New Hacking Methods to Look Out for in 2019
NEWS

New Hacking Methods to Look Out for in 2019

The number of individuals affected by data breaches and cyberattacks in 2018 is definitely in the billions, and organizations are not far behind, either.

One data breach alone,

A data breach that affects 500 million individuals was just announced. The affected party is US hotel chain Mariott, and its Starwood reservation network.
Marriott’s, affected 500 million individuals! More specifically, Starwood subsidiary’s guest reservation network somehow exposed its entire database consisting of 500 million guest bookings recorded in the course of four years, and plenty of highly sensitive information was laid open.




And that’s just one example – 2018 witnessed the resurgence of older banking malware, the addition of new players on the malware and ransomware scene, plenty of phishing scams, and the overall evolution of cybercriminal intentions and capabilities. So, considering the already vulnerable state of security and the evolving scene of cybercrime, what should we expect in 2019?

AI-Powered Malware

According to Max Heinemeyer, the director of threat hunting at Darktrace, “narrow artificial intelligence is going to supercharge malware in the next couple of years”. Darktrace is an international artificial intelligence company that identifies cyberattacks and provides defensive mechanisms. Up until now, humans were always involved in manual intrusions but if AI is utilized, attacks can happen at machine speed, localized to every environment, the expert points out.

What if ransomware worms or other attacks can intelligently choose, tailored to the environment, which way to move around is best?

In short, artificial intelligence and machine learning are altering the landscape of security risks for citizens, organizations, and states, another security report recently said. The report is a collaborative effort of the Future of Humanity Institute, the University of Oxford, the University of Cambridge, OpenAI, and it analyzes the question of “what the long-term equilibrium between attackers and defenders will be”.

There’s the real threat of AI used in malicious scenarios, and it could threaten digital security in multiple ways. For instance, criminals can train machines to hack or socially engineer victims at human or superhuman levels of performance. Physical security is also at stake, as well as political safety, where surveillance becomes more extremely evolved, and automated fake news campaigns are shaping the way we think.

The malicious use of AI will impact how we construct and manage our digital infrastructure as well as how we design and distribute AI systems, and will likely require policy and other institutional responses, the report noted.

AI-Powered Defense

Comcast is one company that is

A new AI-powered service that is meant to monitor, block and inform customers about online threats connected to home networks.
adopting AI for security purposes. The company recently made an important announcement about a new AI-powered service that will monitor, block and inform customers about online threats connected to home networks. The service is called xFinity xFi Advanced Security, and its main purpose is to protect users from malware attacks and intruders.

Comcast has pointed out that there will be more than 13 connected devices per person in North America only, as estimated by Cisco researchers. The issue is that the majority of users neither have the knowledge nor the tools to secure their devices, especially in cases when these devices don’t have keyboards or screens.

There are already a number of dangerous attacks targeting IoT devices and enslaving them in botnet operations. Let’s take the

Security researchers the BCMUPnP_Hunter botnet which appears to be specifically targeted against IoT devices, read more about it in our article
BCMUPnP_Hunter botnet which is specifically targeted against IoT devices. The botnet exploits a five-year old vulnerability which appears to be left unpatched by many devices and vendors. The botnet has infected about 100,000 IoT devices since its launch.

Related:
SensorsTechForum's predictions about the security and threat landscape in the upcoming 2019. What will change and what will stay the same?
Will Malware and Privacy Matters in 2019 Be Echoes of the Past?

Evolved Phishing

AI could also supercharge phishing, say security researchers. AI could be adopted by scammers in creating phishing messages that humans can’t identify.

Another thing with evolved phishing attacks is their ability to bypass two-factor authentication.

? new open-source tool called "Modlishka" has been demonstrated to be able to bypass most schemes using phishing tactics.
A new open-source tool called Modlishka has made headlines by demonstrating how it can bypass two-factor authentication sites and services. This is not done by launching exploits but rather by a phishing campaign. The approach has proven to be very effective especially against a larger number of targets.

In December,

Google and Yahoo have been targeted in new phishing attacks that are able to bypass two-factor authentication (2FA). Secure email providers are targeted.
Google and Yahoo were also targeted in sophisticated phishing attacks that were able to bypass 2FA. The phishing email distributed in this campaign used a specially crafted “security alert” that tricked targets into visiting malicious domains that were made to look like Google and Yahoo. What stands out in this phishing operation is the method used to bypass 2FA, and the registration of domains which strikingly resemble the original, legitimate services.

In 2019, we will continue to witness new, trickier approaches to phishing.

Open Source Attacks

In November last year, a hacker successfully sneaked a backdoor into a widely used open source code library with the purpose of stealing funds stored in Bitcoin wallets.

In other words, an open source JavaScript library with 2 million downloads, called event-stream, was distributed with a bitcoin-stealing backdoor. Security researchers believe that the attack “targeted a select few developers at a company, Copay, that had a very specific development environment set up”. It is noteworthy that the payload itself didn’t run on the targeted developers’ computers; rather, it would be packaged into a consumer-facing app when the developers built a release. The end goal of this malicious endeavor was to steal Bitcoin from this application’s end users.




Another curious attack vector would involve becoming an admin of an open-source project, security researcher Bruce Scheneir pointed out:

Many open source projects attain a level of “maturity” where no one really needs any new features and there aren’t a lot of new bugs being found, and the contributors to these projects dwindle, often to a single maintainer who is generally grateful for developers who take an interest in these older projects and offer to share the choresome, intermittent work of keeping the projects alive. Ironically, these are often projects with millions of users, who trust them specifically because of their stolid, unexciting maturity.

The described scenario is a scary social-engineering vector for malware distribution, where a threat actor volunteers to help maintain the project. That person would only need to make some small, positive contributions, and get commit access to the project. Then a malicious patch is released, and voila, millions of users and apps get infected.

It’s also worth mentioning that the EU is

The new bounty project is being sponsored by the Free and Open Source Software Audit, or FOSSA.
sponsoring bug bounty programs for vulnerabilities in 14 popular open-source software projects. Interested researchers and bounty hunters will be invited to submit their discoveries using the HackerOne and Deloitte’s Intigriti crowdsourced security platforms.

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum for 4 years. Enjoys ‘Mr. Robot’ and fears ‘1984’. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles!

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...