Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

02:00 PM
Connect Directly

Navigating the Asia-Pacific Threat Landscape: Experts Dive In

At next week's virtual Black Hat Asia, threat intelligence pros will discuss the threats local organizations should prioritize and how they can prepare.

Cyberattacks keeping CISOs up at night vary by geography, as do strategies for protecting the business from compromise. In the Asia-Pacific region, for example, threat intelligence experts say evolutions in ransomware, long dwell time, and local nation-state actors are top of mind. 

"I've seen a huge uptick in terms of the evolution of the ransomware threat space," says Steve D'sa, director of consulting for Mandiant, in a discussion of online attacks targeting Asia-Pacific organizations.

Related Content:

Malware Attacks Declined But Became More Evasive in Q2

State of Endpoint Security: How Enterprises Are Managing Endpoint Security Threats

New on The Edge: RASP 101: Staying Safe With Runtime Application Self-Protection

While attackers historically have targeted businesses purely for financial gain, he says they're now paying closer attention to which parts of the businesses they can access and the type of data they can steal. If a victim refuses to pay up, they can threaten to publish the information. The result is an evolution from "your business is not available" to a cyber extortion indicent.

This is a major fear at the executive level, D'sa continues, because there are more ramifications when sensitive corporate data goes public. It's prompting more conversation in the C-suite.

Driving executive concerns is a preference for big game hunting, adds Sherif El-Nabawi, vice president of sales engineering at CrowdStrike. Attackers are focusing on specific individuals versus broad campaigns, and they are "very successful" in doing so. They also request larger ransoms: Some groups, with bitcoin conversions, reached gains of $100 million. 

"Ransomware-as-a-service has accelerated this," he says of the trend. "It meant there are more groups going into this field very quickly. It meant the escalation and speed of the actual attacks, and the success rates, are higher. With ransomware-as-a-service, attackers don't have to do the full attack life cycle. They can stick with what they're good at and outsource other components.

Attackers targeting Asian organizations tend to have a longer "dwell time" compared with other regions, giving them a larger window to navigate the environment and achieve their goals, adds D'sa, who says while it's trending downward, "dwell time in Asia is definitely a lot higher than what we see across the rest of the world."

In one case, he says, attackers targeting a business were able to spend 40 days getting from the satellite office into its main data center, identify a backup server, and run an entire ransomware operation so they had maximum benefit. Longer dwell time enabled a much larger impact.

[Sherif El-Nabawi and Steven D'sa will share more about online attacks targeting Asia-Pacific organizations in an upcoming Black Hat Asia panel, "Trends in Online Attacks," next week.]

Both experts agree nation-state groups based out of China pose a major threat to the region. While these attackers typically dominate threats against telecommunications, El-Nabawi says threat intelligence indicates they have also targeted food and beverage, healthcare, manufacturing, and pharmaceuticals, in addition to telecommunications and tech companies.

When it comes to defending against these attacks, however, Asian businesses have work to do.

"The difference in the adoption of cybersecurity defenses [and] the overall availability of resources in terms of dealing with these threats -- Asia is still playing catch-up," says D'sa. He advises firms to focus more on planning out their remediation following an incident. Security teams in the region, often under executive pressure, tend to rush the process and lack visibility as a result.

"We see a lot of retargeting and re-compromise in Asia because of that," he adds. 

El-Nabawi sees the same inclination to close and quickly remediate, as well as the same tendency to limit the scope of a breach to a single business unit or geography.

"The reality is the threat actor does not know that. He looks at your network as one, and he's targeting globally," he explains. "One of the key reasons we see attackers targeting again is they can come from another part of the network that hasn't been secured or hasn't been assessed."

Multiple talks at the virtual Black Hat Asia will discuss the threats organizations face, the challenges they experience in mitigating attacks, and best practices for defense. In the keynote "Complexity Killed Security," Graz University of Technology infosec professor Daniel Gruss will discuss the unforeseen additional complexities in security and the challenges these present to organizations. 

In a talk entitled "Adversary Detection Pipelines: Finally Making Your Threat Intel Useful," analyst Xena Olsen will discuss how businesses can derive greater value from threat intelligence feeds, explain the difficulties of attribution, and examine case studies of Adversary Detection Pipelines.

And for organizations fearing the worst, a panel on "Managing Data Breaches and Incident Response" will dive into processes that should be followed following a successful attack.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/23/2020
Modern Day Insider Threat: Network Bugs That Are Stealing Your Data
David Pearson, Principal Threat Researcher,  10/21/2020
Are You One COVID-19 Test Away From a Cybersecurity Disaster?
Alan Brill, Senior Managing Director, Cyber Risk Practice, Kroll,  10/21/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-10-27
checkpath in OpenRC through 0.42.1 might allow local users to take ownership of arbitrary files because a non-terminal path component can be a symlink.
PUBLISHED: 2020-10-26
libtac in pam_tacplus through 1.5.1 lacks a check for a failure of RAND_bytes()/RAND_pseudo_bytes(). This could lead to use of a non-random/predictable session_id.
PUBLISHED: 2020-10-26
An out-of-bounds read in the JavaScript Interpreter in Facebook Hermes prior to commit 8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0 allows attackers to cause a denial of service attack or possible further memory corruption via crafted JavaScript. Note that this is only exploitable if the application usi...
PUBLISHED: 2020-10-26
Ruckus through is affected by remote command injection. An authenticated user can submit a query to the API (/service/v1/createUser endpoint), injecting arbitrary commands that will be executed as root user via web.py.
PUBLISHED: 2020-10-26
Ruckus vRioT through has an API backdoor that is hardcoded into validate_token.py. An unauthenticated attacker can interact with the service API by using a backdoor value as the Authorization header.