Search This Blog

Powered by Blogger.

Blog Archive

Labels

Hackers Becoming More Advanced at Escaping AI/ML Technologies

Threat actors have started investing in anti-AI cyberattack techniques and use these methods into their campaigns.

 

Deep Instinct Threat Research team deeply enquired attack volumes and types and then extracted their results to forecast the future of cybersecurity scenarios, deciding what excites attackers, and lastly, it laid out steps that a company can take in order to safeguard itself from future cyberattacks. Key takeaways from this report include 2021 threat patterns which hint that bad actors are becoming more sophisticated in escaping AI/ML technologies, provoking companies to redouble attempts in the innovation battle. 

Particular attack vectors grew substantially, it includes a 170% rise in the use of Office droppers and a 125% rise in all threat types included. The amount of malware variants is considerably higher compared to pre-pandemic cases. Besides this, malicious actors have made a considerable turn towards newer languages like Python and Go, from older programming languages, like C and C++. These new languages offer easy learning and programming compared to their earlier variant. 

However, they are not commonly used, hence lower chances to be found by cybersecurity tools or get identified by cybersecurity experts. "Recent major events, such as Log4j and Microsoft Exchange server attacks, have placed a heightened priority on security, but these threats have long deserved the attention they’re just now getting on a global level. The results of this research shed light on the wide-ranging security challenges that organizations face on a daily basis," said Deep Instinct CEO Guy Caspi. 

Other Attack Volumes Types

Supply Chain Attacks- Big organizations with large client offerings often become easy targets for supply chain attacks in 2021. Here, hackers look to gain environmental access as well as target the customers by proxy. 

Prevalent Public and Private Sector Collaborations- A great deal of partnership was witnessed amid international enforcement agencies in the past year, the purpose was to identify and catch threat actors. 

High Impact of Zero-day- Major vulnerabilities were exploited and abused in a single day of a vulnerability disclose. Famous example includes HAFNIUM Group, it came out after Microsoft disclosed various zero-day vulnerabilities. 

Hackers have grown in terms of escaping identification and privilege escalation. Threat actors have started investing in anti-AI cyberattack techniques and use these methods into their campaigns.
Share it:

AI

Cyber Security

New Technology

Programming Language