• Avast 2020 Threat Assessment

    From Marc Lewis@1:396/45 to All on Sun Jan 5 19:28:58 2020
    Hello All.

    The Avast Threat Labs monitors and protects our more than 400
    million users worldwide from the latest threats. Avast detects
    threats in near real time and blocks about 1.5 billion attacks a
    month. This scope gives us valuable insights into, and knowledge
    of, the most prevalent threats which allows us to quickly protect
    against emerging threats, and provides us with the
    ability to map trends that allow Avast experts from various
    fields to try and predict future threats as well.

    For 2020, we predict advancements to be made in terms of how
    malware is delivered to PCs, including: more sophisticated
    methods of spreading threats via malicious emails; through a
    resurgence of exploit kits; via supply chain attacks; and
    by abusing the Remote Desktop Protocol (RDP).

    On the mobile side, we predict that more subscription scams and
    fake apps will make their way onto official app stores, and that
    more iOS vulnerabilities will be exposed by researchers and bad
    actors alike.

    In terms of Internet of Things devices, we predict devices and
    even physical locations will become smart or even smarter than
    they already are. We have already started to see cybercriminals
    taking steps to further develop IoT malware, including adding
    obfuscation to make it more difficult for analysts to analyze,
    and building upon exploit kits for smart devices.

    Finally, we expect privacy will become the new frontier for
    security, especially when it comes to big data collected for AI
    algorithms.

    For more than a decade, malicious email spam, also known as
    malspam, was one of the primary ways cybercriminals spread
    malware. At the same time, antivirus companies, and email
    providers alike have heavily invested in spam filtering, greatly
    improving the detection of malicious attachments, and more. This
    in turn has caused adversaries to continuously innovate to
    better their chances of reaching potential victims.

    Earlier this year, the banking trojan Emotet, which has been
    around since 2014, began spreading using a new technique. In
    addition to spreading via malspam, Emotet began scanning
    victims’ email inboxes and replying to emails, including
    malicious attachments, and thus infecting further users.

    Similarly, there have been cases of malware creating stealthy
    filters on email servers to steal new incoming messages, to
    either spy on victims, or to add a malicious payload to the
    email to then send back into the conversation.

    Furthermore, there is an entire cybercrime business focused on
    stealing and reselling SMTP (Simple Mail Transfer Protocol)
    credentials, which are the same credentials used to log into an
    email account. SMTP is used by email clients to send emails, and
    using stolen SMTP credentials, cybercriminals can send malicious
    emails appearing to be from specific people.

    We predict emails will continue to be the number one mechanism
    to spread malware, but we expect the methods used to send them
    will become more sophisticated, and that cybercriminals will
    begin using adversarial AI to prepare and send emails with
    malicious or phishing content or attachments.

    =-=

    PC Predictions
    Resurgence of exploit kits:

    While email is and will most likely remain the primary method to
    spread malware, there are other more sophisticated methods we
    predict will be taken advantage of within the next year. One of
    them is exploit kits.

    Exploits are code that take advantage of vulnerabilities, and
    exploit kits are programs that exploit multiple vulnerabilities.
    Exploit kits are used by cybercriminals to gain access to
    devices, mainly via malvertising.

    When someone visits a site with malvertising running an exploit
    kit, the kit searches for vulnerabilities in the software the
    visitor uses to deliver and execute malware, such as trojans, or
    ransomware. Many cybercriminals rent out exploit kits on the
    darknet for further cybercriminals to abuse. Some of the most
    active exploit kits we have seen during 2019 were RIG and
    Fallout, which are offered as a service from anywhere between
    $700 USD to $2,000 USD a month.

    In the past, exploit kits used to
    be one of the main methods of
    spreading malware, however, from 2016 - 2017, the exploit
    business appeared to be on a decline. However, in the past two
    to three years, exploit kits have undergone heavy development,
    and cybercriminals are now adding new exploits and techniques to
    evade antivirus detections, including detecting virtual machines
    and malware analysis tools.

    In 2019, we also saw an increase in router exploit kits, mainly
    targeting Brazilians, but also local U.S. and Canadian Internet
    Service Providers.

    We expect to see an increase in the amount and sophistication of
    exploit kits, targeting PCs and routers in 2020.

    =-=

    PC Predictions
    Supply chain attacks will continue to make headlines:

    We've been predicting an increase in supply chain attacks for a
    few years now and have observed their rise over the past two
    years. We don't expect this trend to stop.

    APT (Advanced Persistent Threat) groups are attempting to
    infiltrate software companies with massive user bases to inject
    malicious code into genuine products. The motivation behind
    supply chain attacks often differs. We have observed cases where
    just a fraction of the affected user base is the actual target
    of a supply chain attack. This was the case in the CCleaner
    attack in 2017, and in the ASUS supply chain attack in 2018.

    On the other hand, there are cases where the motivation behind
    supply chain attacks is mass destruction, like with the NotPetya
    attack. Cybercriminals spread the NotPetya ransomware, more
    precisely wiper, by compromising Ukrainian account software,
    M.E.Doc.

    =-=

    PC Predictions
    RDP -- Innocent until used for evil:

    The Remote Desktop Protocol (RDP), a feature included in every
    Windows version since XP, is used to allow remote access from
    one machine to another, e.g. an employee working remotely can
    access a workstation or server located in their company. It
    could be as simple as running RDP client software on a laptop
    and connecting to a machine with the RDP server counterpart. RDP
    then provides an encrypted connection between both endpoints.
    The usefulness of connecting remotely to a desktop using RDP has
    changed the way much of the world conducts business. It is,
    unfortunately, also one of the most attractive methods for
    cybercriminals to infiltrate a victim's network and deliver the
    malicious payload.

    In the past, cybercriminals have either brute-forced, or
    guessed, weak credentials to gain access. With newly discovered
    RDP vulnerabilities, such as BlueKeep, there are even more
    opportunities for cybercriminals.

    In the past few years, cybercriminals have abused the feature to
    distribute ransomware to small and medium businesses.

    In 2020, we expect to see a significant increase in all types of
    attacks on RDP.

    We are likely to see cybercriminals abusing weakly configured
    servers with RDP as well as exploiting RDP vulnerabilities -
    whatever will be more profitable for them at a time. The
    majority of delivered malicious payloads will probably still be
    ransomware, but we expect a rise in distribution of coin-miners
    and password stealers. We also expect to see the spread of
    worm-like strains similar to WannaCry.

    =-=

    PC Predictions
    About Jakub Kroustek

    Jakub is Head of the Threat Intelligence Systems at Avast. Jakub
    is a passionate malware hunter and researcher with a love of
    reverse engineering. His expertise lies in ransomware, botnets,
    and automating all the boring stuff.

    Jakub hates malware, but enjoys analyzing it and spreading the
    word about his findings including presentations on conferences
    such as Virus Bulletin, CARO, or Botconf.

    Jakub holds a Ph.D. degree in Computer Science and Engineering
    from the Brno University of Technology.

    =-=

    Mobile Subscription scams and fake apps:

    On the mobile side, we predict that more subscription scams and
    fake apps will make their way onto official app stores.

    Subscription scams allow people to use an app for free
    for a limited period of time, and if the subscription is
    not canceled, the app charges customers higher than usual fees
    — often on a weekly or monthly bas
    is. We expect we will see
    subscription scam apps rise on both the Google Play Store and the
    Apple App Store.

    Fake apps, on the other hand, are illegitimate apps posing
    as benign ones in order to drive downloads, to collect personal
    data, and expose people to advertisements or malware.

    Cybercriminals are resorting to subscription scams and fake
    apps, as it is difficult to surpass official app store
    security checks.

    =-=

    iOS jailbreaks opening the door:

    On the iOS side, based on the latest findings from the iOS
    jailbreak community, we expect more vulnerabilities will be
    exposed by researchers and bad actors alike. The checkm8
    jailbreak exploit, discovered this year, is a very serious
    vulnerability as it exploits the first thing that runs on
    iOS devices when they are turned on, thus allowing access
    to anything that comes after. Additionally, it can’t ever be
    updated or fixed on the existing devices, as the exploited code
    is in a read-only memory. The only “fix” is to buy a
    new device, like the iPhone XS / XR or newer.

    While the exploit requires physical access to the
    targeted device, criminals and even government agencies have
    gained a new tool for their arsenal.

    We are already seeing community projects, like checkra1n,
    providing high-quality semi-tethered jailbreaks based on the
    checkm8 bootrom exploit. This could enable researchers to
    discover more vulnerabilities which, we hope, will be
    reported to Apple and not used for evil.

    Mobile
    About Nikolaos Chrysaidos

    Nikolaos Chrysaidos is Head of Mobile Threat Intelligence
    and Security at Avast, leading mobile security projects,
    mobile threat intelligence, and threat prevention. In his
    day-to-day work, he drives mobile forensics, malware
    analysis, reverse engineering, and application penetration
    testing to stay ahead of current mobile threats and security issues.Additionally, Nikolaos and his team work on
    apklab.io, a mobile threat intelligence platform designed to
    make it easier for security researchers to hunt and analyze
    mobile malware.Nikolaos holds a Bachelor of Science in
    Computing from the University of Wales, and a Master of
    Science in CyberSecurity from the University of York, and has
    successfully presented at various conferences such as AVAR,
    CARO, RSA, BSides, and MWC 360.

    =-=

    Internet of Things (IoT)
    Smarter smart devices and places:

    In terms of the IoT, we predict smart devices will become
    even smarter, collecting more data about users, to learn and
    predict user behavior. This will be done to target users
    with advertisements, similar to how websites collect user
    data to better target users with ads based on their preferences.
    We also predict a rise in the number of ‘smart supermarkets’
    like Amazon Go, which track customers, the items they
    select, and allow customers to walk out of the store
    without cashing out at a register.

    Smart devices and locations that collect data offer
    convenience but they limit people’s control over their
    privacy. Additionally, companies collecting and storing a
    plethora of customer data make attractive targets for data
    hungry cybercriminals looking to sell data for financial gain
    on underground markets.

    More sophisticated IoT malware:

    We have already noticed cybercriminals adding sophisticated
    defences to IoT malware, adding obfuscation to their code,
    similar to how cybercriminals attempt to protect their
    Windows malware code from being analyzed by researchers,
    and we expect this to continue as more people adopt
    smart devices, widening the IoT attack surface.

    Internet of Things (IoT)
    About Anna Shirokova:

    Anna Shirokova is a security researcher at Avast, focusing on
    the IoT threat landscape. Anna has presented at leading industry
    events including Botconf, Troopers, BruCon, Wacco Workshop,
    Virus Bulletin, and Black Hat Europe.Anna also works on the
    Stratosphere IPS project where she analyzes attacks carried ou
    t
    on IoT devices, and publishes her findings along with other
    project team members.

    =-=

    Internet of Things (IoT)
    RCE exploits:

    Remote code execution vulnerabilities allow cybercriminals to
    exploit devices, execute commands, download malware, and gain
    control of vulnerable devices. Successful botnets have
    taken advantage of zero-day RCE exploits for particular
    devices. Nevertheless, n-day exploits, or known exploits,
    are also effective and used daily, as not every IoT
    vulnerability is patched and updated fast enough.

    As new smart devices are introduced to the market, new
    exploits are developed and released and malware authors
    can build upon older, already established malware families,
    expanding them with newly released exploits to widen their
    IoT attack surface. We expect this trend to continue and
    predict that large botnets will be even easier to build in the
    future.

    =-=

    Botnet infrastructure:

    Malware authors have been making progress in preparing their
    attack infrastructure. The ‘state of the art’ botnets
    have progressed from the early-days of IoT malware with
    hard-coded C&C servers to become well-designed fully-fledged
    networks using a variety of techniques, both client-server
    and peer-to-peer based. We have seen IoT malware adopting
    DNS-over-HTTPS, Tor communication, proxies, and different
    encryption methods, and we expect malware authors will
    adopt other security practices to make their networks more
    robust.

    We also expect to see progress when it comes to botnet
    monetization. Although DDoS attacks and cryptocurrency
    mining are still the most popular uses of botnets, we
    foresee more specialized botnets for proxying, information
    gathering, or eavesdropping will appear in 2020.

    Internet of Things (IoT)
    About Daniel Uhricek:

    Daniel Uhricek is a security researcher at Avast. Daniel
    works on multiple areas within IoT threat research. His
    expertise comes from tracking IoT malware on a daily basis
    and developing tools to hunt and analyze malware. His interests
    include Linux, networking, and data analysis.Daniel is
    currently a Master's student of Computer Security at the
    CTU in Prague, Czech Republic.

    =-=

    Artificial Intelligence (AI)
    Privacy will become the new frontier for security:

    The general public and legislature are becoming aware of the
    dangers of a society with little privacy, and we are seeing a
    number of regulation attempts around the world, e.g. in
    Europe (GDPR), and California, U.S. (CCPA), to provide
    protection and control over personal privacy. AI has,
    unfortunately, been a major driver for the harnessing of
    private data and the resultant lack of privacy.

    In the coming year, we will see practical applications
    of AI algorithms, including differential privacy, a system
    in which a description of patterns in a dataset is shared
    while withholding information about individuals, to profit
    from big data insights as we do today, but without
    exposing all the private details.

    =-=

    Data ownership:

    There is recent work, for example, Data Shapley, to
    attribute value to individual pieces of data provided by
    users. While we do not foresee a monetization of personal
    data in 2020 yet, we hope to start seeing initial products that
    at least allow individuals to control their own data,
    e.g. to decide whether and which companies can harness data,
    and what data they can use.

    Artificial Intelligence (AI)
    About Rajarshi Gupta

    Rajarshi Gupta is the Head of Artificial Intelligence at Avast,
    responsible for Avast’s AI products and research.Dr. Gupta
    manages data science teams in Silicon Valley and Europe, leading
    AI-driven malware detection and mobile protection,
    together with network security for Smart Home, Avast's
    next-generation IoT security platform.Prior to joining Avast,
    Dr. Gupta worked at Qualcomm Research for many years,
    where he created "Snapdragon Smart Protect", the first ever
    product to ac
    hieve On-Device Machine Learning for Security.
    Dr. Gupta has authored over 200 issued U.S. Patents.Dr. Gupta
    holds a PhD in Electrical Engineering and Computer Science from
    UC Berkeley.

    =-=

    Best regards,
    Marc

    --- timEd/2 1.10.y2k+
    * Origin: Sursum Corda! BBS-Huntsville,AL-bbs.sursum-corda.com (1:396/45)