CYBER SECUIRTY & FRAUD
Crime and punishment Thanks to AI, cyber criminals can now operate at an almost industrial scale – but AI also holds one of the keys to stopping it. Paul Skeldon takes a look at the wider world of fraud and what can be done to tackle it 2023 appears on the face of it to have been a good year for cybersecurity. As we reported latterly in November and December on Telemediaonline.co.uk, great strides have been made in combatting many of the frauds hung around DCB – the battle not won, but certainly not lost. However, the rise of SMS fraud and the increasing use of AI among cyber criminals to get smarter, faster and more niche has made the picture less rosy.
As reported in late January 2024 by Gcore in its excellent Radar Report (see panel), there has been a surge in high volume DDoS attacks in 2023, now being measured in terabits rather than gigabits. Ransomeware attacks in 2023 also grew, with IBM reporting that March alone saw 400 attacks – with more than 34 on local government offices in the US that month. The problem is that, while
cyber security has got better, so have the cyber criminals – who can now operate on an almost industrial scale, perpetrating massive volumes of attacks, rapidly. And it is only set to expand in the year ahead.
THE YEAR AHEAD
So, what does 2024 have in store for cyber security? Well, where 2023 may have been a ‘good’ year for the cyber security industry, this year is set to see a new wave of problems. AI and GenAI is, in the words of Charles Henderson, Global Head, IBM X-Force, going to make “customer acquisition” much easier for cyber criminals.
There is a lot of stolen data out there, but until now it has been relatively hard to extract all its value. GenAI now makes it possible to sift through all the data points and find all the value. If that wasn’t enough, GenAI will also be able to help the crims optimise target selection. This will see both ‘civilians’ and corporations come under new levels of attack and new forms of security compromise. AI voice cloning, for example, could spell havoc with all manner of telemedia services. With voice tipped to be a biometric verification tool to supplant SMS OTP – which itself is seeing a different and costly fraud in AIT – security could be further weakened rather than improved. Similarly, AI created deep fakes and fake shopping bots are also starting to hit merchants and retailers of all kinds with fraudulent traffic and fake orders, returns and other scams. 2024 is a year of global events that will also add grist to the fraudsters’ mill. The Paris Olympics is likely to see a surge
Radar love: DDoS attacks 2023 International cloud and edge solutions provider, Gcore’s Q3-Q4 2023 Gcore Radar report finds that there were a number of significant developments in the scale and sophistication of cyberthreats in 2H 2023, including: • The maximum attack power rose from 800 Gbps (1H 2023) to 1.6 Tbps • The most attacked business sectors were gaming (46%), financial (including banks and gambling services) (22%) and telecom (18%) • USA (24%), Indonesia (17%) and The Netherlands (12%) list as the top three attack source countries • The average length of attack was approximately an hour, however, In Q3/Q4, the longest attack duration lasted nine hours. • UDP floods constitute 62% of DDoS attacks. TCP floods and ICMP attacks remain
18
popular at 16% and 12% respectively and SYN, SYN+ACK flood, and RST Flood, account for just 10% combined • The past three years have brought about more than a 100% annual increase in DDoS peak (registered maximum) attack volume. In 2022, the peak capacity of DDoS attacks increased from 300Gbps (2021) to 650 Gbps. In Q1–Q2 of 2023, it increased again to 800 Gbps, while in Q3–Q4 of 2023, it rocketed to 1600 Gbps (1.6 Tbps) • The jump in H2 of 2023 has resulted in the cybersecurity industry now measuring DDoS attacks in a new unit, Terabits. This escalation illustrates a significant and ongoing rise in the potential damage of DDoS attacks which, according to Gcore, is a trend that it expects to see continue in 2024. Commenting on these findings, Andrey Slastenov, Head of Security Department at
More news, views and analysis at www.TelemediaOnline.co.uk
Gcore, says: “The exponential surge in attack power and variation in attack methods that we saw in the second half of 2023 illustrates how sophisticated cyber attackers are becoming. It’s more essential than ever for organisations to adopt a multifaceted defence strategy that can protect against a range of DDoS techniques. Failure to address these evolving threats can result in costly disruptions, reputational damage, loss of customer trust, and security breaches.” Slastenov concludes: “The increase in attack power to 1.6Tbps is particularly alarming, signalling a new level of threat for which organisations must prepare. Paired with the geographical distribution of attack sources, it’s clear that DDoS threats are a serious and global issue, necessitating international cooperation and intelligence sharing to mitigate potentially devastating attacks effectively.”