February 23, 2024

Cyber consultants from the SANS Institute have revealed the 5 most harmful new assault methods being utilized by attackers together with cyber criminals and nation-state actors. They have been offered in a session on the RSA Convention in San Francisco, the place a panel of SANS analysts explored rising Ways, Strategies, and Procedures (TTPs) and suggested organizations on easy methods to put together for them.

The SANS Institute is a number one cybersecurity coaching, certifications, levels, and sources firm that goals to empower cybersecurity professionals with sensible expertise and information.

The session, titled The Five Most Dangerous New Attack Techniques, featured 4 distinguished SANS panelists to supply actionable insights to assist safety leaders perceive and keep forward of evolving threats. The 5 rising cyber-attack vectors the audio system lined have been adversarial AI, ChatGPT-powered social engineering, third-party developer, website positioning, and paid promoting assaults.

Adversarial AI assaults

With adversarial AI assaults, risk actors are manipulating AI instruments to amplify the rate of ransomware campaigns and determine zero-day vulnerabilities inside advanced software program, mentioned Stephen Sims, SANS fellow and offensive cyber operations curriculum lead. From streamlining malware coding processes to democratizing social engineering, adversarial AI has modified the sport for attackers, he added. In response, organizations have to deploy an built-in defense-in-depth safety mannequin that gives layered protections, automates crucial detection and response actions, and facilitates efficient incident-handling processes.

ChatGPT-powered social engineering

As for ChatGPT-powered social engineering, risk actors are leveraging generative AI to take advantage of human threat – focusing on the vulnerabilities of particular person workers to breach their extensive group’s community, together with their households, in response to Heather Mahalik, SANS fellow.

This growth signifies that customers are actually extra simply attackable than ever, and all it takes is one unsuitable click on on a malicious file to place not solely a whole firm at rapid threat, however the sufferer’s livelihood as properly, Mahalik mentioned. This widened assault floor requires organizations to foster a tradition of cyber vigilance throughout each material of their enterprise to make sure workers are cognizant of ChatGPT-related assaults.

Third-party developer assaults

The following most harmful assault method explored was third-party developer assaults (often known as software program provide chain assaults) mainly an increase of focused assaults on third-party software program builders to infiltrate enterprise networks by way of the provision chain, mentioned Dr. Johannes Ullrich, SANS Expertise Institute school dean of analysis. This performed out considerably within the 2022 LastPass breach, the place a risk actor exploited third-party software program vulnerabilities to bypass present controls and entry privileged environments. For organizations throughout sectors, the assault underscored the criticality of successfully working in tandem with software program builders to align safety architectures, share risk intelligence, and navigate evolving assault methods, Ullrich mentioned.

website positioning assaults and paid promoting assaults

website positioning assaults are one other harmful, rising assault technique, as are paid promoting assaults, mentioned Katie Nickels, SANS licensed teacher. New website positioning and promoting assaults (additionally known as malvertising) are leveraging elementary advertising methods to realize preliminary entry to enterprise networks, in response to Nickels. In these situations, risk actors are exploiting website positioning key phrases and paid commercials to trick victims into participating spoofed web sites, downloading malicious recordsdata, and permitting distant person entry.

These assaults signify proactiveness on behalf of malicious attackers, who’re more and more pivoting away from conventional assault methods which have turn out to be simpler to defend in opposition to, Nickels mentioned. These two assault vectors heighten the significance of incorporating scalable person consciousness coaching applications tailor-made to new threats.

Copyright © 2023 IDG Communications, Inc.