Week of February 9th, 2024
Welcome to Your Cybersecurity Recap: a bite-sized weekly newsletter by cybersecurity enthusiasts, for cybersecurity enthusiasts.
Here are this week’s top takeaways:
Over 3 Million Toothbrushes Have Been Infected With Malware (...Or Did They?)?
When it comes to DDoS attacks, no smart device is safe–not even dental hygiene ones.
In a report first released by Swiss newspaper Aargauer Zeitung , an approximate three million smart toothbrushes were reported to have been used by threat actors to execute a sophisticated Distributed Denial of Service (DDoS) attack. While this attack has since been debunked, it serves as a valuable reminder for how precautions need to be taken with all Internet of Things (IoT) devices.
In the original report, a claim was made that this DDoS attack knocked out a Swiss company for several hours, costing millions of euros in damages. How? The compromised toothbrushes, once investigated, were supposedly revealed to be running Java, a popular language for Internet of Things (IoT) devices. Once infected, this global network of hacked toothbrushes launched their successful attack…until an update was released stating that this hypothetical DDoS attack had been reported as having actually occurred.?
With similar attacks having been successfully launched in the past, this “illustration of a hypothetical attack ” is a vital reminder to safeguard even the most innocuous of devices in both your home and office. Experts recommend to adhere to the following best practices for IoT devices:
Research has revealed a staggering 109% increase in DDoS attacks beginning in 2022, with continued studies indicating that this trend will only continue to ramp up in 2024 and beyond.? Market outlook studies further predict that the DDoS protection market will grow in the forthcoming years due to the rise of DDoS as a Service (DaaS) cybercrime groups, the result in an increased demand for cloud-based and hybrid DDoS protection solutions, and a rise in multi-vector DDoS attacks.
Canada Will Be Grading Your Cyber Resilience. Here’s How to Get a Passing Mark?
It’s official: the Canadian government’s cyber authority has started using a U.S. company’s security ratings platform to internally rank cyber threats using a grading system.
领英推荐
The Canadian Centre for Cyber Security (the Canadian government’s authority for advising federal departments as well as critical infrastructure providers on cybersecurity concerns) has contracted to use SecurityScorecard’s security ratings platform. This grading system is intended to assist the Cyber Centre in educating critical infrastructure owner-operators on the cybersecurity risks their organizations face.?
The result is the ability to quickly measure and quantify the cyber risk of any critical infrastructure entity through the use of an “A” through “F”? rating system that uses continuously monitored threat intelligence data. This scoring is only for critical infrastructure operators and will not be made public.
“According to the World Economic Forum, critical infrastructure remains the prime target for threat actors. Our partnership with SecurityScorecard provides us with authoritative and trusted data on critical infrastructure and insight to manage such risks at scale. We are committed to increasing the confidence of Canadians in the critical systems they rely on daily, offering support to critical infrastructure networks and other systems of importance to Canada. This will help the Cyber Centre ensure we can provide tailored support to critical infrastructure owner-operators vital to the security of Canada.”
The thorough use of penetration testing, investing in Employee Awareness programs, and quality cyber insurance are all key factors that contribute to a passing grade under this system.
Ransomware Attacks Are Expected to Intensify. The Culprit? AI?
Ransomware continues to be one of the most damaging cyber threats organizations are facing around the globe– a threat that artificial intelligence (AI) will continue to further exacerbate, a new report published by the National Cyber Security Centre (NCSC) states.
“AI is already being used in malicious cyber activity and will almost certainly increase the volume and impact of cyberattacks –including ransomware–in the near term,” reads the NCSC report. “As this report shows, the threat is likely to increase in the coming years due to advancements in AI and the exploitation of this technology by cybercriminals.”
James Babbage, director general for threats at NSA, added: “AI services lower barriers to entry, increasing the number of cybercriminals, and will boost their capability by improving the scale, speed, and effectiveness of existing attack methods.”
According to Sophos' State Of Ransomware in 2023, 97% of organizations hit by ransomware were able to regain access to their data. On the surface, this seems like a promising statistic. However, the same report notes that 46% of organizations paid ransom to get it back while recovery using backups dropped slightly from 73% to 70%. The mean recovery cost was USD $2.6 million when the ransom was paid compared to a still very high $1.6 million when using backups. While organizations cannot prevent being attacked by ransomware gangs, they can and should do more to prevent a successful ransomware attack.
Some of 2024’s top ransomware tactics include, but are not limited to: