{"id":97281,"date":"2017-04-12T07:20:25","date_gmt":"2017-04-12T12:20:25","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?p=97281"},"modified":"2017-04-19T08:41:01","modified_gmt":"2017-04-19T13:41:01","slug":"expert-insights-2-cyber-threats-security-caribbean-2017-update","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2017\/04\/expert-insights-2-cyber-threats-security-caribbean-2017-update\/","title":{"rendered":"Expert insights 2: Cyber threats and security in the Caribbean 2017 update"},"content":{"rendered":"
Our 2017 Expert Insight series on network intrusion and security in the Caribbean\u00a0continues with Hector Dias, a network\/IT security professional based in the Dominican Republic.<\/em><\/p>\n <\/p>\n In this the second in our Expert insights series for 2017 on cyber threats and security in the Caribbean, we are thrilled, once again, to have Hector Diaz of Cylance, a cybersecurity products and services company, who is based in the Dominican Republic. Previously, Hector was Regional Account Manager, Caribbean, at Intel Security (formerly known as McAfee). He has extensive experience in the IT security space, and possesses a diverse skills set, which includes a strong technical background in infrastructure and security.<\/p>\n ICT Pulse: \u00a0Hector, give us a quick recap of what have been the most prevalent types of incidents in the Dominican Republic and\/or in the Caribbean region over the past year or so? How has the threat landscape changed?<\/strong><\/p>\n Hector Diaz:<\/strong>\u00a0 \u00a0Hi Michele, thanks for having me as part of the series once again in 2017. The threat landscape in Caribbean region has evolved to incorporate new techniques and to cover a wider spectrum of targets. Every year more and more companies and consumers are depending on technology for pretty much each process from CRM systems to an individual purchasing some goods on the web. Per the 2016 Verizon Data Breach Report, and I quote \u201cin a [whopping] 93% of the cases they analyzed, systems were compromised in minutes or less and data exfiltration happened within minutes in 28% of cases. But even where exfiltration took days, the criminals didn\u2019t need to worry. In 83% of cases, victims didn\u2019t find out they\u2019d been breached for weeks or more<\/em>\u201d.<\/span><\/p>\n If we add to this the growing and visible threat of ransomware, I think we still have a lot of room for improvement in the region in the adoption of proper policies and user education which should be complemented also with technologies that can coexist with the user and provide protection without interfering with business processes or the actual user computing experience.<\/span><\/p>\n In terms of providing real\/objective data about incidents in the region, it is almost impossible to get our hands in some reliable data other than telemetry that vendors can collect to identify the origin of a threat or the number of detections that occur in a region, other than that, the region still lacks of regulations that obligate them to disclose IT security incidents.<\/span><\/p>\n ICTP: \u00a0Over the past year, ransomware incidents appeared to have been quite plentiful across the region. Are they still as huge a threat? <\/strong><\/p>\n HD: \u00a0<\/strong>Ransomware continues to be the most prevalent and visible threat and it has evolved from our last conversation on this topic, criminal campaigns today are more advanced compared to what we have seen in the past, with the added problem that samples and toolkits can be easily obtained and used successfully by criminals that have little to no hacking skills, often referred to as Ransomware as a Service (RaaS) and there are plenty of examples of this \u201cbusiness model\u201d where cybercriminals even provide Service Level Agreements (SLA) and Technical support to their \u201ccustomers\u201d massifying this problem to exponential levels, <\/span>these ransomware-as-a-service (Raas) offerings are being released more and more frequently.\u00a0Only three years ago, we would see maybe three or four legitimate RaaS offerings appear every year. Now, we see far more, often several per month.<\/span><\/p>\n Some of the features that some of these ransomware as a service \u201csubscriptions\u201d include:<\/p>\n In addition to that, we are seeing ransomware being used for much more than just the typical ransoms.<\/p>\n Our Cylance SPEAR research team have seen it used as a diversion; first harvesting credentials for later use, and then encrypting the drive to keep IT staff occupied while the attacker covers their tracks and accomplishes even more nefarious objectives. And more recently, we are seeing highly opportunistic campaigns that encrypt entire networks in an organization and delete host backups prior to encryption, leaving the entire organization held hostage and unable to operate.<\/span><\/p>\n Another problem with Ransomware\u2019s proliferation is how easy is for an attacker to create a new variant of a known piece of malware making it invisible for most Antivirus solutions that rely on signatures or file hashes to provide protection, that\u2019s why we have seen so many cases where a user or company gets infected a ransomware, they report the situation to their provider and despite the fact that they generate a signature to protect from this threat, maybe a couple of weeks after, the person or company gets affected again by the same problem. That makes evident that a new approach is needed to provide an appropriate level of protection and we have seen how many innovators are now exploring and developing new and innovative ways to tackle this problem, some of them from an endpoint detection and response perspective and some others, like Cylance, from a prevention standpoint.<\/span><\/p>\n ICTP: \u00a0What are some of the new and emerging threats of which we should be more aware? And are there any areas of concern that you have for Caribbean organisations?<\/strong><\/p>\n HD: \u00a0<\/strong>At Cylance, we focused on how threats evolve to adapt to security products and still evade security controls, we have seen several areas where threats have evolved in a special manner and we have written extensive blogs and research papers on the following areas, some of this are not new but attackers are still using the same methods, they just adapt them to evade security solutions, some of these are:<\/span><\/p>\n The antivirus (AV) industry uses code hooking to monitor processes for potentially malicious behavior, protect applications by injecting anti-exploitation checks, and isolate processes by sandboxing or virtualization. The technique can also be used by the bad actors, for instance to implement a rootkit to hide processes and network connections from the end-user and security software. Cylance has done extensive research on how attackers are using these techniques to evade traditional endpoint security solutions and become invisible in the victim\u2019s machine.<\/span><\/p>\n ICTP: \u00a0At the CARICOM\/regional level, there has been a growing awareness of cybercrime and cybersecurity, and calls by leaders for something be done. In your opinion, has there been any improvement in the cybersecurity-associated resources or support structures in the Dominican Republic, and\/or perhaps regionally? What might still be missing?<\/strong><\/p>\n HD: \u00a0<\/strong>The Caribbean region\u2019s awareness on cybersecurity is growing, we see more and more efforts from governments across the region to take this issue seriously. We have seen an increased participation of security professionals in multiple conferences representing their respective countries to advance the conversations around the implementation of cybersecurity laws and best practices.<\/span><\/p>\n We have seen also the creation of multiple regulations and guidelines for public entities to follow and implement those which is a dramatic advancement in the way public institutions are dealing with cybersecurity.<\/span><\/p>\n In my personal case, I\u2019ve been invited to meetings where the CIOs of multiple Caribbean countries have outlined their plans and policies and it\u2019s been good to see cybersecurity as a big part of their general Information technology frameworks.<\/span><\/p>\n\n
\n
\n
\n<\/span><\/li>\n\n
\n
\n