Forecasts of experts Fortinet on the risks of it in 2018 year

Over the next few years we will witness the development space of cyber-attacks, while reducing the visibility and control over the IT infrastructure. The universality of the devices connected to the network, that access to personal and financial data-the army of IoT devices and critical infrastructure used in cars, homes, offices and smart cities – and a growing network of reciprocal connections, open up new opportunities for criminals.

Experts of the laboratory of Fortinet's FortiGuard Labs presented strategies and methods that will be used by cyber criminals in the near future and demonstrate the potential impact of cyber-attacks on the global economy.

Increase in samouczących network hivenet and swarmbots

Based on sophisticated attacks, such as Hajime and Devil's Ivy or Reaper, you can provide that cybercriminals will replace the smart devices infected clusters botnets called hivenetami, to open more effective vectors of attack.

Hivenety use the self-learning method to effectively reach out to vulnerable systems on an unprecedented scale. They will be able to communicate with each other and take action based on the analysis of locally collected data. Hivenety will grow exponentially, which will increase their ability to simultaneously attack the many victims and much more difficult to take przeciwdziałań.

Laboratory of Fortinet's FortiGuard Labs reported this year, 2.9 billion attempts communication botnetowej only in one quarter.

Ransomware is big business

Although with new types of software, such as. ransomworm, the number of attacks has increased over the last year in the ransomware until 35 times, you do not believe that this is the last word of digital wyłudzaczy. The next big target for this type of attack will likely cloud service provider.

Complex network hyperlinking, that make up the service provider in clouds, can result in the fact that a single point of failure touches hundreds of companies, Government, health care organizations and critical infrastructure. Cyber criminals will combine the technology of artificial intelligence with multidimensional attack methods to scan, detect and exploit the weaknesses of the cloud provider.

Polymorphic malware, next generation

If not next year, then soon after, start seeing malware created entirely by machines based on automatic detection of vulnerabilities and complex data analysis. Polymorphic malware is not new, but changes to a different face. Through the use of artificial intelligence, will create a new, sophisticated code that machine using the procedures will be able to learn how to avoid detection.

Thanks to the evolution of existing tools, criminals will be able to develop the best possible exploit based on the characteristics of each unique weakness. Malicious software is no longer able to use models of learning, to bypass security, and thus, can produce more than a million varieties of the virus during the course of the day. So far everything is just based on the algorithm, which limits the level of sophistication and control over the result.

Experts have found Fortinet 62 millions of malicious programs in one quarter of 2017, among them 16 582 variants derived from 2 534 families of malware. In turn, 20% of States that has experienced malware activity that targets mobile devices. Increased automation of malicious software will make these statistics will become even more worrisome in the coming year.

Critical infrastructure to the foreground

Due to the strategic and economic issues, suppliers and users of critical infrastructure are still in the first position of the list of most threatened attacks. These organisations networks that protect important services and information. However, the most critical infrastructure and operational technological networks are fragile because they were originally designed as tight and insulated.

The expectation of rapid response to the needs of workers and consumers began to change requirements to these networks, fueling the need for advanced security in them. Given the importance of these networks and the potential devastating results of their violations, critical infrastructure providers have joined the race to digital government organisations crime, arms and terrorism.

New services that use the automation offered by cyber criminals and Darkweb

Along with the changes in cyberprzestępczym underworld, evolves also Darkweb. It can be expected that soon we will see new offers in CaaS model (Cybercrime-as-a-service) from Darkwebu, because now we see there advanced services, using machine learning.

For example, a service known as FUD (Fully Undetectable) is now part of the several offers. It allows developers to dealing with cybercrime to check whether their attacks and malware will be detected by security tools from different vendors.

In addition, as part of the service increased is the uptake of machine learning, which you can use to modify and increase the effectiveness of the present code.

Confront threats

Thanks to the progress in the field of automation and artificial intelligence there is opportunity for enterprising cyber criminals to use the right tools for a serious breach of the digital economy. Security solutions must be in response built around integrated security technology, useful information about threats and dynamically configurable security systems.

Protection should act quickly by automating responses, as well as using intelligence and self-learning, so the network can take effective and autonomous decisions. This will not only increase the visibility of and centralize control, but also will enable strategic segmentation, a better level of security. In addition, basic safety procedures must become part of the protection policy. It is still often overlooked, but the key to reduce the consequences of cyber-attacks.

Learn more about our offer

If you sell security solutions, are a distributor, authorized partner or developer and would like to share your portfolio with a group of potential customers, advertise an event, software, hardware or other services on AVLab - simply write to us. Or maybe you had to deal with ransomware? We can also help you decrypt your files.
Read more

We use Google Cloud Translation and Gengo API’s to translate articles with exception of our comparative tests.