Navigating the Asia-Pacific Threat Landscape: Experts Dive InNavigating the Asia-Pacific Threat Landscape: Experts Dive In
At next week's virtual Black Hat Asia, threat intelligence pros will discuss the threats local organizations should prioritize and how they can prepare.
September 25, 2020
Cyberattacks keeping CISOs up at night vary by geography, as do strategies for protecting the business from compromise. In the Asia-Pacific region, for example, threat intelligence experts say evolutions in ransomware, long dwell time, and local nation-state actors are top of mind.
"I've seen a huge uptick in terms of the evolution of the ransomware threat space," says Steve D'sa, director of consulting for Mandiant, in a discussion of online attacks targeting Asia-Pacific organizations.
While attackers historically have targeted businesses purely for financial gain, he says they're now paying closer attention to which parts of the businesses they can access and the type of data they can steal. If a victim refuses to pay up, they can threaten to publish the information. The result is an evolution from "your business is not available" to a cyber extortion indicent.
This is a major fear at the executive level, D'sa continues, because there are more ramifications when sensitive corporate data goes public. It's prompting more conversation in the C-suite.
Driving executive concerns is a preference for big game hunting, adds Sherif El-Nabawi, vice president of sales engineering at CrowdStrike. Attackers are focusing on specific individuals versus broad campaigns, and they are "very successful" in doing so. They also request larger ransoms: Some groups, with bitcoin conversions, reached gains of $100 million.
"Ransomware-as-a-service has accelerated this," he says of the trend. "It meant there are more groups going into this field very quickly. It meant the escalation and speed of the actual attacks, and the success rates, are higher. With ransomware-as-a-service, attackers don't have to do the full attack life cycle. They can stick with what they're good at and outsource other components.
Attackers targeting Asian organizations tend to have a longer "dwell time" compared with other regions, giving them a larger window to navigate the environment and achieve their goals, adds D'sa, who says while it's trending downward, "dwell time in Asia is definitely a lot higher than what we see across the rest of the world."
In one case, he says, attackers targeting a business were able to spend 40 days getting from the satellite office into its main data center, identify a backup server, and run an entire ransomware operation so they had maximum benefit. Longer dwell time enabled a much larger impact.
[Sherif El-Nabawi and Steven D'sa will share more about online attacks targeting Asia-Pacific organizations in an upcoming Black Hat Asia panel, "Trends in Online Attacks," next week.]
Both experts agree nation-state groups based out of China pose a major threat to the region. While these attackers typically dominate threats against telecommunications, El-Nabawi says threat intelligence indicates they have also targeted food and beverage, healthcare, manufacturing, and pharmaceuticals, in addition to telecommunications and tech companies.
When it comes to defending against these attacks, however, Asian businesses have work to do.
"The difference in the adoption of cybersecurity defenses [and] the overall availability of resources in terms of dealing with these threats -- Asia is still playing catch-up," says D'sa. He advises firms to focus more on planning out their remediation following an incident. Security teams in the region, often under executive pressure, tend to rush the process and lack visibility as a result.
"We see a lot of retargeting and re-compromise in Asia because of that," he adds.
El-Nabawi sees the same inclination to close and quickly remediate, as well as the same tendency to limit the scope of a breach to a single business unit or geography.
"The reality is the threat actor does not know that. He looks at your network as one, and he's targeting globally," he explains. "One of the key reasons we see attackers targeting again is they can come from another part of the network that hasn't been secured or hasn't been assessed."
Multiple talks at the virtual Black Hat Asia will discuss the threats organizations face, the challenges they experience in mitigating attacks, and best practices for defense. In the keynote "Complexity Killed Security," Graz University of Technology infosec professor Daniel Gruss will discuss the unforeseen additional complexities in security and the challenges these present to organizations.
In a talk entitled "Adversary Detection Pipelines: Finally Making Your Threat Intel Useful," analyst Xena Olsen will discuss how businesses can derive greater value from threat intelligence feeds, explain the difficulties of attribution, and examine case studies of Adversary Detection Pipelines.
And for organizations fearing the worst, a panel on "Managing Data Breaches and Incident Response" will dive into processes that should be followed following a successful attack.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023