­
Exploring the Most Dangerous Attack Techniques in 2024 - All Articles - CISO Platform

12744904686?profile=RESIZE_710xIn a recent panel hosted by CISO Platform, cybersecurity experts discussed the evolving landscape of cyber threats in 2024. The panel highlighted the escalating danger posed by AI-driven attacks, with malicious use of AI becoming increasingly prevalent. Experts emphasized the rapid evolution from traditional malware to AI-powered threats, posing challenges for both offensive and defensive cybersecurity strategies.

The discussion also spotlighted the surge in ransomware incidents, illustrating real-world examples such as attacks on critical infrastructure and high-profile extortion attempts targeting major firms. Experts cautioned about the heightened risk of post-authentication attacks and stressed the importance of holistic cybersecurity measures. The panel concluded with a call to action for organizations to enhance their cybersecurity posture through advanced detection technologies, rigorous training, and proactive threat mitigation strategies.

Panelists:

  • Dr. Ram Kumar G, Global Automotive Company (moderator) 
  • Vishal Kalro, Adobe Systems
  • Shankar Jayaraman, Akasa Air
  • Raghavendra Bhat, SAP Labs
  • Soumyadeep Basu, FireCompass

Executive Summary :  

Dangerous Attack Techniques

Weaponization of AI

  • Good AI vs. Bad AI: AI can be used both defensively and offensively.
  • Malware Creation: AI can generate malware variants quickly, making it harder to detect.
  • Ransomware: Continues to be a major threat, evolving in methods and impact.

Polymorphic Malware

  • Changing Characteristics: This type of malware changes its characteristics to evade detection.
  • Detection Challenges: Traditional signature-based methods struggle against polymorphic malware.
  • AI Poisoning: Risks include label and data poisoning, making detection difficult.

Compromising Authenticated Access

  • Authenticated Access Attacks: Focus has shifted to compromising authenticated sessions.
  • Technology Landscape: Federated access, SSO, and AI-based tools contribute to this threat.
  • Behavioral Root Causes: Social engineering and phishing remain major attack vectors.

Underground Markets

  • Zero Days: Firewalls and VPNs are major targets for zero-day exploits.
  • Security by Design: Many traditional security products lack a secure-by-design approach.

Identifying and Preventing Attacks

Indicators of Compromise

  • Ransomware: Entry points often include phishing, unpatched systems, and USB sticks.
  • Adversarial AI: Use of AI lowers entry barriers for creating sophisticated attacks.
  • Behavior Analysis: Establishing baselines and monitoring for deviations can help in early detection.

Real-World Examples

VPN/Firewall Vendor Breach:

  • Firewall compromised due to insecure credentials.
  • Attackers added a decoy account, mirrored traffic, and performed a MitM attack on the admin portal.
  • Used stolen credentials to access a Jenkins server, leading to a supply chain compromise.

Gas Pipeline Ransomware Attack (2022):

  • DarkSide group extorted $4.5 million from an East Coast gas pipeline company.
  • The incident caused a week-long disruption and a state of emergency in 18 states.

REvil Ransomware Incident:

  • REvil claimed to have stolen MacBook design data and demanded $50 million.

Black Mamba Malware:

  • POC malware that evaded EDR detection and performed malicious activities.
  • Potential future challenge as similar variants may emerge.

Security Best Practices:

Mindset and Awareness:

  • Emphasize the importance of mindset in security.
  • Invest in continuous employee education to prevent phishing and ransomware attacks.

Technological Measures:

  • Implement post-authentication security and Zero Trust programs.
  • Conduct behavioral analysis of user and device behavior.
  • Use phishing-resistant technologies.

Procedural Measures:

  • Regular patch management and well-defined incident response plans.
  • Ensure secure training data sources for AI and monitor AI interactions to protect personal data.

Conclusion

The panel provided valuable insights into the evolving landscape of cybersecurity threats in 2024. The integration of AI in both attack and defense mechanisms poses significant challenges, but with the right strategies and technologies, organizations can better protect themselves against these emerging threats.

Votes: 0
E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

CISO Platform Talks : Security FireSide Chat With A Top CISO or equivalent (bi-monthly)

  • Description:

    CISO Platform Talks: Security Fireside Chat With a Top CISO

    Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.

    We’ve had the privilege of…

  • Created by: Biswajit Banerjee
  • Tags: ciso, fireside chat

CISO MeetUp: Executive Cocktail Reception @ Black Hat USA , Las Vegas 2025

  • Description:

    We are excited to invite you to the CISO MeetUp: Executive Cocktail Reception if you are there at the Black Hat Conference USA, Las Vegas 2025. This event is organized by EC-Council & FireCompass with CISOPlatform as proud community partner. 

    This evening is designed for Director-level and above cybersecurity professionals to connect, collaborate, and unwind in a relaxed setting. Enjoy…

  • Created by: Biswajit Banerjee
  • Tags: black hat 2025, ciso meetup, cocktail reception, usa events, cybersecurity events

6 City Playbook Round Table Series (Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata)

  • Description:

    Join us for an exclusive 6-city roundtable series across Delhi, Mumbai, Bangalore, Pune, Chennai, and Kolkata. Curated for top cybersecurity leaders, this series will spotlight proven strategies, real-world insights, and impactful playbooks from the industry’s best.

    Network with peers, exchange ideas, and contribute to shaping the Top 100 Security Playbooks of the year.

    Date : Sept 2025 - Oct 2025

    Venue: Delhi, Mumbai, Bangalore, Pune,…

  • Created by: Biswajit Banerjee

CISO MeetUp @National Insider Risk Symposium, Washington DC, USA 2025

  • Description:

    We are excited to invite you to the 10th National Insider Risk Symposium, a premier forum bringing together leaders and experts from both the commercial and public sectors to address the evolving landscape of insider threats. CISOPlatform is a proud community partner for this event. 

    Event Details:
    Venue: National Housing Center, 1201 15th St NW, Washington, D.C. 20005
    Dates: September 17–18,…

  • Created by: Biswajit Banerjee
  • Tags: national insider risk symposium, ciso, cybersecurity events, usa events