www.csoonline.com Open in urlscan Pro
151.101.194.165  Public Scan

URL: https://www.csoonline.com/article/3697810/ai-automated-malware-campaigns-coming-soon-says-mikko-hypponen.html
Submission: On May 31 via api from TR — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

Close Ad


cso online
GERMANY
 * United States
 * ASEAN
 * Australia
 * India
 * United Kingdom
 * Germany


×

search
 

More from the Foundry Network

 * About Us |
 * Contact |
 * Republication Permissions |
 * Privacy Policy |
 * Cookie Policy |
 * European Privacy Settings |
 * Member Preferences |
 * Advertising |
 * Foundry Careers |
 * Ad Choices |
 * E-commerce Links |
 * California: Do Not Sell My Personal Info |

 * Follow Us
 * 
 * 
 * 


×

Close
 * Hunting vintage MS-DOS viruses from Cuba to Pakistan
 * RELATED STORIES
 * AI-fueled search gives more power to the bad guys
 * SPONSORED BY Advertiser Name Here Sponsored item title goes here as designed
 * Skilling up the security team for the AI-dominated era
 * New CISO appointments, February 2023

 * Home
 * Artificial Intelligence

Feature


AI-AUTOMATED MALWARE CAMPAIGNS COMING SOON, SAYS MIKKO HYPPÖNEN


THE INDUSTRY PIONEER ALSO EXPECTS CYBERSECURITY TO REMAIN A GROWTH BUSINESS FOR
YEARS AND SEES RUSSIAN HACKTIVISTS AS DEMORALIZING EUROPEAN INFOSEC TEAMS.

 * 
 * 
 * 
 * 
 * 
 * 
 * 

By Cynthia Brumfield

CSO | 30 May 2023 15:43


ioat/Shutterstock



Cybersecurity pioneer Mikko Hyppönen began his cybersecurity career 32 years ago
at Finnish cybersecurity company F-Secure, two years before Tim Berners-Lee
released the world's first web browser. Since then, he has defused global
viruses, searched for the first virus authors in a Pakistani conflict zone, and
traveled the globe advising law enforcement and governments on cybercrime. He
has also recently published a book, If It’s Smart, It’s Vulnerable, where he
explains how the growth of internet connectivity has fueled cyber threats.

CSO recently had the opportunity to speak with Hyppönen at this year's Sphere
conference for a wide-ranging interview about the state of the industry, the
growing cybersecurity threats facing Europe, and the promise and peril of
artificial intelligence.


A MATURING CYBERSECURITY INDUSTRY

The once-hot tech sector has hit a wall, trimming its ranks by 168,243 employees
so far in 2023. Tech giants Google, Amazon, Microsoft, and Meta have retrenched
from their past decade of seemingly boundless upsides as recessionary pressures
and other economic factors have cooled their once-rosy projections.



Despite pockets of layoffs, the cybersecurity industry seems to be largely
immune to the woes affecting Silicon Valley, with the demand for new employees
seemingly "as strong as it ever has been" in the chronically understaffed
sector. "There will always be threats. There will always be bad people,"
Hyppönen, who is now the chief research officer at WithSecure, tells CSO.
"There's a steady need for security. Cybersecurity will remain a growth business
for as long as I can see. I do believe there's job security in cybersecurity."
(WithSecure was known as F-Secure for Business until last year when it split off
from the now consumer-oriented F-Secure, for which Hyppönen also serves as
principal research advisor).

When Hyppönen began his career, there was no cybersecurity industry of
significance. Now, analysts project that the industry will top $162 billion USD
in revenue during 2023, with slightly more than three dozen companies that
collectively have a market cap exceeding $624 billion USD and account for the
lion's share of that revenue.

Given this state of maturation, the question remains whether there is room for
new cybersecurity entrants. “For years the barriers for entry for newcomers and
to cybersecurity were massive because of the amount of work you had to do to
understand the problems that build a library of detections for all the possible
attacks, which took years and years for companies to build,” Hyppönen says. “So,
we believe there won't be real new startups in endpoint security."



"You actually can enter the game with new technologies based on anomaly
detection and machine learning," Hyppönen says. "So, you don't have to be able
to detect all the possible attacks we've always seen. It's enough if you can
detect anomalies, that something weird is happening, something unusual,
something which doesn't happen normally."



Hyppönen believes the need to detect weird and unusual things has "actually
opened the doors for plenty of new companies stood up by a new generation of
researchers" who grew up online and are unconstrained by conventional thinking.
"So, it's probably not good for business for us to welcome new competitors in
the space," he says. "But personally, I love seeing that."


EUROPEAN CYBER THREATS RISE IN WARTIME

Since Russia invaded Ukraine last year, European organizations have experienced
a rising tide of cyber threats from Russian-allied threat actors, who, while
inflicting only minor damage, have subjected government agencies and companies
across the continent to psychological malaise, Hyppönen says. One group in
particular, the little-reported so-called hacktivist group NoName057(16), has
engaged in a steady onslaught of DDoS attacks across Europe through a project
called DDosia since March 2022 alongside other pro-Russian groups, including
Killnet.

Hyppönen scanned the NoName057(16) Telegram channel, the group's primary mode of
communication, and read aloud a list of the group's recent attacks. "France. An
airport in Germany. A German weapons manufacturer. An Italian bank. The Italian
public sector. These kinds of attacks are the wake-up calls for companies
because many of the targets of the attacks done by gangs which are not from the
government but are like private patriot hackers from Russia," he says. (However,
Illia Vitiuk, the head of the Department of Cyber Information Security in the
Security Service of Ukraine, said at the RSA conference in April that she
believes the Russian hacktivists are state-sponsored.)

"They hit surprising targets like an airport in France," which is likely baffled
to be caught up in the conflict, Hyppönen says. “But these guys are looking for
symbolic hits, which are on our hearts and minds. These attacks are specific to
the war in Ukraine, and almost all the targets we see are in Europe."

A separate group of pro-Russian hackers took down Finland's defense ministry
website just as Ukrainian President Volodymyr Zelenskyy began a video address to
the country's parliament. "When was the last time anyone visited the website of
the defense ministry? No one ever goes there,” Hyppönen says. “So, the website
has no importance whatsoever. Go down and stay down for the rest of the year,
and no one will miss the website. That has no effect on the operational
capability of our ministry, defense forces, or military. None of that."



With no actual destructive component, the point of these attacks is to weaken
European morale, Hyppönen says. "It feels bad. It really does feel bad. And
that's what they're trying to do."


COMPLETE AUTOMATION OF MALWARE CAMPAIGNS IS COMING

ChatGPT and dozens of rapidly emerging AI apps were the hottest topics at
Sphere, with their potential to foster cybercrime and scams more effectively.
"They're exciting and scary at the same time," Hyppönen said during his keynote.
"And make no mistake: We are all living the hottest AI summer in history."

Despite AI's potential for upending industries and making it easier for threat
actors to advance their malicious activities, Hyppönen tells CSO that it's
"mandatory" for the cybersecurity industry to embrace the technology. "There's
no other way for companies like us to keep up with the number of attacks except
by using automation, machine learning, and AI," he says. "We've been using it
for quite a while already."

It will only be a matter of months before malicious threat actors use widely
available AI source code to perfect their techniques. "What I'm really waiting
for, and it's going to happen in the next couple of months, is complete
automation of malware campaigns," he says. "Because right now it's humans,
attackers working at human speed against defenders like our systems or security
companies in general, which use automation and machine learning to find and
react to new attacks very quickly."



The downside for cyber defenders is that AI functioning becomes impenetrable at
a certain point due to a lack of visibility and understanding of how it works.
For example, Hyppönen says, "A customer calls and asks, 'Hey, you're blocking
this program we made, and why did you block this?' We can't answer. The machine
says so."

That program could be whitelisted and manually checked, "but we can't answer the
client anymore why it believes it's bad because it's a machine learning
framework,” Hyppönen says. “It's a black box. It's been teaching itself for too
long."

Next read this
 * The 10 most powerful cybersecurity companies
 * 7 hot cybersecurity trends (and 2 going cold)
 * The Apache Log4j vulnerabilities: A timeline
 * Using the NIST Cybersecurity Framework to address organizational risk
 * 11 penetration testing tools the pros use

Related:
 * Artificial Intelligence
 * Malware
 * Cyberattacks

Copyright © 2023 IDG Communications, Inc.

7 hot cybersecurity trends (and 2 going cold)


CSO Online CSO provides news, analysis and research on security and risk
management Follow us
 * 
 * 
 * 
   

 * About Us
 * Contact
 * Republication Permissions
 * Privacy Policy
 * Cookie Policy
 * European Privacy Settings
 * Member Preferences
 * Advertising
 * Foundry Careers
 * Ad Choices
 * E-commerce Links
 * California: Do Not Sell My Personal Info

Copyright © 2023 IDG Communications, Inc.

Explore the Foundry Network descend
 * CIO
 * Computerworld
 * CSO Online
 * InfoWorld
 * Network World
















CSO WANTS TO SHOW YOU NOTIFICATIONS

--------------------------------------------------------------------------------

YOU CAN TURN OFF NOTIFICATIONS AT ANY TIME FROM YOUR BROWSER

Accept Do not accept

POWERED BY SUBSCRIBERS