UPDATED 17:47 EDT / NOVEMBER 17 2020

SECURITY

Cybersecurity threats at the edge represent new frontier for hackers in 2021

Threat actors have been effective at weaponizing email through phishing attacks and social media via disinformation and divisive posts. Now they are about to weaponize the edge as well.

A recent report from FortiGuard Labs, the threat intelligence and research organization of Fortinet Inc., predicts that weaponizing of connected devices at the intelligent edge could have a major impact on the speed and scale of cyberattacks in the future.

“This is the new emerging threat, more processing power, more access and privilege, smarter decisions that are being made on those devices,” said Derek Manky (pictured), chief of security insights and global threat alliances at Fortinet’s FortiGuard Labs. “Those devices are going to be targets for cybercriminals, and that’s something we’re going to see next year. Targeting the edge is going to be a big thing.”

Manky spoke with Lisa Martin, host of SiliconANGLE Media’s livestreaming video studio theCUBE. They discussed the range of threats posed by IoT device vulnerabilities and new developments in swarm technologies that could be exploited by hackers. (* Disclosure below.)

Emerging swarm attacks

The attack surface posed by edge devices includes virtual assistants in the home, but it extends beyond that.

“These edge devices are also being put into military and defense, critical infrastructure, field units for oil, gas and electricity,” Manky said. “IoT devices are the main culprit right now, and they can continue to be for a while.”

One of the emerging threats identified by FortiGuard Labs involves edge-enabled swarm attacks. The deployment of 5G wireless technology with its enhanced processing power will allow hackers to share intelligence in real time and fine-tune attacks in process.

An early sign of this threat can be found in a new botnet — HEH — which was discovered recently by the security division of Chinese tech firm Qihoo 360. HEH can wipe all data from infected routers, servers and IoT devices.

“The main characteristic of it is that it’s able to have communication,” Manky noted. “Devices can pass files between each other, talk to each other. They don’t have machine learning models yet, so they’re not ‘smart,’ but that’s coming.”

Watch the complete video interview below, and be sure to check out more of SiliconANGLE’s and theCUBE’s CUBE Conversations. (* Disclosure: Fortinet Inc. sponsored this segment of theCUBE. Neither Fortinet nor other sponsors have editorial control over content on theCUBE or SiliconANGLE.)

Photo: SiliconANGLE

A message from John Furrier, co-founder of SiliconANGLE:

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU