Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

Cybersecurity Snapshot: Cyber Pros Say How AI Is Changing Their Work, While the FBI Reports Ransomware Hit Critical Infrastructure Hard in 2023

Cyber Pros Say AI Is Changing How They Work, While the FBI Reports Ransomware Hit Critical Infrastructure Hard in 2023

More than 40% of ransomware attacks last year impacted critical infrastructure. Plus, a survey shows how artificial intelligence is impacting cybersecurity jobs. Meanwhile, MITRE updated a database about insider threats. And why you need a custom compensation strategy to recruit cyber pros. And much more!

Dive into six things that are top of mind for the week ending March 8.

1 - FBI: Critical infrastructure walloped by ransomware attacks in 2023

The number of U.S. ransomware incidents grew 18% in 2023 to 2,825, and 42% of those attacks impacted critical infrastructure organizations. LockBit, ALPHV/Blackcat, Akira, Royal and Black Basta ranked as the most prevalent ransomware variants affecting critical infrastructure.

That’s according to the “2023 Internet Crime Report” which was released this week by the FBI’s Internet Crime Complaint Center (IC3) and also found that healthcare was the hardest hit among critical infrastructure sectors, with 249 reported attacks.

Critical infrastructure walloped by ransomware attacks in 2023

(Source: “2023 Internet Crime Report” from the FBI’s Internet Crime Complaint Center, March 2024)

Overall, ransomware losses skyrocketed 74% to almost $60 million, as attackers employed new tactics, such as pelting victims with multiple ransomware variants.

Looking at cybercrime in general, individuals and businesses in the U.S. lost $12.5 billion, a hefty 22% jump over 2022. The number of cybercrime complaints grew almost 10% to 880,000.

Cybercrime booms in 2023 in the US

(Source: “2023 Internet Crime Report” from the FBI’s Internet Crime Complaint Center, March 2024)

Those are big numbers, but the FBI calls them “conservative” because many incidents go unreported. An example: When the FBI recently infiltrated the Hive ransomware group’s infrastructure, it found that only about 20% of Hive's victims had filed a law enforcement report.

Meanwhile, investment fraud topped all crime categories with investment scams losses rising 38% to $4.57 billion. Business email compromise (BEC) ranked second with $2.9 billion in losses.

For more information about cybercrime trends:

VIDEOS

Tenable CEO Amit Yoran Discusses Ransomware Attack on UnitedHealthcare (CNN)

Homeland Security Testimony 2024: Funding critical infrastructure and secure by design (Tenable)

Ransomware in OT Systems (Tenable)

2 - Survey: AI transforming cybersecurity work

Artificial intelligence, including generative AI, has started substantially changing how cybersecurity professionals work – both in positive and negative ways.

That’s according to ISC2’s survey “AI in Cyber 2024: Is the Cybersecurity Profession Ready?”, based on a poll of 1,123 cybersecurity pros.

Key findings include:

  • 88% of cybersecurity pros polled said they expect AI to “significantly impact” their roles and tasks over the next couple of years
  • 35% said AI is already reshaping how they perform their daily jobs
  • 56% expect AI to make at least some parts of their jobs obsolete
  • 82% forecast AI will make them more efficient at work

The chart below shows where respondents expect AI to improve their efficiency.

AI transforming cybersecurity work

(Source: “AI in Cyber 2024: Is the Cybersecurity Profession Ready?” from ISC2, February 2024) 

These tasks are lower-value, time-consuming functions, meaning AI is unlikely to replace cyber pros, but rather free them up to focus on complex, higher-value tasks, the ISC2 said in its article about the survey “The Real-World Impact of AI on Cybersecurity Professionals.

“There is no doubt that AI is going to change and redefine many cybersecurity roles, removing people from certain high-speed and repetitive tasks, but is less likely to eliminate human cybersecurity jobs completely,” reads the article.

Respondents also voiced concerns about AI, including: 

  • Its use by cybercriminals for malicious purposes, such as: 
    • deepfakes, cited by 76% of respondents 
    • disinformation campaigns (70%)
    • social engineering (64%)
  • Regulatory, ethical and privacy issues, such as: 
    • a lack of regulation (59%)
    • ethical violations (57%)
    • privacy invasion (55%)

Also of concern is that many organizations are adopting AI without having a usage policy in place to ensure it’s used safely, legally and responsibly. Specifically, only 27% of respondents said their organizations have a policy for using AI safely and ethically, and only 15% have a policy for securing and deploying AI.

AI is transforming cyber work

(Source: “AI in Cyber 2024: Is the Cybersecurity Profession Ready?” from ISC2, February 2024)

For more information about the use of AI by cybersecurity teams:

VIDEO

Tenable CEO Amit Yoran discusses AI and preventive security (CNBC)

3 - U.S.: Phobos ransomware hitting critical infrastructure, emergency services

And we’re returning to the topic of how ransomware gangs have their sights set on critical infrastructure targets.

The FBI, the Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are advising U.S. local governments to act immediately to lower the risk of falling victim to the Phobos ransomware-as-a-service operation.

In the joint advisory “#StopRansomware: Phobos Ransomware,” the agencies said that since May 2019, Phobos has targeted state, local, tribal and territorial governments, disrupting emergency services, critical infrastructure facilities, public healthcare organizations and more.

 

Phobos ransomware hitting critical infrastructure, emergency services

 

The new joint advisory includes Phobos tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) observed as recently as February 2024, along with recommended mitigations.

Steps that cybersecurity teams should take as soon as possible include:

  • Secure Remote Desktop Protocol (RDP) ports and strictly limit the use of RDP and other remote desktop services by, for example:
    • Closing unused RDP ports
    • Applying phishing-resistant multi-factor authentication (MFA)
    • Logging RDP login attempts, and locking out accounts after a pre-determined number of login attempts
  • Prioritize the remediation of known exploited vulnerabilities
  • Adopt application controls and specifically allowlist remote access programs to prevent attackers from installing their own remote access tools

4 - MITRE adds mitigations to Insider Threat TTP KB

If you use MITRE’s “Insider Threat TTP Knowledge Base,” there’s news to share: This comprehensive collection of insider-threat TTPs has been enhanced and expanded.

What’s new? For starters, version 2.0 of the “Insider Threat TTP Knowledge Base” now includes mitigation recommendations for each one of the techniques in the database. 

 

MITRE adds mitigations to Insider Threat KB

 

The most common mitigations included are foundational practices, such as account management, multi-factor authentication, auditing, and disabling or removal of features or programs. 

“These demonstrate that basic cyber hygiene is still essential and effective when designing a security program,” wrote Mike Cunningham and Suneel Sundar from MITRE Engenuity’s Center for Threat-Informed Defense in the blog “Insider Threat Knowledge Base 2.0.

Also new in version 2.0 are additional techniques, as well as observable human indicators (OHI), which are attributes of individuals, such as their job title and access level, that can be used to factually assess their potential to be an insider threat risk.

For more information about insider cyberthreats:

5 - Study: Cyber recruiting requires custom compensation strategy

As has been well documented, finding qualified candidates to fill cybersecurity jobs is a challenge, as demand vastly exceeds supply. 

Given the difficulty in recruiting and retaining cybersecurity pros, CISOs and their hiring managers must get their compensation strategy right. A big part of that is understanding that they can’t rely on a conventional approach to compensation.

That’s according to IANS Research and Artico Search, which just published their “2023-2024 Cybersecurity Staff Compensation Benchmark Report,” based on a poll of 560-plus cyber pros in the U.S. and Canada.

“Comprehensive, infosec-specific compensation data is critical for benchmarking, as recruiting in security often requires specialized compensation packages to compete for talent and minimize attrition,” the firms said in the blog “Key Infosec Staffing Insights.

One particularity, as the report found, is that cybersecurity staffers often wear multiple hats, so one person may be involved in application security (AppSec); product security; and identity and access management.

The chart below shows the percentage of cybersecurity pros that support more than one functional area. For example, among those whose primary role is security operations (SecOps), 39% are also involved in governance, risk and compliance (GRC); 47% in architecture and engineering (A&E); and 31% in AppSec.

Cyber recruiting requires custom compensation strategy

(Source: “2023-2024 Cybersecurity Staff Compensation Benchmark Report” from IANS Research and Artico Search, February 2024)

“We advise CISOs review the responsibilities and functional overlap of roles within their organization to determine how they align with those of other companies,” the blog reads.

For more information about cybersecurity salary trends:

6 - White House urges use of memory-safe coding languages

The White House is pleading with software and hardware makers to use memory-safe programming languages, arguing that doing so will help reduce pervasive memory vulnerabilities that cyberattackers frequently leverage.

Memory safety bugs can allow hackers to maliciously manipulate how memory is accessed, written, allocated or deallocated, according to the White House’s “Back to the Building Blocks: A Path Toward Secure and Measurable Software” report.

“Building new products and migrating high-impact legacy code to memory safe programming languages can significantly reduce the prevalence of memory safety vulnerabilities throughout the digital ecosystem,” reads the report. It identifies C and C++ as memory-unsafe languages.

 

White House urges use of memory-safe coding languages

 

The report echoes a call that cybersecurity agencies from multiple countries, including the U.S., made in December when they jointly published “The Case for Memory Safe Roadmaps” guide, which listed C#, Go, Java, Python, Rust and Swift as memory-safe languages.

The White House report, created by the Office of the National Cyber Director (ONCD), also calls for the development of better diagnostic metrics to measure software products’ cybersecurity quality.

To get more details about the White House initiative, check out:

 

For more information about memory safe programming languages:

Related Articles

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.