11 Cyber-Security Predictions for 2017

11 Cyber-Security Predictions for 2017

11 Cyber-Security Predictions for 201711 Cyber-Security Predictions for 2017

These 11 cyber-security predictions deal with automated malware attacks, Shadownet, cloud poisoning, Ransomware-as-a-Service and attacks on smart buildings.

Automated and Humanlike AttacksAutomated and Humanlike Attacks

Expect malware designed with adaptive, success-based learning to improve the success and efficiency of attacks. This new malware will understand the environment it is in and make calculated decisions about what to do next.

Malware With AI-like CodeMalware With AI-like Code

Next-generation malware will have more complex decision-making trees instead of the “if not this, then that” code that’s a precursor to AI. When it encounters a conditional jump it has seen before, it will make a prediction and become more efficient.

Autonomous Malware Attacks the IoTAutonomous Malware Attacks the IoT

Autonomous malware, including transformers to target cross-platform applications and spread between platforms, could have a devastating effect on connected devices.

IoT Makers Will Be Held Accountable for BreachesIoT Makers Will Be Held Accountable for Breaches

More attacks will target IoT devices, which are built with highly vulnerable code and distributed by vendors with no security strategy. Furthermore, these devices are “headless,” that is, you can’t add security or update their software or firmware.

IoT-Targeted Attacks to Become More SophisticatedIoT-Targeted Attacks to Become More Sophisticated

Attacks targeting IoT devices will become more sophisticated and will be designed to exploit the weaknesses in the IoT communications and data-gathering chain.

Rise of the ShadownetRise of the Shadownet

Growth of massive Shadownets, which are IoT botnets that can’t be seen or measured using conventional tools. The first step: targeted DDoS attacks combined with demands for ransom. Second step: collecting data, targeting attacks and obfuscating other attacks.

Legislation for IoT ManufacturersLegislation for IoT Manufacturers

Unless IoT manufacturers take immediate action, they will suffer economic loss and legislation that will hold them accountable for security breaches related to their products.

Cloud's Weakest Link: Remote DevicesCloud’s Weakest Link: Remote Devices

The weakest link in cloud security lies in the millions of remote devices accessing cloud resources. Expect attacks designed to exploit endpoint devices resulting in client-side attacks that target and breach cloud providers.

Cloud PoisoningCloud Poisoning

Expect compromised endpoint clients to inject malware into cloud-based offerings, a process known as cloud poisoning.

Attacks on Smart BuildingsAttacks on Smart Buildings

Hackers will target building automation and management systems and will potentially hold buildings for ransom by locking doors, shutting off elevators, rerouting traffic or simply turning on the alarm system.

Continued Growth of Ransomware as a ServiceContinued Growth of Ransomware as a Service

There will be continued growth of ransomware as a service, as criminals with no training or skills can download tools and point them at a victim in exchange for sharing profits with the developers. There also will be more focused attacks against high-profile targets.

Karen A. Frenkel
Karen A. Frenkel
Karen A. Frenkel is a contributor to CIO Insight. She covers cybersecurity topics such as digital transformation, vulnerabilities, phishing, malware, and information governance.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Latest Articles