Search DubaiPRNetwork.com

Home >> Technology

AI-generated deepfakes, social media disinformation, and IoT-based attacks are among evolving cyber threats facing MENA organizations

AI-generated deepfakes, social media disinformation, and IoT-based attacks are among evolving cyber threats facing MENA organizations

Monday, April 1, 2019/ Editor -  

Share

Home >> Technology
Dubai, United Arab Emirates, 1 April 2019:   As technology development and deployment continues throughout the Middle East and North Africa (MENA) region, cyber threats are also evolving, moving beyond attacks such as phishing, denial-of-service, and credential compromise to encompass new threats that are challenging companies and organizations. To combat these threats, entities need to shift cybersecurity approaches away from simply focusing on security compliance to developing a holistic culture of proactive security across the broader enterprise, according to Booz Allen Hamilton. The 2019 MENA Cyber Threat Outlook Report highlights key threat trends that organizations in the region need to be aware of to help prevent cybersecurity incidents, avoid reputational damage and financial losses stemming from breaches, and stay security-conscious in an ever-shifting threat environment.
 
Ziad Nasrallah, Principal at Booz Allen Hamilton, said: “The region’s cyber defenders increasingly must anticipate and plan for cyber attacks resulting from emerging technologies such as artificial intelligence. Understanding industry best practices and internal mitigation strategies is invaluable to combating cyber attacks. This includes proactive planning, integrating intelligence-driven threat detection, securing networks and databases, and conducting regular vulnerability scans.”
 
Jay Townsend, Principal at Booz Allen Hamilton, added: “Even small cyber incidents can cause major economic and reputational damage. MENA organizations should consider more advanced defense measures, including moving away from traditional security operations center constructs, and instead, investing in a
Cyber Fusion Center (CFC). The CFC model is threat-focused, driven by a real-time threat intelligence process that informs detection and hunting activities and facilitates rapid tactical coordination. Rather than be completely reliant on tools, CFCs leverage cutting-edge technologies to further strengthen the human element through the automation and orchestration of cybersecurity processes. Moreover, it fosters a culture of collaboration, continuous testing, and learning across teams both inside and outside the Center.”
 
Booz Allen Hamilton outlines the following cyber threat trends and recommendations for proactive defense:
 
1. Stay a step ahead in the AI game
 
Artificial Intelligence (AI) technology is increasingly deployed by threat actors in cyber operations, such as using AI-augmented malware to evade antivirus detection software or automate brute force attacks. However, one of the most prevalent emerging AI-driven cyber threats is the use of videos, dubbed “deepfakes,” that exploit AI systems to create believable, but fake, videos depicting individuals saying or doing things that never occurred. These videos can be used to spread false and misleading information, discredit or damage the reputation of brands and organizations, and more. As cybersecurity and IT teams are the first points-of-contact for suspicious content, teams must monitor the threat environment and be trained to proactively identify and escalate threats in partnership with enterprise risk management teams. Additionally, it is crucial for organizations to engage leadership in trainings to practice managing reputational risks associated with fallout from attacks of this nature.
 
2. Be aware of ecommerce risks
 
As Booz Allen and others have often observed, mobile apps, digital payments, and ecommerce platforms are expanding rapidly in the MENA region. In parallel, cybercriminal organizations are constantly looking for new ways to monetize the theft of sensitive information belonging to private sector companies and customers. In April 2018, Careem, a popular regional ride-hailing service, announced that unknown threat actors accessed customer data, which affected an estimated 14 million users. The successful attack is just the latest in a growing list of cyber attacks that demonstrates not only cybercriminals’ sophistication but also a growing interest in targeting and breaching organizations in the MENA region. It is important to ensure that databases are properly secured and encrypted, with regular vulnerability and compliance scanning, and properly configured intrusion prevention and detection technology to protect payment management systems and data repositories.
 
3. Invest in strengthening critical infrastructure 
 
Attacks against critical national infrastructure (CNI) entities are attractive to state-sponsored attackers because of the physical, social, and economic damage they can cause. Additionally, industry tradecraft secrets and intellectual capital held by companies operating in CNI sectors are lucrative targets for both state-sponsored actors and cybercriminals. Hackers have targeted oil and gas facilities in the region, most notably in the Triton and Shamoon attacks, while cyber espionage incidents are also increasing – evidenced by cyber breaches at dams and water facilities in the United States. Implementing secure architectures with multi-level segmentation for information and operational technology systems (IT and OT) alongside Network Security Monitoring can improve defenses as threat actors enhance their attack capabilities. In the Triton attack, malware targeted Safety Instrumented Systems at one of the largest oil and gas firms in the MENA region, allowing attackers to load malicious code onto infected systems. Monitoring could have provided early attack detection and well-defined architectures would have limited attackers’ ability to move throughout the company’s infrastructure.
 
4. Prepare for increasing disinformation on social media
 
The widespread and growing popularity of social media applications in the region is creating a fertile environment for disinformation. Both state-sponsored and cybercriminal entities are refining and deploying tactics, techniques, and procedures to manipulate public opinion, influence decision-making processes, and damage companies. These attacks range from orchestrating targeted breaches followed by public data leaks to employing troll armies to push disinformation on social media. While media narratives about the threat have focused heavily on Russia’s use of disinformation, countries and groups around the world are rapidly developing similar tools that can easily be turned against companies and other entities. People, organizations, and governments must remain acutely attuned to the reputational damage and financial consequences of such attacks – as well as the speed with which such incidents can spread beyond control. 
 
5. Be vigilant of the risks associated with IoT
 
As the Internet-of-Things (IoT) environment expands due to increasing device connectivity and deployment, the growing IoT attack surface means threats both exploiting and targeting the sector are escalating in parallel. Weaknesses in wireless routers, such as weak passwords and lax security controls makes routers a prime entry point into IT infrastructure that threat actors can exploit to infect IoT device networks. Openings in IoT networks vulnerable to cyber intrusions include smart televisions, internet-connected cameras, printers, kitchen appliances, and electronic home assistant devices, among others. Such attacks have already been used to establish botnets – indeed in 2018, the Andromeda botnet used social media to spread malware to more than a million new devices per month throughout the Middle East and Europe. Guarding against IoT-focused attacks requires strong password policies, strict adherence to security practices such as updating software and implementing patches, and regular vulnerability and compliance scans of enterprise networks.

Previous in Technology

Next in Technology


Home >> Technology Section

Latest Press Release

His Excellency Sheikh Nahyan Bin Mubarak Al Nahyan, Uae Minister of Tolerance, O ...

Share the joy of togetherness this Ramadan at The Pointe at Palm Jumeirah

HMRC and Dubai Customs seize 450 metric tons of illicit tobacco

Beauty in Its Purest Form: GROHE Launches New Ceramic and Bathtub Line Essence

Dubai Festival City Mall Rewards Shoppers With Instant Cash Back During 3-day Su ...

Healthy Farm launched its unique Healthy Living Program at GEMS' The Kindergarte ...

du LaLiga HPC Players at Levante UD for Professional Trials

Tracking Bags Drives 66% Improvement in Baggage Delivery

Now rollover unused data and minutes with the all-new ‘WaselGo' prepaid line

Dubai Cares kicks off a 3-year school health program in Liberia to tackle deworm ...

American Eagle Debuts It's Summer'19 Campaign, With a Capsule Collection for Ram ...

Experience the ‘How To Train Your Dragon' Egg Hunt at MOTIONGATE™ Dubai this Eas ...

Show Jumping Season to Come to an End after 17 Weeks with Emirates Longines Fina ...

Discover your perfect scent for the Holy Month at Rasasi Perfumes

All-new 2019 GMC Sierra arrives in the Middle East

Sheikh Zayed Book Award winners to receive accolades at special Louvre Abu Dhabi ...

800 Degrees Pizzeria launches exquisite Iftar menu this Ramadan

Abu Dhabi Primed to Show Diversity of Islam at 2nd Organisation of Islamic Coope ...

Rwanda opens doors to UAE investors

Olivier De Mendez Appointed Godiva's New President, UK & MENAT