Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

9/25/2020
02:00 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Navigating the Asia-Pacific Threat Landscape: Experts Dive In

At next week's virtual Black Hat Asia, threat intelligence pros will discuss the threats local organizations should prioritize and how they can prepare.

Cyberattacks keeping CISOs up at night vary by geography, as do strategies for protecting the business from compromise. In the Asia-Pacific region, for example, threat intelligence experts say evolutions in ransomware, long dwell time, and local nation-state actors are top of mind. 

"I've seen a huge uptick in terms of the evolution of the ransomware threat space," says Steve D'sa, director of consulting for Mandiant, in a discussion of online attacks targeting Asia-Pacific organizations.

Related Content:

Malware Attacks Declined But Became More Evasive in Q2

State of Endpoint Security: How Enterprises Are Managing Endpoint Security Threats

New on The Edge: RASP 101: Staying Safe With Runtime Application Self-Protection

While attackers historically have targeted businesses purely for financial gain, he says they're now paying closer attention to which parts of the businesses they can access and the type of data they can steal. If a victim refuses to pay up, they can threaten to publish the information. The result is an evolution from "your business is not available" to a cyber extortion indicent.

This is a major fear at the executive level, D'sa continues, because there are more ramifications when sensitive corporate data goes public. It's prompting more conversation in the C-suite.

Driving executive concerns is a preference for big game hunting, adds Sherif El-Nabawi, vice president of sales engineering at CrowdStrike. Attackers are focusing on specific individuals versus broad campaigns, and they are "very successful" in doing so. They also request larger ransoms: Some groups, with bitcoin conversions, reached gains of $100 million. 

"Ransomware-as-a-service has accelerated this," he says of the trend. "It meant there are more groups going into this field very quickly. It meant the escalation and speed of the actual attacks, and the success rates, are higher. With ransomware-as-a-service, attackers don't have to do the full attack life cycle. They can stick with what they're good at and outsource other components.

Attackers targeting Asian organizations tend to have a longer "dwell time" compared with other regions, giving them a larger window to navigate the environment and achieve their goals, adds D'sa, who says while it's trending downward, "dwell time in Asia is definitely a lot higher than what we see across the rest of the world."

In one case, he says, attackers targeting a business were able to spend 40 days getting from the satellite office into its main data center, identify a backup server, and run an entire ransomware operation so they had maximum benefit. Longer dwell time enabled a much larger impact.

[Sherif El-Nabawi and Steven D'sa will share more about online attacks targeting Asia-Pacific organizations in an upcoming Black Hat Asia panel, "Trends in Online Attacks," next week.]

Both experts agree nation-state groups based out of China pose a major threat to the region. While these attackers typically dominate threats against telecommunications, El-Nabawi says threat intelligence indicates they have also targeted food and beverage, healthcare, manufacturing, and pharmaceuticals, in addition to telecommunications and tech companies.

When it comes to defending against these attacks, however, Asian businesses have work to do.

"The difference in the adoption of cybersecurity defenses [and] the overall availability of resources in terms of dealing with these threats -- Asia is still playing catch-up," says D'sa. He advises firms to focus more on planning out their remediation following an incident. Security teams in the region, often under executive pressure, tend to rush the process and lack visibility as a result.

"We see a lot of retargeting and re-compromise in Asia because of that," he adds. 

El-Nabawi sees the same inclination to close and quickly remediate, as well as the same tendency to limit the scope of a breach to a single business unit or geography.

"The reality is the threat actor does not know that. He looks at your network as one, and he's targeting globally," he explains. "One of the key reasons we see attackers targeting again is they can come from another part of the network that hasn't been secured or hasn't been assessed."

Multiple talks at the virtual Black Hat Asia will discuss the threats organizations face, the challenges they experience in mitigating attacks, and best practices for defense. In the keynote "Complexity Killed Security," Graz University of Technology infosec professor Daniel Gruss will discuss the unforeseen additional complexities in security and the challenges these present to organizations. 

In a talk entitled "Adversary Detection Pipelines: Finally Making Your Threat Intel Useful," analyst Xena Olsen will discuss how businesses can derive greater value from threat intelligence feeds, explain the difficulties of attribution, and examine case studies of Adversary Detection Pipelines.

And for organizations fearing the worst, a panel on "Managing Data Breaches and Incident Response" will dive into processes that should be followed following a successful attack.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
When It Comes To Security Tools, More Isn't More
Lamont Orange, Chief Information Security Officer at Netskope,  1/11/2021
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-22166
PUBLISHED: 2021-01-15
An attacker could cause a Prometheus denial of service in GitLab 13.7+ by sending an HTTP request with a malformed method
CVE-2021-22167
PUBLISHED: 2021-01-15
An issue has been discovered in GitLab affecting all versions starting from 12.1. Incorrect headers in specific project page allows attacker to have a temporary read access to the private repository
CVE-2021-22168
PUBLISHED: 2021-01-15
A regular expression denial of service issue has been discovered in NuGet API affecting all versions of GitLab starting from version 12.8.
CVE-2021-22171
PUBLISHED: 2021-01-15
Insufficient validation of authentication parameters in GitLab Pages for GitLab 11.5+ allows an attacker to steal a victim's API token if they click on a maliciously crafted link
CVE-2020-26414
PUBLISHED: 2021-01-15
An issue has been discovered in GitLab affecting all versions starting from 12.4. The regex used for package names is written in a way that makes execution time have quadratic growth based on the length of the malicious input string.