Data and securityCyber SecurityMcAfee reveals cybersecurity predictions for 2018

McAfee reveals cybersecurity predictions for 2018

McAfee has released details of five key cybersecurity threat trends to watch in 2018

McAfee has released details of five key cybersecurity threat trends to watch in 2018.

The list this year focuses on the evolution of ransomware from traditional to new applications, the cybersecurity implications of serverless apps, the consumer privacy implications of organisations monitoring consumers in their own homes and the emergence of a machine learning innovation race between defenders and adversaries.

“The evolution of ransomware in 2017 should remind us of how aggressively a threat can reinvent itself as attackers dramatically innovate and adjust to the successful efforts of defenders,” said Steve Grobman, Chief Technology Officer for McAfee, LLC.

“We must recognise that although technologies such as machine learning, deep learning, and artificial intelligence will be cornerstones of tomorrow’s cyber defences, our adversaries are working just as furiously to implement and innovate around them. As is so often the case in cybersecurity, human intelligence amplified by technology will be the winning factor in the ‘arms race’ between attackers and defenders.”

The report reflects the informed opinions of dozens of McAfee thought leaders from McAfee Labs, McAfee Advanced Threat Research, and members of McAfee’s Office of the CTO. It examines current trends in cybercrime and IT evolution, and anticipates what the future may hold for organizations working to take advantage of new technologies to both advance their businesses and provide better security protection:

1. An adversarial machine learning “arms race” will develop between defenders and attackers.

Machine learning can process massive quantities of data and perform operations at great scale to detect and correct known vulnerabilities, suspicious behaviour, and zero-day attacks. But adversaries will certainly employ machine learning themselves to support their attacks, learning from defensive responses, seeking to disrupt detection models, and exploiting newly discovered vulnerabilities faster than defenders can patch them.

To win this arms race, organisations must effectively augment machine judgement and the speed of orchestrated responses with human strategic intellect. Only then will organisations be able to understand and anticipate the patterns of how attacks might play out, even if they have never been seen before.

2. Ransomware will pivot from traditional extortion to new targets, technologies, and objectives.

The profitability of traditional ransomware campaigns will continue to decline as vendor defences, user education, and industry strategies improve to counter them. Attackers will adjust to target less traditional, more profitable ransomware targets, including high net-worth individuals, connected devices, and businesses.

The pivot from the traditional will see ransomware technologies applied beyond the objective of extortion of individuals, to cyber sabotage and disruption of organisations. This drive among adversaries for greater damage, disruption, and the threat of greater financial impact will not only spawn new variations of cybercrime “business models,” but also begin to seriously drive the expansion of the cyber insurance market.

“While much about the motives behind WannaCry and NotPetya are still debated, the use of pseudo ransomware is likely to continue, partly due to the ease with which as-a-service providers can make such techniques available to anybody with the means to pay,” said Raj Samani, Chief Scientist and head of McAfee Advanced Threat Research.

“Such attacks could be sold to parties seeking to paralyse national, political and business rivals, which raises perhaps the biggest, unavoidable ransomware question of 2017: Were WannaCry and NotPetya actually ransomware campaigns that failed in their objectives to make significant revenue? Or perhaps incredibly successful wiper campaigns?”

3. Serverless apps will save time and reduce costs, but they will also increase attack surfaces for organisations implementing them.

Serverless apps enable greater granularity, such as faster billing for services. But they are vulnerable to attacks exploiting privilege escalation and application dependencies. They are also vulnerable to attacks on data in transit across a network, and potentially to brute-force denial of service attacks, in which the serverless architecture fails to scale and incurs expensive service disruptions.

Function development and deployment processes must include the necessary security processes, scalability capabilities must be made available, and traffic must be appropriately protected by VPNs or encryption.

4. Connected home device manufacturers and service providers will seek to overcome thin profit margins by gathering more of our personal data—with or without our agreement—turning the home into a corporate store front.

Marketers will have powerful incentives to observe consumer behaviour in order to understand the buying needs and preferences of the device owners. Because customers rarely read privacy agreements, corporations will be tempted to frequently change them after the devices and services are deployed to capture more information and revenue.

McAfee believes that there will be regulatory consequences for corporations that make the calculation to break existing laws, pay fines, and continue such practices, thinking they can do so profitably.

5. Organisations collecting children’s digital content will pose long-term reputation risks.

In their pursuit of user app “stickiness,” corporations will become more aggressive in enabling and gathering user-generated content from younger users. In 2018, parents will become aware of notable corporate abuses of digital content generated by children, and consider the potential long-term implications of these practices for their own children.

McAfee believes many future adults will suffer from negative “digital baggage,” user content developed in a user-app environment where socially appropriate guidelines are not yet well defined or enforced, and where the user interface is so personally engaging that children and their parents do not consider the consequences of creating content that corporations could use and potentially abuse in the future.

In a competitive app environment where “stickiness” easily becomes “unstuck,” the most enterprising, forward-looking apps and services will recognise the brand-building value of making themselves a partner with parents in this education effort.

“The year 2018 could well be remembered most for how we finally started to tackle data protection and for whether consumers truly have the right to be forgotten,” said Vincent Weafer, Vice President at McAfee Labs.

“The large-scale gathering of personal information and user generated content opens consumers up to the risk of data misuse, abuse, and even compromise. Irresponsible service providers can over indulge in the gathering and monetisation, allowing user privacy to be carried away by market forces, data to be compromised, and user reputations threatened years into the future.

“GDPR makes 2018 a critical year for establishing how responsible organisations can pre-empt these issues, respecting users’ privacy, responsibly using consumer data and content to enhance services, and setting limits on how long they can hold the data.”

To find out more about the data protection opportunity for businesses, visit McAfee’s GDPR site:

Related Articles

Government announces projects to boost diversity in cyber security

Cyber Security Government announces projects to boost diversity in cyber security

3w Austin Clark
Learning, development and diversity will help close the cyber skills gap in 2019

Cyber Security Learning, development and diversity will help close the cyber skills gap in 2019

4w Simon Hember
Top public sector tech trends in 2019

Change Management Top public sector tech trends in 2019

1m Gary Flood
Microsoft aims to boost public sector cloud security through new guidance

Cloud Computing Microsoft aims to boost public sector cloud security through new guidance

1m Austin Clark
Infographic: Cyber Security in 2019

Cyber Security Infographic: Cyber Security in 2019

2m Austin Clark
Cyber security is about much more than technology

Cyber Security Cyber security is about much more than technology

2m Austin Clark
Q&A: How cyber security is changing in the public sector

Cyber Security Q&A: How cyber security is changing in the public sector

4m Austin Clark
NCSC defends UK from more than 10 cyber attacks a week

Cyber Security NCSC defends UK from more than 10 cyber attacks a week

4m Austin Clark