{"id":11610,"date":"2015-12-28T06:00:26","date_gmt":"2015-12-28T14:00:26","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=11610"},"modified":"2016-02-11T11:45:36","modified_gmt":"2016-02-11T19:45:36","slug":"2016-prediction-14-six-predictions-for-asia-pacific","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/12\/2016-prediction-14-six-predictions-for-asia-pacific\/","title":{"rendered":"2016 Prediction #14: Six Cybersecurity Predictions for Asia-Pacific"},"content":{"rendered":"<p><em>This is the fourteenth, and final, in our <\/em><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/predictions\/\" target=\"_blank\"><em>series of cybersecurity predictions<\/em><\/a><em> for 2016. Stay tuned for more through the end of the year.<\/em><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:35%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10981 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-500x175.png\" alt=\"Top-10-Predictions-Banner\" width=\"500\" height=\"175\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-230x81.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Top-10-Predictions-Banner-114x40.png 114w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<h3>1. Ransomware<\/h3>\n<p>Ransomware will continue to evolve its methods of propagation and evasion techniques, hiding its communication and the targets it seeks. As reported by the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/cyber-threat-alliance\/\">Cyber Threat Alliance<\/a>, ransomware has been very lucrative for cybercriminals to launch campaigns and, in a short period of time, derive large revenue streams. Today, the value of credit card data is low compared to ransomware, where higher value can be extracted from more victims.<!--more--><\/p>\n<p><a href=\"http:\/\/cyberthreatalliance.org\/cryptowall-report.pdf\" rel=\"nofollow,noopener\" >Research by the Cyber Threat Alliance reported<\/a> that CryptoWall v3 generated more than $325 million for the group behind it. This will drive further versions of ransomware-style attacks to be released, allowing more cybercriminals to extort users to pay the ransom to get the decryption key for their data. We predict seeing this crossing over to other platforms, such as Mac OS X and mobile operating systems.<\/p>\n<h3>2. Sharing of Threat Intelligence<\/h3>\n<p>Efforts have been around for years to share threat intelligence in some verticals, and we predict that 2016 will mark a year in which the private sector and security vendors look to share more of this than they ever have in Asia-Pacific. Today, many adversaries often write one piece of malware and send it to multiple organisations, with only minor changes made to make it undetectable. However, if we, as a community, can force cyber adversaries to create multiple unique attacks each time, it will force their costs to go up. And if we can share the information, the defender costs go down. The benefits grow exponentially if we automate this process whereby organisations do this in real time, whilst preventing the attacks. Knowing what kinds of actors are targeting you, the tools that they have available, and the tactics they employ allows organisations to defend their networks more effectively.<\/p>\n<p>Although the debate continues on how effective these regulations will be, Asian governments should look to foster the sharing of threat intelligence, and organisations should think about how they can share in their vertical and go cross vertical in their efforts. We should ensure that there are responsible privacy protections in place for the purpose of identifying, preventing, mitigating and responding to cyberthreats,\u00a0vulnerabilities, and malicious campaigns. The faster organisations can share this information, the better we can serve to protect each other and push the cost back to the attackers.<\/p>\n<p>We expect this trend to continue, as more organisations begin to realise the benefits of sharing knowledge as a means to unify efforts to fight against cyber intrusions in Asia-Pacific.<\/p>\n<h3>3. Secondary Victim Attacks<\/h3>\n<p>More and more we are seeing that, when we know the motive of an attack, there is usually a secondary victim. The <a href=\"http:\/\/www.verizonenterprise.com\/DBIR\/\" rel=\"nofollow,noopener\" >2015 Verizon Data Breach Report<\/a> highlighted that adversaries are using third-party websites to deliver their attacks. This often can mean that the person or organisation that experiences the initial breach isn\u2019t the real target but rather a pawn in a bigger attack.<\/p>\n<p>From the perspective of an attacker, this allows them to take advantage of trust and use the resources of another company for their gain. The most common method seen in Asia Pacific has been \u201cwatering hole attacks\u201d, where an organisation\u2019s website is infected with exploit code to try and infect visitors of their site. We predict that this will continue to rise with more reported incidents coming to light in 2016.<\/p>\n<h3>4. Trust in Our Security Models<\/h3>\n<p>Over the past few years, cyberattacks have escalated and gotten more aggressive and successful. Not only have we seen it become easier and cheaper to launch successful attacks, it has eroded our digital trust in online systems. That trust also extends itself to the failure of legacy security architectures due, not only to an\u00a0outdated\u00a0assumption\u00a0that\u00a0everything\u00a0on\u00a0the inside of an organisation\u2019s network can\u00a0be trusted, but also the inability of legacy countermeasures to\u00a0provide\u00a0adequate visibility, control and protection. \u00a0We expect to see more organisations adopting new security models, such as \u201cZero Trust,\u201d which is intended\u00a0to\u00a0remedy\u00a0the\u00a0deficiencies\u00a0with perimeter-centric strategies and the legacy devices and technologies used to implement them. It does this by promoting \u201cnever trust, always verify\u201d as its guiding principle.<\/p>\n<p>This\u00a0differs\u00a0substantially from conventional security models that operate on\u00a0the\u00a0basis\u00a0of\u00a0\u201ctrust\u00a0but\u00a0verify\u201d. Essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications and the communications traffic between them, regardless of their location. We expect this will continue across Asia-Pacific in 2016.<strong>\u00a0<\/strong><\/p>\n<h3>5. Attacking the Internet of Things<\/h3>\n<p>Whole\u00a0new categories of digital device are\u00a0getting\u00a0connected to the Internet, from domestic appliances to home security, and the list goes on. <a href=\"http:\/\/www.gartner.com\/technology\/research\/internet-of-things\/\" rel=\"nofollow,noopener\" >Gartner predicts<\/a> the number of connected things will rise from 6.5\u00a0billion in 2015 to almost 21 billion by 2020, growing by a staggering 5.5 million \"things\" each day. \u00a0This will continue to accelerate in 2016. Sadly, we see no reason why these things won\u2019t become a target for cybercrime. During this year we have seen some evidence of this emerging trend, like attacks on cars, smart rifles and many more shown at Black Hat USA in August this year. We don\u2019t expect to see millions of devices compromised in 2016 across Asia-Pacific, but we should be prepared to see more attacks and proofs of concepts trying to exploit these types of devices.<strong>\u00a0<\/strong><\/p>\n<h3>6. Cybercrime Legislation<\/h3>\n<p>Asia-Pacific has often operated under very lax regulations when it comes to cybersecurity. It is a global issue; however, regulations to safeguard businesses and consumers are still evolving around the world. It\u2019s unsurprising that the USA is taking the lead on this front, given the number of high-profile attacks reported to have targeted U.S. firms in recent years. This has resulted in cybersecurity becoming a focus for policy, most recently seeing the introduction of the <a href=\"http:\/\/www.scmagazine.com\/cisa--what-are-the-international-implications\/article\/450520\/\" rel=\"nofollow,noopener\" >Cybersecurity Information Sharing Act<\/a> (CISA), which aims to help U.S. companies work with their government to combat hackers. Similarly, the European Union has laid out 14 actions to improve cybersecurity readiness, along with a <a href=\"http:\/\/ec.europa.eu\/digital-agenda\/news-redirect\/9601\" rel=\"nofollow,noopener\" >policy on Critical Information Infrastructure Protection (CIIP),\u00a0<\/a>which aims to strengthen the security and resilience of vital ICT infrastructure by supporting high level preparedness, security and resilience capabilities at a national and EU level.<\/p>\n<p>We expect that we will see a significant shift in the mindset of governments and regulators in Asia-Pacific to take on an even more active role in protecting the Internet and safeguarding its users. Cybercrime laws will be in discussion, and changes to outdated cybersecurity standards will be mandated to bolster an improved stance on security.<\/p>\n<p><iframe loading=\"lazy\" width=\"668\" height=\"1300\" style=\"border: 1px solid #CCC; border-width: 1px; margin-bottom: 5px; max-width: 100%;\" src=\"\/\/www.slideshare.net\/slideshow\/embed_code\/key\/jusOc0MVArniq5\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\"> <\/iframe><\/p>\n<p><em>Want to explore more of our top 2016 cybersecurity predictions? <a href=\"https:\/\/boom.weboom.com\/sites\/paloaltonetworks\/ignite2016\/forms\/regform.html\" rel=\"nofollow,noopener\"  target=\"_blank\">Register now<\/a>\u00a0for Ignite 2016.<\/em><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:24.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10919 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-500x124.png\" alt=\"Ignite 2016\" width=\"500\" height=\"124\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-500x124.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-230x57.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-510x126.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016-162x40.png 162w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Ignite-2016.png 603w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is the fourteenth, and final, in our series of cybersecurity predictions for 2016. Stay tuned for more through the end of the year. 1. Ransomware Ransomware will continue to evolve its &hellip;<\/p>\n","protected":false},"author":140,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1766,229],"tags":[1668,834,662,1544,464,221],"coauthors":[1339],"class_list":["post-11610","post","type-post","status-publish","format-standard","hentry","category-cso-perspective","category-predictions","tag-critical-information-infrastructure-protection","tag-cryptowall","tag-cyber-threat-alliance","tag-cybersecurity-information-sharing-act","tag-internet-of-things","tag-ransomware"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11610","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/140"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=11610"}],"version-history":[{"count":5,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11610\/revisions"}],"predecessor-version":[{"id":11646,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11610\/revisions\/11646"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=11610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=11610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=11610"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=11610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}