model.

To be effective in their malicious operations, ransomware gangs adapt their business model.

One of the questions is what can trigger a change in the cyber malicious business model.

Urgent call for cryptocurrency regulations

When ransomware infiltrates your network and systems, it attacks your data, encrypts it, and creates a .txt ransom note with instructions on how the victim can make the payment.

All payments are required in cryptocurrencies, mainly in Bitcoin.

Today, the spectrum of ransomware attacks is much broader, and ransomware groups are demanding more money.

And why? It offers them additional security and anonymity.

This is a challenge for governments and security vendors, as it prevents them from getting in and out of money transactions.

That means we need regulation for cryptocurrencies!

If governments were to introduce regulations for crypto-assets – and they are already looking into this – it would add regulation and control to the use of Bitcoin and other cryptocurrencies.

This would put ransomware groups in a tight spot as they would not be able to fund attacks with crypto assets.

When it comes to global crypto regulations, The International Organization of Securities Commissions has laid out its 18 recommendations for managing crypto assets.

In terms of regulations per country or region, the following countries have started the process: the European Union, Switzerland, the United Kingdom, Japan, India, the United Arab Emirates, South Africa, Singapore, the United States of America, and Canada.

Better law enforcement operations

Cybercriminals are prosecuted, but there is a lack of cross-jurisdictional takedowns of ransomware groups. In practical terms, this means that a ransomware group can operate from multiple countries, and prosecuting hackers from only one country would not be very effective.

What security researchers are calling for is better cross-jurisdictional cooperation between countries.

If legal action were taken against ransomware groups, these ransomware groups would probably have to leave the country and find another location.

To properly protect your cyber environment, use Hornetsecurity Security Awareness Service and Advanced Threat Protection to secure your critical data.

To keep up with the latest articles and practices, visit our Hornetsecurity blog now.

Conclusion

Ransomware is a type of malware that encrypts all kinds of data and asks the victim to pay a ransom to get their data back. If the victim does not want to pay, ransomware gangs expose the data piece by piece or sell it to interested parties on the dark web.

The father of ransomware, Joseph Popp, developed the first ransomware in 1989 and distributed it via a floppy disk. From 2005 to 2010, fake antivirus programs were very popular. Since then, ransomware has continued to emerge, targeting different infrastructures and industries.

Whenever a technology or market shifts to something else, ransomware gangs adapt their malicious business model and attack.

The future of ransomware will revolve around AI-driven attacks, more sophisticated ransomware attacks tailored to different targets and industries, more supply chain attacks, backup, double extortion, dark web auctions, and more.

To prevent this, we need to implement strong security measures from the endpoint to the servers and provide continuous cybersecurity training to employees.

Additionally, governments can help by improving cross-jurisdictional cooperation and preventing attacks through better laws. As cryptocurrencies are used to pay the ransom, regulation of crypto assets would also be beneficial.

This article looks at ransomware and some expectations for the future.

FAQ

Is ransomware going away?

Ransomware is one of the most popular and effective methods used by cybercriminals. According to different reports, ransomware is not going away; on the contrary, it is becoming increasingly sophisticated and dangerous.

What is the trend in ransomware?

Ransomware attacks are increasingly being tailored to different customer environments.

It no longer attacks a single operating system such as Windows but extends to all different operating systems, hypervisors, the cloud, telecommunications, healthcare, and other infrastructures and industries.

In addition, we can also see Ransomware as a Service (RaaS) becoming a trend. The usage of cryptocurrency is a norm since it provides anonymity.

Ransomware attacks are powered by AI which helps them to be more effective.

Is ransomware here to stay?

Considering that ransomware follows the technological trend, it is here to stay, becoming more sophisticated and dangerous for different infrastructures and industries.

Cybersecurity: Essential for Our AI Future – Let’s Understand Why

Cybersecurity: Essential for Our AI Future – Let’s Understand Why

The Rise of Artificial Intelligence

Artificial intelligence (AI) systems are highly developed computer programs that mimic and outperform human intelligence in terms of learning and decision-making, but they do so remarkably quickly and accurately. AI learns by examining vast volumes of data and looking for patterns, much like a human may practice a new skill to get better at it.

This enables them to perform extraordinarily well in a variety of activities, including speech recognition, picture categorization, gaming, and even vehicle operation. To guarantee that its choices and results are proper, AI is still dependent on human direction and supervision at this time.

AI technology has grown significantly in the years changing various industries and applications. This rapid progress is thanks, to improvements in computing power data availability and machine learning techniques. An example that stands out is AlphaGo, a computer program created by DeepMind that defeated the world champion Go player, Lee Sedol in 2016. This achievement marked a milestone in AI advancement since Go was previously seen as complex for AI to conquer.

As AI becomes more integrated into life it boosts productivity, efficiency, and innovation. In healthcare AI-driven diagnostic tools show promise in disease detection such as cancer. Additionally, AI-based recommendation systems, on online shopping platforms have transformed the way we shop on the Internet.

Why Is Cybersecurity Important in our AI Future

Wherever AI systems play a role in a business or personal use, it’s necessary to address the vulnerabilities and ensure strong security measures are, in place. Protecting data and upholding privacy are aspects of AI security. Data breaches can have consequences like losses, damage to reputation, and risks to public safety.

To highlight the importance of AI security consider the issue of deepfake content. Deepfakes are AI-generated images, videos, or text that realistically impersonate people or events. These pose a threat to privacy and security, for example, deepfake videos depicting politicians making statements could be used to sway opinion or cause chaos during elections.

One notable incident occurred on May 22 2023 when a fabricated image showing an explosion near the Pentagon circulated on media briefly affecting the US stock market. The debunked image depicted smoke rising next to the US Department of Defense headquarters. Experts believe it was likely created using AI technology and serves as a warning, about the dangers of misinformation.

Real-world AI Incident

The incident involving Tay, Microsoft’s AI chatbot, in 2016 serves as an example of AI security concerns. Tay was initially programmed to learn from user interactions on Twitter. It quickly veered off course by posting inappropriate content within just 24 hours. It was later revealed that malicious users had manipulated Tay underscoring the necessity for security measures and the ethical advancement of AI technologies.

The emergence of AI has ushered in a myriad of advantages and prospects. It also underscores the significance of AI security. Safeguarding the secure progression of AI systems is imperative to safeguarding information upholding privacy standards and averting potential negative repercussions. Through efforts among researchers, developers, and policymakers we can foster a conscientious environment, for the future development of artificial intelligence.

Dangers to Cybersecurity in AI

AI technology holds promise in enhancing most aspects of our lives from healthcare to transportation, however, as advanced AI systems like ChatGPT continue to evolve and play roles in infrastructure they bring along new cybersecurity challenges that need immediate attention. Here are some key cybersecurity risks associated with AI;

Data breaches and privacy issues

AI systems heavily rely on amounts of data for learning and decision-making processes. The data these systems accumulate the more vulnerable they become to data breaches. For instance, in March 2023 Italys data protection authority imposed a ban on ChatGPT due to concerns over a data breach and the legality of using information to train the popular chatbot.

With AI expanding into sectors such as healthcare, education and finance the repercussions of breaches could have consequences. Privacy is also under threat as organizations collect data to train AI systems. Establishing policies and ensuring transparency regarding data collection and usage are steps, toward fostering trust in AI technologies.

Misuse of Artificial Intelligence

As we move forward, towards automation, there is growing worry that AI might be utilized to increase cybersecurity risks or potentially create ones. For instance, AI could speed up cyber-attacks, such, as spamming, phishing attempts, malware distribution, and ransomware attacks. Additionally, AI could aid hackers in breaching systems by identifying vulnerabilities or devising intricate social manipulation tactics. Regulations are necessary to prevent, or at least minimize the misuse of AI as these harmful applications present a danger, to society.

AI-driven cyberattacks

AI can automate hacking and carry out cyberattacks with intervention. It can swiftly. Exploit vulnerabilities to infiltrate computer networks. Through “reinforcement learning ” AI systems can continuously enhance their techniques for breaching systems.

While the concept of AI weapons remains theoretical the potential risks they present in cyber warfare are significant. It is crucial to monitor cyberspace to detect any instances of AI being used for purposes and implement appropriate countermeasures.

As the use of AI technologies continues to grow maintaining cybersecurity measures is paramount. Establishing regulations, guidelines and best practices is essential to ensure that AI systems are transparent, unbiased, and safeguarded against entities. By implementing proper controls and effective oversight we can reap the benefits of AI technology while minimizing the threats posed by threat actors exploiting the technology that is supposed to help us.

However, it is imperative to take steps to prevent scenarios where malicious AI poses a greater threat, than our ability to counter it effectively.

Best Practices for AI Security

AI technology is advancing rapidly playing a role, in systems and handling sensitive information. This has made ensuring the security of AI a priority. Here are some recommended practices for maintaining AI security;

  • Implementing authentication and access control measures. Using factor authentication for accessing AI applications or infrastructure is essential. Access control policies should be robust regularly updated and follow the principle of privilege meaning employees should only have access to what they need for their roles. For instance, an AI system analyzing scans should have access controls in place with different credentials and permissions assigned to radiologists, nurses, researchers, and IT personnel. Regularly reviewing authentication and permissions is important to revoke access when employees leave the organization or change positions.
  • Conducting security audits and updates for monitoring vulnerabilities in AI systems and machine learning models. Independent experts should regularly perform audits to detect any security issues or risks that may arise. Audits should cover all aspects of the AI system including the training data, models, APIs, software and infrastructure. Upon reviewing audit findings immediate action should be taken to address vulnerabilities update machine learning models and software apply security patches and re-engineer systems if necessary. For example, an AI service utilizing NLP should enhance its machine learning models with the defenses, against threats like spam and abuse while also addressing any bias that could be exploited by actors. Staying up to date on AI security practices is crucial.
  • AI security awareness and training. From data scientists and engineers to executives and business users. It’s important to provide tailored security awareness programs and training sessions based on each employee’s role within the organization. For instance, AI developers should focus on building machine learning models and software while other staff members need to understand threats such, as engineering targeting AI systems and how to effectively engage with AI technologies. Continuous learning is vital as new vulnerabilities and risks arise in the evolving landscape of AI.
  • Collaboration, among AI developers, researchers, and security experts. It involves an approach where close teamwork between AI engineers, machine learning researchers, and cybersecurity professionals is crucial. Than treating security as an afterthought developers and researchers need to collaborate with security teams to proactively address vulnerabilities. For example, machine learning modelers can seek advice from security experts during the training phase to mitigate risks such as data poisoning attacks. Once models are deployed security teams can conduct penetration testing to identify weaknesses and collaborate with researchers to retrain the models. This collaborative effort should continue even after AI systems are operationalized through teamwork sharing of knowledge and solving problems together.

To properly protect your cyber environment, use Hornetsecurity Security Awareness Service to train your employees to become aware of AI threats and assist in securing your critical data.

To keep up to date with the latest articles and practices, pay a visit to our Hornetsecurity blog now.

Conclusion

The advancement of AI in a secure and morally sound manner is greatly dependent on the cybersecurity industry. Cybersecurity professionals may assist society benefit from AI while reducing the risks of its malevolent use by forming interdisciplinary alliances, creating domain-specific protections, and advocating standards. AI’s future rests on including security early in the design process rather than as an afterthought. The enormous promise of autonomous and intelligent technology can be realized with preventative measures in place.

FAQ

Do you think cybersecurity will be more or less critical in the future?

In the future, cybersecurity is set to become more crucial with the advancement of technology, especially when AI systems are being widely adopted across different fields, like healthcare and finance. The intricate nature and widespread use of AI technologies enhance the risks involved highlighting the need, for cybersecurity measures to safeguard information uphold privacy standards, and ensure the smooth running of AI processes. Consequently, cybersecurity will continue to gain significance as a component of advancements and societal well-being.

Why is AI important now, and why will it be necessary in the future?

AI holds importance in the times as it drives progress, effectiveness, and efficiency across a variety of sectors. It facilitates, in-depth data analysis, streamlines tasks enhances decision-making procedures, and enriches user interactions by tailoring experiences. In the field AI contributes to diagnosis and personalized treatment plans; within finance, it identifies activities and enhances trading tactics.

Looking ahead AI will be essential as it progresses and merges with technologies such as the Internet of Things (IoT). 5G. It will have a role in tackling global issues like climate change healthcare accessibility and resource management establishing itself as indispensable, for sustainable growth and economic prosperity.

What is the future of cybersecurity with AI?

The outlook, for cybersecurity with AI looks bright as AI is set to improve threat detection, response, and prevention. By processing volumes of data in time AI can spot patterns and irregularities that may indicate potential risks. This technology will enable defense strategies by automating responses to cyberattacks and reducing the need for intervention. Furthermore, AI-driven cybersecurity will continue to evolve to combat cyber threats providing stronger safeguards for systems and data. With the advancement of both AI and cyber threats AI-powered cybersecurity will play a role, in upholding security and resilience.

Artificial Intelligence Security: Defending Against Emerging Cyber Threats

Artificial Intelligence Security: Defending Against Emerging Cyber Threats

Artificial Intelligence (AI)

Artificial intelligence is the design of a computer, computer-controlled robots, or software that tries to replicate the human intellect. AI is developed through the study of brain cognition, which includes the distribution of knowledge, learning, and decision-making approaches to complex issues. Intelligence is linked to the absorption of fresh knowledge and its use in solving new complicated problems that in the future, intelligent robots may be able to complete several, if not all, of the tasks that people now do.

Artificial intelligence is the development and implementation of smart systems, computer programs, and computer equipment with a functionality equal to the human mind’s capacity. Computer science, psychology, and artificial intelligence are different. The difference between computer science and psychology is in an emphasis on perception, thought, and action, as opposed to psychology which concentrates on perception, thinking, and action on the other. This serves to enhance abilities by encouraging machine learning.

In recent years, artificial intelligence (AI) systems have grown exponentially, revolutionizing a wide range of applications and industries. The most recent research indicates that 35% of global companies use AI in their operations. Remarkably, 42% of businesses say they are investigating using AI in-house. In 2024, more than half of businesses intend to use AI technologies. This indicates that more than 77% of businesses are either utilizing AI or considering.

Enhancing Security by Using Advanced Artificial Intelligence

Increases in computing power, data ingestion, and storage have resulted in a rise in commercial and industrial applications of machine learning and artificial intelligence.

This deluge of data, feeds AI’s appetite because it makes it possible for it to examine and evaluate all it has learned to find new patterns and nuanced details. If new projects and issues are recognized and looked into as soon as possible this will result in more attacks being prevented. The work of security “experts” can focus on more high level, strategic tasks, leaving the AI systems to focus on spotting anomalies in large amounts of log data for example. Think about the team member with the most experience in security.

AI and machine learning algorithms may eventually one day surpass the intelligence of your top employees if you use it to train them. Your ten smartest employees can help you prepare machine learning and artificial intelligence programs, and the combined outcomes will be just as intelligent as they are.

Moreover, AI never needs to sleep, and it’s rapidly being developed.

Using AI for Cybersecurity

The diverse aspects of AI, such as deep learning and unsupervised learning, may be advantageous in several cybersecurity domains. Artificial intelligence (AI) can automatically analyze and fix vast volumes of potentially dangerous data and identify future problems. Regrettably, threat actors might infiltrate target systems via a backdoor using the same AI technologies that are used to secure systems.

A growing number of attacks are leveraging AI-powered technology, and malware is often altering its appearance to evade detection, and to complete their agenda, sharpen their attacks, they use machinery that can generate large quantities of malware. AI and malware might be used by hackers to assess the target company’s defenses and plan future attacks. Here are some examples of how AI could improve organization’s cyber security postures:

Human Error and Cybersecurity

Human error is a leading cause of cybersecurity failures. Despite a sizable IT workforce, managing system configurations efficiently remains challenging, especially with the rapid adoption of new technologies, teams handling network upgrades and maintenance often face overwhelming To Do lists. However, with assistance from AI and leveraging intelligent automation they can swiftly identify and resolve issues, providing timely support and recommendations.

Efficiency Challenges in Cybersecurity

Insufficient coordination among teams hampers efficiency, particularly in repetitive tasks like configuring endpoints. Manual interventions are often necessary due to misconfigurations or outdated settings, leading to delays and increased risks. AI-driven systems excel in promptly responding to evolving threats, maintaining vigilance even amid distractions that affect human beings.

New Threats Prediction and Identification

Detecting and predicting fresh cyber threats involves taking preventative measures. A potential solution is through machine learning whereby past attack patterns and behaviors are analyzed to flag possible risks. They assist in speeding up response time as well as increasing awareness about threats among security personnel.

The Value of Flexibility

Adaptability is vital to the efficacy of security. The progressing security needs and technology can be tricky and time-consuming for human teams to keep up with and may therefore result in delays and inefficiencies. Solutions based on artificial intelligence can provide the adaptability to effectively customize security measures to individual demands. Businesses can formulate customized security solutions to handle changing threats if they have access to enough data and have trained their algorithms.

Advantages of Artificial Intelligence in Cybersecurity

​The bottom line, the purpose of Artificial intelligence in cybersecurity is to develop a system that thinks and acts like humans, something that we’ve not achieved yet, and may not for quite some time. It is not a smooth transition to use AI-based solutions to solve a specific cybersecurity risk. Cybersecurity experts are typically not proficient with AI methods and their advantages. Because of this, the traditional method depends on human knowledge and manual labor until it is no longer sufficient. But when businesses do choose AI, they usually aim for and generally achieve the following advantages:

  • AI Learns More over Time. Self-learning artificial intelligence (AI) has the potential to improve network security in the long term. To detect and categorize network patterns, AI uses machine learning and deep learning algorithms. Then, it will keep an eye out for anything out of the norm in terms of security and take necessary action. These kinds of trends may assist in making the world a safer place in the future. Such dangers may be identified and eliminated in a timely way. Hackers are seldom successful against their intelligence since it is always evolving.
  • Artificial Intelligence Identifies Unknown Threats. There is a chance that no one individual can see every risk that their company confronts. Hackers may start an attack for a variety of causes and approaches. Unknown threats of this kind have the potential to inflict significant harm to a network. In terms of recognizing and mitigating previously unforeseen business threats from causing havoc, AI outperforms humans.
  • AI Can Handle a Lot of Data. Even when there is a large amount of data to analyze, artificial intelligence can detect potential hazards. Within and outside of an organization, people are always talking and exchanging ideas. This data must be protected against harmful humans and computer programs. However, cybersecurity specialists’ ability to evaluate all data for dangers is limited. In this circumstance, artificial intelligence is the most effective approach since it can identify any concealed threats in the traffic.

To properly protect your cyber environment, use Hornetsecurity Security Awareness Service to train your employees to become aware of AI threats and assist in securing your critical data.

To keep up to date with the latest articles and practices, pay a visit to our Hornetsecurity blog now.

Conclusion

The basic goal of artificial intelligence is “success,” whereas “accuracy” is secondary. The purpose of handling difficult issues is to find intuitive answers. Decisions are made automatically in a real-world AI application. It seeks the most optimal solution to a problem rather than merely the one that follows logically from the available facts.

Highly mobile systems, particularly in the sphere of cybersecurity, seldom incorporate autonomous systems. The bulk of AI concepts revolve on fully autonomous systems; however, it is doable, and there are currently AI systems in place that might aid or supplement our security services. Clearly, AI cannot interpret data as effectively as humans can, but despite efforts to shift the field toward more human-like frameworks, full artificial intelligence (AI) is still a long way off since it needs computers to apply abstract concepts in a range of situations.

Current Artificial Intelligence systems are not quite as sophisticated as some would have you believe in terms of creative and critical thinking, but it provides a great addition to your defenses.

FAQ

What are some examples of emerging cyber threats that artificial intelligence (AI) security systems can defend against?

A machine learning feature provided by an internal AI system might be used to identify trends in data that could be used to identify phishing websites. Data and metrics can assist the company in analyzing and evaluating these phishing attempts more thoroughly as the system learns. The program can recognize malicious intent and detect questionable behavior. If there is suspicious behavior, anti-phishing software can quickly shut down the network connection. It’s advisable to think about how your reports can influence analyses of lessons learned and counter-phishing techniques.

How does AI technology enhance the detection and response capabilities of cybersecurity defenses against evolving threats?

Threat detection systems that are paired with AI capabilities are well-known for their ability to minimize false positives. They can reliably differentiate between benign abnormalities and real threats by examining contextual data and behavioral patterns, freeing security staff to concentrate on critical alerts, thus saving a lot of time and effort.

What are the best practices and strategies for organizations to implement AI-driven security solutions effectively and protect against emerging cyber threats?

Although comprehensive implementation of security measures for all relevant attack vectors is necessary to avoid significant security gaps, best practices will change as the AI field and techniques evolve.

Conduct ongoing compromise assessments on all devices where privileged access is used or critical services are performed.

  • Harden and update the IT deployment environment.
  • Review the source of AI models and supply chain security.
  • Validate the AI system before deployment.
  • Enforce strict access controls and API security for the AI system, employing the concepts of least privilege and defense-in-depth.
AI in Cybersecurity: How Large Language Models Are Changing the Threat Landscape

AI in Cybersecurity: How Large Language Models Are Changing the Threat Landscape

Since late 2022, we’ve seen a dramatic rise of Large Language Models (LLMs) based AI in the form of ChatGPT (Generative Pre-trained Transformer) and its cousins. There’s been quite a lot written about how these tools will impact cyber security.

In Hornetsecurity’s 2024 survey, a staggering 45% of business leaders voiced concerns about AI exacerbating the threat landscape. This alarming trend mirrors the global rise of AI-driven malicious activities, with threat actors leveraging automation and sophistication to orchestrate attacks.

The UK’s National Cyber Security Centre (NCSC) has also noted a troubling consequence: AI is democratizing cybercrime, enabling even novice criminals to engage in sophisticated attacks previously reserved for seasoned adversaries.

It is difficult to ascertain with a high degree of certainty if malicious emails were created or enhanced by LLMs, primarily because if they’re good, they’ll look indistinguishable from a well (hand) crafted phishing email.

However, these are the areas where we know that LLMs are having an impact on cyber security:

Code quality: GitHub Copilot (and other similar tools) is showing some quite astonishing improvements in productivity for developers, both beginners and seasoned hands. While there are safeguards in place to stop these tools developing obvious malware they can be circumvented, so it’s very likely that malware developers are using these tools to crank out more malicious code faster.

Sophisticated phishing: Drafting and enhancing phishing and especially spear phishing emails. We have an example of one of these below, but it’s probable that criminals are using these tools to fine tune their wording to achieve maximum results. Again, various LLMs have safeguards in place to stop these sorts of malicious uses, but they can often be bypassed. There are also GPT tools that lack these safeguards, such as WormGPT and others. Hornetsecurity’s 2024 survey revealed that 3 in 5 businesses describe AI-enhanced phishing attacks as their top concern.

Translating attacks into other languages: Many Phishing and Business Email Compromise (BEC) defenses are tuned for English, having less success stopping attacks in other languages. There are also geographies around the world where phishing and BEC attacks have been uncommon up until now, making the average finance department worker less suspicious (Japan, other countries in East Asia, and Latin America comes to mind). Here, we’re likely to see a surge in attacks based on the ability to translate emails into near perfect prose, by attackers who aren’t fluent in the language, expanding their potential target pool manyfold.

Targeted research: To pull off a successful spear-phishing attack, or social engineering phone call attack on helpdesk staff, requires detailed understanding of a company, individuals that they’re impersonating and their relationship to others in the hierarchy. Traditionally this is often done through LinkedIn, company websites research and the like, but with the advent of LLM based search engines, this is changing. As you’ll see in our example below, AIs can help immensely with this task, and shorten the time investment required.

To demonstrate how easy it is to generate a phishing email through an LLM we decided to create our own. The following is an attack on Andy Syrewicze, a Technical Evangelist here at Hornetsecurity. Here is the initial research prompt and output:

The following is an attack on Andy Syrewicze, a Technical Evangelist here at Hornetsecurity

As you can see, a simple prompt provides a detailed breakdown of a social engineering strategy to target Andy drawing on his professional and personal online footprint. Something that would take far longer to achieve manually.

This is then followed up with a very convincing draft of a spear-phishing email for Andy.

This is then followed up with a very convincing draft of a spear-phishing email for Andy

The email generated here is of a much higher quality than the average phishing email and far more likely to succeed. The personalization of the references and context demonstrates how effective AI tools such as LLMs can be in crafting targeted spear-phishing attacks.

Why We Fall for Scams

A thorough investigation of social engineering and hacking human psychology is a topic for an entire book on its own, here we’ll just focus on the highlights to bring an understanding of the basic characteristics that make us so susceptible.

A well-crafted phishing email has the following characteristics:

  • It’ll blend in and be part of the normal communication flow. We’re used to receiving emails about a parcel delivery, or a notification from our bank, or a reminder from our boss, so a fake email with the same characteristics is less likely to raise our suspicions. It has the right logos, structure, format, and it looks like the expected sender so we’re more likely to take the requested action.
  • It’ll appeal to our emotions. The most important part of any social engineering endeavor is to bypass the cold, logical thinking part of our mind (Cerebrum), and activate the emotions and the “fight or flight” center (Amygdala) so that we take actions we wouldn’t normally contemplate. Some approaches will appeal to greed / reward (“click here for free tickets”), some to shame / embarrassment (“I’ve got video recordings of what you did last night”), or fear / dread (“I need you to transfer this amount now or you’ll be fired”). The most common appeal is urgency; when something needs to be done “right now”, we tend to skip past our normal, suspicious questions and just get it done, often to avoid feeling the uncomfortable emotions mentioned any longer.
  • It’ll have a requested action that’s not too unusual. Examples include providing personal details to your “bank”, something we remember having to do when opening an account in a new bank or resetting our network password by clicking a link and being presented with a normal looking sign-in page.

The whole effect of an effective phishing lure is short-circuiting our questioning rational mind by invoking emotions and urgency and providing an easy way to “fix the issue” quickly.

This leads us neatly to the next step – the importance of security awareness training for all your users.

User Training is Crucial

This cannot be understated; you cannot build a cyber-resilient organization without involving every single person who works there. This starts with the basic awareness of asking someone unknown who isn’t wearing a badge in the office to identify themselves, and if the answer doesn’t stack up, calling security.

When someone calls you claiming to be from the IT helpdesk and asks you to approve the MFA prompt you’re about to receive on your phone, don’t assume they’re telling the truth. Always double-check their credentials first to ensure that it’s a legitimate request.

What you’re trying to foster is “polite paranoia”, making it normal to question unusual requests, and understanding the risk landscape and sharpening instincts. Most people who work in businesses aren’t cyber or IT savvy and weren’t hired for those skills. However, everyone needs to have a basic understanding of how identity theft works in our modern digital world, both in their personal and professional lives.

They also need to have a grasp of the business risks introduced by digital processes, including emails.

By having this context they’ll be able to understand when things are out of context or unusual and have enough suspicion to ask a question or two before clicking the link, wiring the funds, or approving the MFA prompt.

And this isn’t a once-off tick on a form to achieve compliance with a regulation.

Often, the long, tedious, and mandatory presentations that organizations conduct once a year or quarterly, followed by multiple-choice quizzes, are perceived as time-wasters by the staff. They want to rush through them quickly and typically forget any insights gained.

Instead, the training program should be designed to be ongoing, consisting of bite-sized, interesting, immediately applicable, and fun training modules combined with simulated phishing attacks to test users. If any user clicks on a phishing email, they should be given additional training.

Over time, the system should automatically identify users who rarely fall for such attacks and interrupt them with infrequent training, while the persistent offenders are given additional training and simulations on a regular basis.

The other reason for ongoing training is that the risk landscape is continuously changing. Some months ago, malicious emails with QR (Quick Response) codes to scan were the exception, now they’re a very familiar sight, requiring ongoing awareness of staff not to scan them on their phones (outside of established business processes).

Security experts often lament the priorities of staff, saying, “if they only took a second to read the email properly, they’d spot the signs that it’s phishing”, or “they just don’t take security seriously”.

This is a fundamental misunderstanding of the priorities and psychology of the average office worker, clicking a link in an email will at most get you a slap on the wrist, not fulfilling an urgent request by the boss can get you in serious trouble or even fired.

And this is why the entire leadership, from middle managers all the way to the C-suite must lead by example. If they do and communicate their understanding of the basics and secure processes, staff will follow suit.

But if the CFO requests an exemption from MFA or bypasses security controls regularly because “it’s more efficient”, there’s no chance that his underlings will take cyber security seriously.

A Day in the Life at Cyber Resilient Inc.

What does it look like at an organization that has embraced this approach? First of all, no one fears speaking up or asking “silly questions” about weird emails or strange phone calls. If there is an incident and someone clicks something they shouldn’t have, there’s no blaming and accusations, it’s not personal, there was a failure of a process.

This brings a strong sense of psychological safety, an important foundation for cyber resiliency.

Transparency is promoted from the leadership all the way throughout the organization. Understanding that we’re all human, we’re “all in this together” and being upfront about making mistakes, without fear of retribution, will improve the cyber resiliency culture.

Talking about new cyber risks and exploring not just business risks but also the risks in people’s personal lives is another strong result of a good security culture.

Our working and personal lives are blended like never before, with people sending and receiving emails from their personal devices, sometimes even working from their personal laptops (BYOD), which means that the risks to the business aren’t confined to corporate assets and networks.

Compromises of users’ personal identities can be used by criminals to then pivot to compromise business identities and systems.

Looking at it in the mirror – in an organization where cyber resiliency isn’t valued, staff will be fearful of making mistakes and be unsure what processes to follow if they think they might have made one. Individuals are blamed when incidents do occur, ensuring that any future issues are swept under the rug to avoid the same fate.

And staff don’t understand IT, they don’t understand the risk landscape and they routinely put the organization at risk because of this lack of understanding.

Implementing Security Awareness Service

As mentioned, it’s important that security awareness training is incorporated into the work life of your users, it can’t be something that’s done once every six or twelve months. Hornetsecurity’s Security Awareness Service was designed with exactly this in mind, providing short video trainings, coupled with spear phishing simulations.

But overworked IT teams also don’t want to spend a lot of time on scheduling training and simulations, so it incorporates the Employee Security Index (ESI) which measures each user’s (and group, department) likelihood to fall for targeted, simulated, attacks.

This is mostly hands-off for the administrators, so the users who need extra training and tests receive it, whereas staff with already sharp instincts are tested less frequently. You can also track ESI over time and see the forecast for it.

Employee Security Index dashboard

Employee Security Index dashboard

There’s also a gamification aspect where users can compare themselves to others, which creates a strong incentive to be more cautious and sharpen instincts. The training material is available in multiple languages.

Another benefit of the Security Awareness Service is the statistics, it gives the security teams and business leaders data to understand the current risk profile of their staff, and where boosts of extra training might need to be deployed.

Enhance employee awareness and safeguard critical data by leveraging Hornetsecurity’s Security Awareness Service for comprehensive cyber threat education and protection.

We work hard perpetually to give our customers confidence in their Spam & Malware Protection and Advanced Threat Protection strategies.

Discover the latest in cybersecurity: How to Spot a Phishing Email in The Age of AI. Learn how AI fuels sophisticated phishing attacks and gain actionable insights to protect your business.

To keep up to date with the latest articles and practices, pay a visit to our Hornetsecurity blog now.

Conclusion

Everyone in business today is somewhat aware of the risks of cyber-attacks, phishing messages, and identity theft. It’s essential for businesses to recognize that cybersecurity threats are constantly evolving, especially in the age of AI.

Threat actors are leveraging AI tools to create sophisticated phishing attacks that can lead employees to click on malicious links or disclose sensitive information. The phishing samples we’ve shared should serve as a good source for communicating the signs of scam emails to your staff.

FAQ

How are Large Language Models (LLMs) impacting cybersecurity?

LLMs, such as ChatGPT, have significantly altered the threat landscape by enabling automation and sophistication in malicious activities. They’ve democratized cybercrime, allowing even novice criminals to conduct sophisticated attacks. Specifically, LLMs are enhancing code quality, refining phishing emails, translating attacks into multiple languages, and facilitating targeted research for social engineering attacks.

What characteristics make phishing emails successful?

Successful phishing emails blend seamlessly into normal communication flows, evoke emotions such as greed, shame, or fear, and prompt urgent actions. They mimic the appearance of legitimate messages, utilize familiar logos and formats, and contain requests that seem plausible, like providing personal details or clicking on links.

How can organizations improve their cyber resilience?

Organizations can enhance cyber resilience through comprehensive user training, which fosters a culture of “polite paranoia” and encourages questioning unusual requests. Continuous, engaging, and practical training modules combined with simulated phishing attacks help users recognize and respond to threats effectively. Leadership plays a crucial role in setting the tone for security awareness and adherence to secure processes throughout the organization.

How to Mitigate IT Security Risks: Best Practices for Effective Risk Management

How to Mitigate IT Security Risks: Best Practices for Effective Risk Management

Do you work in Cybersecurity? Guess what – your job is actually risk management. Is your role in general IT, or in sales, marketing, HR or management? Guess what – your job isn’t risk management, but a part of your role should be dedicated to risk management.

Why, you ask? The answer is that all cyber security work is about risk management and risk mitigation, and this is everyone’s responsibility – not just the security team.

In this article we’ll look at how you can manage IT security risks in your organization, how to develop a risk management plan to strategically prepare for and think about cyber risks and why this is a better approach than throwing money and new software solutions at the problem.

Cyber security risk management

Cyber security risk management (Adobe Firefly AI)

Flavors of Risks

In some ways cyber security risk is just like any other risk that businesses must factor in – geopolitical risks, natural disasters, supply chain challenges, regulation, and compliance risks and so forth.

This is important, because when you communicate with leadership in your organization, framing it in risk terms will yield much better results than using geek speak. On the other hand, cyber security risks can be very different to other risks as they’re often harder to quantify.

One way this can be seen is in cyber security insurance. Only a few years ago, this was a simple exercise (at least in smaller businesses) where you answered a limited number of questions around your security posture and were given insurance at a relatively low premium.

However, half a decade of “big game hunting” ransomware attacks with payouts in the millions have changed the insurance game considerably. Now, the questionnaire is much more comprehensive, and the premiums are much larger, with more exclusions and limitations– with some insurers even exiting the market.

The reason is that there’s not enough stable statistics for insurers to really work out the actual risk – compared to say the risk of a fire in an office building, or an earthquake in a particular area.

They have many decades of statistics in those areas to base their modelling on – whereas cyber security is such a rapidly changing landscape, where even organization with mature security practises and strong cyber hygiene still become victims of the criminals.

The best way for a business to tackle this problem is to develop a risk management plan and keep it alive with regular updates.

Four Steps to a Plan

There are various frameworks you can base your plan on – and depending on which country or countries your business operates in, as well as the demands in regulatory frameworks that you must comply with, you might be locked into a particular one. Here we’re going to use NIST 800-30 to base the discussion on.

It’s got four steps:

  1. Prepare for Assessment
  2. Conduct Assessment
  3. Communicate Results
  4. Maintain Assessment

We’re going to focus on step 2 which has five tasks:

  1. Identify Threat Sources and Events
  2. Identify Vulnerabilities and Predisposing Conditions
  3. Determine Likelihood of Occurrence
  4. Determine Magnitude of Impact
  5. Determine Risk

In other words, start by identifying threats which are circumstances or event that could potentially impact an organization’s operations.

Then you look at vulnerabilities which are weaknesses in a system, security procedure or implementation that a threat can exploit (think broader than just software bug vulnerabilities). And, since no organization is an island as we’ve learnt over the last few years of supply chain attacks, a vulnerability in a supplier or vendors system can impact your business.

When you combine the threats with the vulnerability you can then assess the consequences, if this threat takes advantage of this vulnerability, what will the consequence be?

Making a cyber risk management plan

Making a cyber risk management plan (Adobe Firefly AI)

In concrete terms, identify all your assets and prioritize them based on importance to the business. Then find all (known) vulnerabilities and threats in your environment. Apply security controls to mitigate vulnerabilities, based on the priority of the affected assets.

Then determine the likelihood of a threat event occurring and estimate the potential consequences. This is then a matrix of all the risks that you can use to prioritize and manage risk decisions and responses.

Three things to note here – first it’s really easy to write a paragraph like this, it’s a whole different ballgame to actually do it – particularly in a large business.

Secondly – identifying all vulnerabilities is impossible because there are so many that you don’t know about.

But the point is that you have to start somewhere, if you don’t bother to identify the known vulnerabilities, just because there are ones you don’t know about yet, you won’t get a version 1 of the plan, that you can then iterate on as more information comes to light.

And thirdly, this whole exercise isn’t something the IT department, or the security team can do on their own – this takes involvement by representatives from the whole organization, who’ll each have a view of the risks, vulnerabilities, and threats to their part of the business process.

Risk Mitigation

Now that you have identified, prioritized, and assessed the risks, it’s time to start looking at the appropriate controls to mitigate these risks.

These range from low-tech approaches such as if the accounting department receives an email notification about a change of bank account details from a supplier, they follow up with a phone call to verify this (to a known phone number, not the one supplied in the potentially fraudulent email).

To address security flaws in systems and applications, apply patches as soon as possible, based on the business priority of the asset.

And to mitigate identity-based attacks, ensure that users are logging in using strong authentication such as MFA, and move towards phishing resistant systems such as Windows Hello for Business, Passkeys and FIDO 2 hardware keys.

There are many other risk mitigation approaches: to stop inadvertent data sharing, use a Data Loss Prevention tool, to maintain data governance use an Information Protection tool, to manage the risks from staff (either inadvertent or intentional) apply an Insider Risk process and tool, to minimize the risks from malicious emails use a strong email hygiene solution, and for times when these controls fail, ensure continuous Security Awareness training.

If you need to reign in data sharing, in general or if you’re preparing to roll out Copilot for Microsoft 365, use a good data governance tool.

Remember, this isn’t about new shiny tools that’ll solve all your security problems, it’s about having a plan, with both identified and prioritized risks and building mitigations to the risks just like you do in any other area of your business.

Fire is a risk in an office building, so you mitigate the risk by installing smoke detectors, fire extinguishers, and train your users with evacuation drills.

However, if you have a plant with flammable chemicals, the risk mitigation will include additional systems to minimize the risk. In the same way you must have baseline security controls to mitigate “normal” cyber risks, but more stringent controls for administrative accounts or Domain Controllers.

When calculating the potential monetary damage to your business don’t forget to include operational costs (time and effort to restore systems), perhaps the cost of the ransom itself if that’s the attacks and you do decide to pay, but also fines for non-compliance with regulations.

There’s the cost of loss of clients or potential new sales that won’t be realised, and the overall loss of trust which can be hard to quantify.

The plan is only version 1.0 once you have it in place – it’ll require continuous maintenance (quarterly reviews?) as vendors and suppliers change, IT systems are updated and changed, regulations are altered and the security landscape itself changes (daily).

Remember that there will be some risks that you can’t fully mitigate, at least not without investments far beyond the actual business value of the vulnerable assets, and these risks must be documented and accepted.

Enhance employee awareness and safeguard critical data by leveraging Hornetsecurity’s Security Awareness Service for comprehensive cyber threat education and protection.

To keep up to date with the latest articles and practices, pay a visit to our Hornetsecurity blog now.

Conclusion

The relentless attacks of cyber criminals, increasing every year is a reality that every business must face. Otherwise, you’re likely to get an “unscheduled, post-paid penetration test” by an attacker who’ll bring it to yours (and the entire C-suite’s) attention.

Businesses, small and large, must build their cyber security risk management on a plan, which considers the risk landscape, as well as your infrastructure, applications, users and other assets and their business priority.

With that plan, regularly updated, you have a much better chance to identify the biggest risks, mitigate them as best you can, and keep iterating to improve your cyber security posture.

FAQ

What is the IT risk management process?

The steps are identify threats, combine these with vulnerabilities in systems and processes and then calculate the consequences if a threat is attacking a vulnerability. Combine this with an inventory of all assets, to form a list of all the cyber risks to the business, which then is prioritized based on the business impact of each risk. This forms the basis of your cyber risk management.

Why is it important for companies to use risk management as part of their security plan?

If you don’t know what you have, and what the risks are to those assets, you won’t know which risks have the highest priority and your cyber defences will be haphazard at best. With a solid plan, you can implement risk mitigations in a calculated manner to achieve the best protection with the available resources.

What are the biggest IT Security risks?

Cyber risks come in many forms, most of them focus on your data as the goal. Ransomware encrypts your data to get you to pay to get access to it back, industrial espionage steals your Intellectual Property to achieve an unfair advantage, and Business Email Compromise attacks seeks to subvert your processes to steal your money.

Cyber Kill Chain vs. MITRE ATT&CK: An Insightful Comparison

Cyber Kill Chain vs. MITRE ATT&CK: An Insightful Comparison

There are two challenges we in cybersecurity face when it comes to communicating what we do the rest of the business (and the rest of the world). For many people, computers, networks, and Information Technology in general are opaque, and most businesspeople know how to use tech to get their job done, but not how it works “under the hood”. Hacking that technology to subvert it for malicious purposes is another level of mystery.

Hollywood doesn’t help much either, with most on-screen depiction of hacking in movies and TV shows being radically different from reality (with the exception perhaps of Mr Robot).

The first challenge is communicating the technology and basic understanding of how it works to then show how it can be misused. But the second challenge is then imparting how the criminals carry out their attacks. Most people think a hack is just a single “thing” that happened – “we got hacked” and then all the bad stuff happened, when it’s actually a set of steps.

In this article we’ll look at two different frameworks that are used to communicate hacking processes, both to the wider business and within the cyber security community – the Cyber Kill Chain, and the MITRE ATT&CK framework. We’ll look at the advantages and challenges of each of them, how they compare and how you can use them to fortify your organization’s cyber defenses.

Meet the Cyber Kill Chain

This is the older of the two approaches, having its roots in military kill chains such as the Four F’s from the US military during World War II: Find the Enemy, Fix the enemy, Fight the enemy and Finish the enemy. A more modern version is F2T2EA: Find, Fix, Track, Target, Engage and Assess; it’s called a chain because an interruption at any step can stop the whole process.

Kill Chain Attack

Cyber Kill Chain

Not surprisingly, it was Lockheed Martin, a large military manufacturer in the US that took this chain approach and transformed it into the Cyber Kill Chain, with seven steps (and a very different result at the end compared to the literal kill chains mentioned above).

  1. Reconnaissance
  2. Weaponization
  3. Delivery
  4. Exploitation
  5. Installation
  6. Command and Control (often shortened to C2)
  7. Actions on objectives

As a communication tool for showing business leaders that there are steps in an attack, and that you want budget to interrupt or make each layer more difficult for the criminals, this is a good approach.

Cyber security after all always comes down to business risk. When you put it those terms, the CEO, CFO, and the board are more likely to pay attention. If you start talking about technical details, you’ll soon lose them, but business risk is something they’re used to dealing with, and cyber-attacks is just one of the many risks businesses faces.

Be aware that attackers may not perform every step, depending on their goals, their target, and any changes along the way, and that “attackers” might refer to different sets of people, where the early steps might be performed by an Initial Access Broker (IAB), who then sells the access to another group to actually run the ransomware and negotiate the payment.

In step one the attackers will gather information about your company and any employees of interest. This could be cursory, if they’re simply after a company with enough turnover to pay the ransom they might look at your financials, and who to target with their spear phishing emails.

It could also be more in-depth, when the scattered spider group went after the helpdesk at the MGM casino, they knew a great deal about the staff they were impersonating to ensure that the helpdesk would help them reset their credentials.

Phase two is taking advantage of the reconnaissance, to start exploiting a found weakness or packaging a payload, whereas step three is delivering the malicious bundle to the victims, via email, web etc.

Once the initial foothold has been established (someone clicked the link in a malicious email for example), step four starts the exploit to run code on the victims system, which may then continue with step five, further installations on other systems. This is often called lateral movement, as the attackers continue exploiting systems in your networks, to gain full Domain access.

They’ll also establish persistence (so they can come back in if you’re trying to expel them from your environment) and Command and Control (C2) in step six for covert communication with their external control systems. The final step, seven, involves the attackers springing their trap and encrypting all your files, after having corrupted your backup systems or perhaps exfiltrating all your sensitive data (or both).

The ”other side” of the cyber kill chain are the defensive actions your organization should take to deal with each phase:

  1. Detect – having sensors throughout your environment that trip when an attacker is present.
  2. Deny – control access and prevent information leakage.
  3. Disrupt – malicious processes and outgoing traffic to the attacker’s infrastructure.
  4. Degrade – means counter attacking the attackers C2 systems.
  5. Deceive – is about interfering with the C2 infrastructure.
  6. Contain – using network segmentation so that a single breached system or identity doesn’t have full access to every other system on the network.

This approach does have its detractors but as a conversation to start looking at different phases of an attack, whether your organization has security controls in place to detect it, disrupt it and contain it, it’s a good start. It also leads neatly in the modern approach of Zero Trust:

  1. Assume breach – work on the assumption that attackers will gain access and work on detecting it, containing it, and disrupting it.
  2. Verify explicitly – authenticate and authorize both human and workload identities at each access point in the infrastructure.
  3. Use least-privilege access – only grant identities access to the systems, data, and applications they need to do their job.

The challenges with the cyber kill chain is that it doesn’t work well for insider risks, the first couple of steps happen outside of the defenders control (unless you stop all staff from having LinkedIn profiles and posting anything, anywhere online) and it’s also quite focused on malware, some attackers now use Living Off the Land methods, only using built in administrative utilities in the systems, thereby often avoiding detection.

The MITRE ATT&CK Framework

MITRE is a not-for-profit company that works for the common good in the areas of security writ large, but for this conversation we’ll focus on their enterprise matrix (there’s also one for Mobile and one for Industrial Control Systems, ICS). The weird acronym comes from Adversarial Tactics, Techniques and Common Knowledge and it was initially released in 2013.

ATT&CK framework matrix

ATT&CK framework matrix

There are 14 tactics (the “why” of the attack):

  1. Reconnaissance
  2. Resource Development
  3. Initial Access
  4. Execution
  5. Persistence
  6. Privilege Escalation
  7. Defense Evasion
  8. Credential Access
  9. Discovery
  10. Lateral Movement
  11. Collection
  12. Command and Control
  13. Exfiltration
  14. Impact

And each of them has Techniques (and sub-techniques), the “how” of an adversary, so while you can see some overlap with the simpler cyber kill chain in the list above, this is much more comprehensive. I like to think of it as a common language we in the cyber security industry can use to communicate about different attack techniques. There’s also tracking of 143 threat groups and which Tactics, Techniques and Procedures (TTPs) they use.

As you can appreciate the matrix encapsulates all the different techniques, making this a tool to ensure that you’ve got coverage “across the board” in your cyber security strategy. Here’s an example from one client, using the Microsoft Sentinel SIEM, and the analytics rule detection coverage across the techniques.

MITRE ATT&CK Technique Detection Coverage in a SIEM

MITRE ATT&CK Technique Detection Coverage in a SIEM

Each Technique is described in detail, here’s T1563, Remote Service Session Hijacking, in the Lateral Movement Tactic, which has two sub-techniques (SSH Hijacking and RDP Hijacking) as an example. It has four mitigations that you can implement, and four detections that you can use to alert you if this is happening on your network. Most techniques also list Procedures which are the actual technical tasks applying that technique to a specific application or operating system.

Technique T1563 Remote Service Session Hijacking

Technique T1563 Remote Service Session Hijacking

While the matrix is very useful, it can be overwhelming with so many techniques and procedures. It’s also important to avoid thinking of the matrix as a long list of mitigations / detections – even if you have a “tick in every box”, for every technique you can still be compromised. Remember – “Attackers think in graphs, defenders think in lists” (John Lambert), so just implementing long lists of security controls isn’t the right approach, instead use MITRE ATT&CK with the context of your business priorities and unique network environment to build cyber resilience.

Comparing the Cyber Kill Chain and MITRE ATT&CK

The two are related in that they describe the steps in different cyber-attacks, but they have different aims. The cyber kill chain is more generic and is an excellent introduction to the idea of hacking occurring in stages, and it’s a chain that you can interrupt with security controls. I find it very useful when communicating with non-IT and non-security people in business to get that basic understanding of the phases and how it works.

The ATT&CK matrix on the other hand is overwhelming for a non-technical audience (there are over 200 techniques) but is an excellent tool for understanding the technical steps attackers can take during a breach. And it can be used as a tool for evaluating coverage across the entire spectrum – “do we have detections for every technique in every tactic”, whilst not losing sight of the fact that even if you do, you may still be compromised.

It’s also interesting to see how these two fit into the larger landscape of regulatory framework that mandate certain cyber security controls, and other approaches such as the Center for Internet Security (CIS) benchmarks. CIS offers benchmarks for different operating systems, SaaS cloud services (including Microsoft 365) and IaaS / PaaS cloud platforms, and much more, for free.

These cover all the controls that you should implement as a baseline for security controls for that particular technology. Microsoft offers CIS benchmarks for both Azure and Microsoft 365 in their Compliance Manager app. And the upside is that if you implement all these controls you’ll have covered most, if not all, of the MITRE ATT&CK techniques.

Enhance employee awareness and safeguard critical data by leveraging Hornetsecurity’s Security Awareness Service for comprehensive cyber threat education and protection.

To keep up to date with the latest articles and practices, pay a visit to our Hornetsecurity blog now.

Conclusion

For beginners in cyber security, I recommend studying the MITRE ATT&CK framework, it’s like a common language for talking about different types of attacks.

I warmly recommend the free courses offered by AttackIQ, they’ve got one on Threat-Informed Defense which goes in detail on the MITRE ATT&CK framework. And use the Cyber Kill Chain phases when talking to the rest of the business.

Both have their place and are useful in their own right in helping you build a more cyber-resilient business.

FAQ

What is the main difference between MITRE ATT&CK and Cyber Kill Chain?

The Cyber Kill Chain in a useful communications tool when conveying cyber security concepts to non-technical people, and a basis for an overall IT security strategy for a business. MITRE ATT&CK on the other hand exhaustively lists every attack technique, grouped by tactics, and mapped to different threat actors, allowing an organization to identify detection gaps.

What are the types of a cyber kill chain?

There are a few different versions of the Cyber Kill Chain, FireEye (now part of Mandiant, which is now part of Google) proposed their variant which also has seven steps but which focuses more on the persistence of threats, whereas the Unified Kill Chain has 18 unique phases and attempts to marry the best of the original Cyber Kill Chain and MITRE ATT&CK.

What are the types of MITRE frameworks?

Generally, when people mention MITRE ATT&CK they’re referring to the enterprise matrix, but there’s also one for Mobile and one for ICS. Furthermore, there’s the D3FEND matrix of cybersecurity countermeasures which is sort of the other side of the attack techniques, all the different controls that an organization can implement to mitigate the attacks outlined in ATT&CK.