CRD #8

On encryption levels, exploitation times, cloud attacks, AI usage policies & more.

CRD #8
Photo by Ariel / Unsplash
The Cybersecurity Research Digest cuts through the bias and marketing fluff to bring you relevant and objective insights backed by data.
Featuring highlights for security leaders from validated research sources released between 15-21 October 2024, followed by a list of all monitored reports.

More targeted by ransomware, but fewer reach encryption

Microsoft’s endpoint data reveals a 2.75x increase in the number of organizations targeted by ransomware over the past two years. However, the company’s Digital Defense Report notes a significant improvement: ransomware attacks reaching the encryption stage have decreased threefold.

Notably, in 90% of cases where attacks did reach the ransom stage, remote encryption originated from unmanaged devices, underscoring the importance of enrolling devices into management systems or excluding unmanaged devices from critical networks.

The report, however, does not clarify whether the decline in encryption events is linked to the growing trend of ransomware actors shifting focus more toward data exfiltration as am extortion tactic.

Nation-state and criminal collaboration increasing, with financial motives on the rise

Microsoft’s comprehensive Digital Defence Report provides an overview of their take on global cybersecurity challenges as a whole, including the influence of AI and geopolitical developments. On the latter, the report highlights increased coordination among state actors, with countries like North Korea and Iran increasingly using ransomware for financial gain as part of their offensive operations. Regarding Russia, the report confirms overlaps between cybercriminal gangs and state-sponsored operations aimed at geopolitical objectives.

Mandiant (Google) analyzed 137 vulnerabilities disclosed in 2023 that were actively exploited in the wild, finding that 70% were zero-days (i.e., vulnerabilities known and used before patches are released). This reflects a steady rise in the ratio of zero-days versus n-days (i.e., vulnerabilities exploited after patches are available).

The analysis also shows a sharp decrease in the time-to-exploit (TTE) following vulnerability disclosures. Five years ago, the average TTE was 63 days, but last year’s data shows it dropped to just 5 days (compared to 32 days in 2021-22), demonstrating the increasing maturity and capabilities of threat actors. As an alternative indicator, exploitation was most likely to occur within the first month of a patch being made available for an already disclosed vulnerability.

Interestingly, despite the shorter TTE, the authors note that while there may be a correlation between exploit release and media attention, it does not necessarily predict exploitation. Other factors, such as the complexity and value of the exploit, also likely play a significant role.

Cloud attacks: BEC and cryptominers prevail, ransomware less frequent

Based on IBM's product telemetry and incident response data, analysis shows that the majority of "actions on objective" by threat actors who gain access to cloud environments involve business email compromise (39%) or the installation of cryptominers (22%).

Interestingly, ransomware and data destruction rank much lower, accounting for only 5% and 6% of incidents, respectively. The focus on BEC—likely offering the greatest balance between effort and reward—is unsurprising, as insurers consistently report it as the most costly attack for their clients.

AI usage protocols developed, but not followed

The use of GenAI tools like ChatGPT in the workplace is undeniably growing, and security leaders are working to address the associated data confidentiality risks. Recent studies involving medium and large enterprises show that about 60-70% of organizations have implemented some protocols to regulate how data is shared with public large language models (LLMs).

However, the effectiveness of these measures is in question, as the studies reveal that employees frequently disregard policies by continuing to share sensitive data with the models. The reasons for this likely vary: survey data shows that employees report being simply unaware of the policies, while others may prioritize the benefits of usage over security concerns. The difficulty in monitoring such policy violations likely contributes to this issue as well. Additionally, the absence of high-profile sensitive data leaks from public LLM providers has likely not yet sufficiently raised broader awareness of such risks.

The case for dividing the CISO role into technical and business functions

A global survey of over 500 cybersecurity leaders highlights the evolving role of CISOs beyond the technical, with 79% stating that the time and effort required to keep up with regulatory changes is "not sustainable." Citing pressures from rapid developments related to regulations like NIS2, DPA, and SEC rules, a notable 84% believe the CISO role should be split into separate technical and business-focused positions. Nearly half also noted that the expanding scope of responsibilities is likely to result in higher turnover.


Reports monitored: 15-21 October 2024

To take a deeper dive in the topics most relevant for you, we've listed all the research reports that were published during the observed period.

Title Organisation(s) Topic(s)
Microsoft Digital Defense Report 2024 Microsoft threat landscape / general
2024 APAC Edition: An Asia-Pacific industry trend report on cloud security challenges in the era of AI SUSE cloud security / APAC
Cyber disclosures: what companies shared about cyber risks in 2024 EY disclosures / US / SEC
The Mind of the CISO - CISO Crossroads: Regulation, pressures, and the future of cybersecurity leadership Trellix w/ Vanson Bourne CISOs / regulations / board relations
AXA Future Risks Report 2024 AXA overall risk perceptions
BCG’s Annual Cybersecurity Survey 2024 BCG w/ GLG CISO perceptions / threats / risk
X-Force Cloud Threat Landscape Report 2024 IBM cloud security
How Low Can You Go? An Analysis of 2023 Time-to-Exploit Trends Google exploits / vulnerabilities
Inside the Mind of a Hacker 2024 BugCrowd attacker perspectives
Just 11% of CIOs Have Fully Implemented AI as Data and Security Concerns Hinder Adoption Salesforce AI
Reality Check: Is AI Living Up to Its Cybersecurity Promises? Swimlane w/ Sapio Research AI / security
CISO Insights: Closing the Cybersecurity Preparedness Gap Gigamon CISO perspectives
Arctic Wolf Human Risk Behavior Snapshot Arctic Wolf human risk
Cybersecurity Survey Report 2024: Navigating the New Frontier of Cyber Challenges Kaseya leader perspectives
Zscaler ThreatLabz 2024 Mobile, IoT, and OT Threat Report Zscaler mobile / OT / IoT
India Cybersecurity Leadership Report 2024 ETCISO India / CISO perspectives
Security Priorities Study 2024 Foundry leader perspectives
Election season raises fears for nearly a third of people who worry their vote could be leaked Malwarebytes elections / consumer
Global Future of Cyber Survey, 4th Edition Deloitte leader perspectives

About

evisec's Cybersecurity Research Digest provides security leaders verified strategic insights via a carefully curated weekly summary of evidence-led, unbiased and objective cybersecurity research publications. Read more about our service here.


✉️ Suggestions or want to collaborate? Get in touch via LinkedIn or email (henry@evisec.xyz)