Cytegic continuously monitors the cyber threat landscape and analyzes various inputs to identify threat agents, attacks and controls, based on geo-political regions and business sectors. Our DyTA machine monitors thousands of quality sources (both structured and unstructured), detects daily, weekly and monthly trends, changes and events and incorporates them into Cytegic’s methodology and systems. DyTA enables a quick, understandable and actionable cyber-threat forecast.
The following is a high-level summary of developments and trends from 2014 that have been included in our CIAC Intelligence Packages, and forecast for 2015. The trend analysis and forecast are based on our events database and are represented here as an example of DyTA’s capabilities. These are pushed to local installations of the Cytegic DSS, and are correlated to the local environment defense posture for actionable intelligence.
For daily updates, follow us on twitter: www.twitter.com/Cytegic
For the full report, please contact us at: info@cytegic.com
2014 Major Rising Trends and 2015 Forecasts:
The Proliferation and Monetization of Advanced Attack Methods – In the past year, there has been a significant rise in the monetization process of advanced cyber tools. This means lower-capability attackers may be able to implement high-end tools and techniques simply by purchasing them or their blueprints off the shelf on black markets. Some of the major indicators for this trend are the constant rise in capability and usage of modified spyware by rouge political- or industrial-espionage groups, and of cryptoware for ransom by financial hackers. Attackers of different resources and skills are already using tools which were in the past used solely by nation-states and organized cyber-crime syndicates, and we predict this trend will continue to rise in the near future (even if we’ll see large-scale law enforcement busts and counter-campaigns as in the past year).
Tool-Kits and Exploit-Kits Becoming More Available and More Aggressive – Throughout the past year we have seen adaptive exploit-kits and even cyber-attack dashboards becoming available for purchase and implementation. This means that organizations will deal significantly more with pre-engineered attack vectors which include every part of the kill-chain (from reconnaissance, through penetration and navigation, and up to execution and exfiltration) in one click. This trend and the previous one are best represented by the Vawtrak Crimeware-as-a-service tool, and by the Regin spy-kit.