A confluence of factors means 2020 is primed for the breakout of some spectacular new threat vectors as well as the re-emergence of some old threat vectors that present new wrinkles. We also provide five-year cyberthreat predictions that highlight emerging technologies and tectonic tech shifts that will have profound implications for securing the businesses of the future, upending some of today’s standard security practices.For 2020
1. The death of traditional software piracy, the rise of malware auto-updates
Just over 10 years ago, the internet was riddled with Warez, keygen (key generators), and pirated software websites. It was easy to find versions of your favourite operating systems, applications, and tools with cracked versions and license keys that operated under the guise of being free—even though they were illegal and probably infected with malware.
Since the vast majority of users unreservedly trust the auto-update mechanisms of their applications, they are oblivious to the threats when their cloud connection is compromised. In 2020, this topic will command headlines as high-profile applications and operating systems are exploited by these cunning emerging threats.2. Reruns of old CVEs
January 2020 will usher in the end of life of Windows Server 2008 R2 and Windows 7. With millions of devices still running these operating systems, a myriad of vulnerabilities will continue to exist unless they are patched, or the operating systems are replaced. Microsoft is unlikely to patch any new Critical vulnerabilities, which will pose an unacceptable risk to many organisations. These assets, and their vulnerabilities, will be documented on vulnerability reports as an end of life operating system and vulnerabilities that are aging. These make for an easy asset attack vector for threat actors, and this will be especially true for new vulnerabilities that have no remediation path after January 2020.
To that end, vulnerabilities uncovered years ago will return to the cyber spotlight because of active exploitation and their age. This will make an old CVE a “new” threat. And, since it is costly and potentially technically difficult to replace some of these end-of-life operating systems, 2020 will experience threat actors actively assailing these systems since they present the lowest hanging fruit in many organisations for exploitation.3. Identity-theft royal flush - owning every account an individual owns
For the last several years, we have witnessed a surge of privileged attack vectors. A typical modus operandi involves threat actors compromising accounts to gain a foothold, then engaging in lateral movement, and then compromising additional assets and accounts via stolen credentials. The end goal varies—from the exfiltration of sensitive data, to gaining a persistent presence, or causing a business disruption. The year 2020 expects to showcase more of this, but there will be an additional component in lateral movement that security professionals need to raise visibility for; account-to-account lateral movement compromising a user’s entire identity.
As threat actors refine their strategies, they will begin to target all the accounts associated with an identity (human or non-human) and impersonate users via DeepFake technology. This will be characterised, not only by DeepFake email and SMS messages, but also a distinct rise in sophistication that entails DeepFake phone calls with spoofed accents and vocal patterns, social media hijacking, and even biometric hacking based on data that has already been compromised. Identity theft will bluntly occur due to malicious artificial intelligence software used to impersonate an identity in novel ways we have not even yet conceived.4. An election on the edge of cybersecurity
It matters not whether you are Republican, Democrat, Libertarian, Green Party, an Independent—or even unable to participate in the US elections—the potential for election hacking has implications for everyone.
The votes in the next major US elections will most likely be tabulated and recorded by person, by voting precinct, by county, and by state. At each step in the voting process, paper and electronic systems will record our votes and be stored in secure systems to tally who our next president and regional government officials will be. This is a contentious election cycle. Considering all the previous allegations regarding voter fraud and foreign government hacking of our electoral system, as well as old school paper ballot issues (i.e. hanging chads), the 2020 United States election will doubtlessly prove to be one for the record books—and potentially one to dread.
Ethical hackers have already demonstrated at cybersecurity conferences the vulnerability of electronic voting systems. The risks of voter fraud, through electronic hacking, will be a top news story in 2020. The issue will particularly be stirred up by those individuals who find themselves at the losing end of the final ballot numbers. If the US presidential race is close, hacking will become the centre of attention and cybersecurity forensics will be required to prove, or disprove, whether or not a threat actor truly succeeded in altering the election. This will also play out in congressional races and other down-ticket offices, potentially undermining leadership for our next slate of elected representatives. We will all be waiting breathlessly long after the final vote has been tallied to learn if the vote integrity, and security, has been upheld.
The next five years
1. The end of end-user passwords
There is a push by major operating system and software application vendors to remove the dependency on passwords for end users. Authentication techniques—from biometrics to keyboard pattern recognition—have proven reliable enough to make this a reality. In the next five years, expect to see these techniques go mainstream and gain corporate acceptance. The average non-IT end user will no longer require a password for routine computing. However, expect credentials and passwords for privileged accounts and legacy systems to stick with us for at least 10 more years.
Microprocessors based on x86 and x64 technology are beginning to show their age. While we can expect them to persist for the next 20 years, ARM-based computers and tablets are on the rise. A next-generation Windows and MacOS is rumoured to already be running on ARM. These processors herald a tidal shift in terms of security, power, and even performance. In the next 5 years, expect the shift from legacy CPU architectures to ARM. The benefits of security protection strategies, as in ChromeOS, will become more mainstream as they operate on these next-gen processors. We will require new security solutions to protect against the unique characteristics inherent of these new devices as threat actors learn to leverage them.
3. Facial recognition-based transactions
Overseas, there was a recent demonstration of a vending machine authorising a transaction strictly based on facial recognition technology. In addition, major airlines in the United States have been experimenting with facial recognition to authorise boarding passes versus paper, photo ID, and even passports. While this technology is still relatively immature, it shows substantial promise. It also has the potential to introduce new extraordinary security risks and data privacy concerns.
4. Cloud security and landscape
I know we bludgeon the cloud angle to death, but the ever-popular cloud-based architecture and modelling will continue to grow. The cloud market continues its massive expansion with more demands for availability, scalability, and security. Over the next five years, cloud offerings will double, even triple, what they are today.
We foresee demand for technologies that secure cloud-based assets, cloud-based identities, cloud-based keys, and all other aspects of cloud continuing to ramp up over the next five years.Cybersecurity predictions are more than just a fun exercise. The more CISOs and other IT staff understand the security implications of evolving technologies, the better prepared they are to make the right investments for their business. Its the difference between being proactive versus reactive, and having a security approach that enables new technologies and business opportunities, versus one that clamps down on them.