The top three cybersecurity threats you didn’t know to look out for

Free cyber security courses
(Image credit: Pixabay)

Today’s organizations are being subjected to an ever-changing and ever-evolving threat landscape. In this ‘new normal,’ applying conventional strategies to challenges, such as ransomware, is no longer enough. It’s vital that IT teams, security teams, and members of the board know where to focus their enterprise security and resiliency efforts so they can anticipate, withstand, and recover from modern cyber attacks.

As we approach the final quarter of 2023, we look ahead at the top three cybersecurity threat trends that security professionals should be preparing to repel.

1. Living Off the Land (LOL) techniques

Silent attacks that remain hidden for extended periods of time pose a unique risk to businesses. Today’s hackers are using far less malware. Instead, they Live Off the Land (LOL), using the operating system against itself by exploiting native legitimate tools like signed binaries (LOLBins), scripts (LOLScripts), and libraries to camouflage malicious activity, blend in, and bypass even the most advanced security defenses.

Unlike traditional attacks that leverage malware, LOL attacks use native OS utilities that are required to run the OS and aid IT operations. Inherently they are not malicious. So while conventional tools log LOL activities on each endpoint they do not alert on them. For example; Cmd.exe, the default command-line interpreter for Windows can be used to evade defensive countermeasures or to hide as a persistence mechanism. 

This creates a difficult dilemma for security. How can they alert when legitimate tools are being used, as designed, but for nefarious reasons? Is it even possible to alert on intent? LOLBins are becoming the technique of choice because they blend in. It’s a method that was leveraged by the Volt Typhoon group to conduct surveillance on water and electric utilities that serve military installations in the United States and abroad.

Traditional security tools collect evidence of malice in the network and on the endpoint. They are a critical layer of defense that detect malicious files and activities, but they are not built to detect the stealth techniques, such as the LOLBins, used by the Volt Typhoon group. To defend data against this kind of attacks, organizations will need to enable a step change to their defenses, introducing realist decoys that will trick bad actors into engaging with these false resources and exposing their techniques; a move which in turn alerts the organization's security teams to a potential lurking threat.

David Ngo

CTO of Metallic Security at Commvault

2. Artificial Intelligence (AI)

Today’s hackers are using advanced tools like AI and machine learning to automate and coordinate attacks and increase their effectiveness. They are also utilizing AI to understand the defenses organizations have put in place to prevent attackers from penetrating their environments. No longer limited by the need to manually produce their threat campaigns, bad actors are utilizing readily available generative AI tools like ChatGPT and fine tuning them to meet their needs - whether that’s creating highly personalized phishing content at scale or generating keystroke malware and basic malware code that’s adapted to specifically ‘crack’ a target system’s credentials and algorithms.

According to a recent report, cybersecurity experts at large enterprises say that generative AI has already fueled a significant uptick in attacks. To combat the rising volume, organizations will need to make use of defensive AI and machine learning that makes it possible to: automate the detection and remediation of non-compliant systems; apply automated patching, configuration, and upgrades for software assets; and handle traditionally labor-intensive activities such as identity and access management (IAM) and reporting. In other words, using AI to drive compliance with a hardened zero trust architecture and meet threats head on with real-time visibility and early warnings that support a proactive defense posture.

3. Ransomware-as-a-Service

Ransomware poses one of the biggest threats to businesses of every size, in every industry sector. Highly organized groups have now evolved sophisticated Ransomware-as-a-Service (RaaS) subscription and distribution models that make it easier for threat actors, with little or no expertise, to compose a state-of-the-art attack comprised of the most modern techniques across the attack lifecycle.

Specializing in specific elements of the attack process, today’s RaaS operators are offering kits that feature everything from payment portals and ‘support services’ for victims to a choice of ransomware variants (such as LockBit, Revil, and Dharma). Others are acting as access brokers that specialize in discovery. Affiliates that buy or lease these RaaS kits are then free to put all these elements together to execute a ransomware attack, paying a fee or sharing a portion of their profits.

The emergence of the RaaS business model means that the frequency and sophistication of ransomware attacks is increasing. With this in mind, organizations will need to double down on their cybersecurity activities. Whether that’s amping up vulnerability management strategies and implementing early warning cyber detection tools or deploying automated remediation and data backup and recovery in production environments, to ensure they can quickly recover following an attack.

Adopting a resiliency mindset

The proliferation of new and emerging cyber threats mean that organizations will need to break the silos between security and IT operations and shift their thinking towards a collaborative resilience strategy and IT infrastructure that fights through cyber attacks. This is a shared responsibility inclusive of segmentation, redundancy, deception, contextual awareness, privilege restriction, and more.

Understanding that the likelihood of a cyber attack is a case of ‘when not if,’ they will need to initiate early detection capabilities and ensure they are proactively on the lookout for threats, so they can respond to attacks and security incidents quickly. The return to business-as-usual operations following a security event should now be a top security ambition, so rock solid data recovery procedures are a must have.

We've featured the best identity management software.

TOPICS
CTO, Metallic at Commvault

David Ngo is CTO for Metallic at Commvault. He has led engineering alliances with strategic partners, such as Microsoft and NetApp before joining Commvault, leading cloud and virtualization efforts.

Read more
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
ransomware avast
“Every organization is vulnerable” - ransomware dominates security threats in 2024, so how can your business stay safe?
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Sounding the alarm on AI-powered cybersecurity threats in 2025
A padlock resting on a keyboard.
AI-powered cyber threats demand enhanced security awareness for SMEs and supply chains
An image of network security icons for a network encircling a digital blue earth.
Why effective cybersecurity is a team effort
Representational image of a hacker
The 10 worst software disasters of 2024: cyberattacks, malicious AI, and silent threats
Latest in Pro
Cybersecurity
Why OT security needs exposure management to break the cycle of endless patching
Employees sat around together discussing business issues.
AI deregulation: what smart leaders do when the rules go off the rails
Branch office chairs next to a TechRadar-branded badge that reads Big Savings.
This office chair deal wins the Amazon Spring Sale for me and it's so good I don't expect it to last
Saily eSIM by Nord Security
"Much more than just an eSIM service" - I spoke to the CEO of Saily about the future of travel and its impact on secure eSIM technology
NetSuite EVP Evan Goldberg at SuiteConnect London 2025
"It's our job to deliver constant innovation” - NetSuite head on why it wants to be the operating system for your whole business
FlexiSpot office furniture next to a TechRadar-branded badge that reads Big Savings.
Upgrade your home office for under $500 in the Amazon Spring Sale: My top picks and biggest savings
Latest in News
DeepSeek
Deepseek’s new AI is smarter, faster, cheaper, and a real rival to OpenAI's models
Open AI
OpenAI unveiled image generation for 4o – here's everything you need to know about the ChatGPT upgrade
Apple WWDC 2025 announced
Apple just announced WWDC 2025 starts on June 9, and we'll all be watching the opening event
Hornet swings their weapon in mid air
Hollow Knight: Silksong gets new Steam metadata changes, convincing everyone and their mother that the game is finally releasing this year
OpenAI logo
OpenAI just launched a free ChatGPT bible that will help you master the AI chatbot and Sora
An aerial view of an Instavolt Superhub for charging electric vehicles
Forget gas stations – EV charging Superhubs are using solar power to solve the most annoying thing about electric motoring