& cplSiteName &

MIT Warns of Ransomware in the Cloud, Weaponized AI

Scott Ferguson

How secure will the cloud be in the coming 12 months? Researchers at MIT are warning about two specific security threats that IT should keep an eye on throughout 2018.

In an article entitled "Six Cyber Threats to Really Worry About in 2018," the MIT Technology Review points to two specific cloud-based threats: ransomware targeting cloud providers and weaponized artificial intelligence.

Ransomware has been an ongoing security headache for the last two years, with attacks such as WannaCry, which infected some 400,000 computers in 150 countries, capturing headlines for their ability to stroke fears about the vulnerability of data, whether it's business related or consumer data. (See Kaspersky Names WannaCry 'Vulnerability of the Year'.)

(Source: StockSnap via Pixabay)
(Source: StockSnap via Pixabay)

Now, however, attackers are turning their attention to the cloud.

In the January 2 piece, MIT warns about ransomware targeting large-scale cloud providers, which can host corporate data, as well as more personal, consumer data such as photos.

While the biggest of the big cloud providers, such as Amazon Web Services Inc. , IBM Corp. (NYSE: IBM) and Google (Nasdaq: GOOG), have increased their spending on security, smaller cloud providers without the security resources of these larger firms could prove tempting targets for ransomware attacks.

"But smaller companies are likely to be more vulnerable, and even a modest breach could lead to a big payday for the hackers involved," according to the MIT article.

The other type of attack that is causing concern is the weaponized use of AI, along with machine learning and neural networks.

While some analysts have spoken about using AI to overcome security gaps within the enterprise, MIT views the technology as a double-edged sword. (See Will AI Solve the IT Jobs Shortage?)

Keep up with the latest enterprise cloud news and insights. Sign up for the weekly Enterprise Cloud News newsletter.

Specifically, MIT sees AI being used to create spear phishing attacks, with the technology being used to create thousands of malware-loaded, fake emails at a pace much faster than any human can. MIT also notes:

Hackers will take advantage of this to drive more phishing attacks. They're also likely to use AI to help design malware that's even better at fooling "sandboxes," or security programs that try to spot rogue code before it is deployed in companies' systems.

Cloud is an increasingly tempting target for ransomware and other type of attacks, especially as it continues to grow. A recent analysis of the third quarter of 2017 found that combined infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) markets totaled more than $35 billion. (See AWS, Azure Lead $35B+ Public Cloud Market.)

With all that money and data growing, it's little surprise that cyberattacks will turn their attention to the cloud in 2018.

Related posts:

— Scott Ferguson, Editor, Enterprise Cloud News. Follow him on Twitter @sferguson_LR.

(2)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
Educational Resources
sponsor supplied content
Educational Resources Archive
More Blogs from Scott Ferguson
From its roots in industrial farm machinery and other equipment, John Deere has always looked for a technological edge. About 20 years ago, it was GPS and then 4G LTE. Now it's turning its attention to AI, machine learning and IoT.
Artificial intelligence and automation will become more integral to the enterprise, and 90% of all apps will have integrated AI capabilities by 2020, according to Oracle CEO Mark Hurd.
IBM is now offering access to Nvidia's Tesla V100 GPUs through its cloud offerings to help accelerate AI, HPC and other high-throughput workloads.
CIO Rhonda Gass is spearheading an effort to bring more automation and IoT to the factories making Stanley Black & Decker tools and other equipment.
Workday is looking to build out its machine learning and artificial intelligence capabilities with the acquisition of startup SkipFlag.
Featured Video
From The Founder
Light Reading founder Steve Saunders talks with VMware's Shekar Ayyar, who explains why cloud architectures are becoming more distributed, what that means for workloads, and why telcos can still be significant cloud services players.
Flash Poll
Upcoming Live Events
May 14-16, 2018, Austin Convention Center
May 14, 2018, Brazos Hall, Austin, Texas
September 24-26, 2018, Westin Westminster, Denver
October 9, 2018, The Westin Times Square, New York
October 23, 2018, Georgia World Congress Centre, Atlanta, GA
November 7-8, 2018, London, United Kingdom
November 8, 2018, The Montcalm by Marble Arch, London
November 15, 2018, The Westin Times Square, New York
December 4-6, 2018, Lisbon, Portugal
All Upcoming Live Events
Hot Topics
I'm Back for the Future of Communications
Phil Harvey, US News Editor, 4/20/2018
Verizon: Lack of Interoperability, Consistency Slows Automation
Carol Wilson, Editor-at-large, 4/18/2018
AT&T Exec Dishes That He's Not So Hot on Rival-Partner Comcast
Mari Silbey, Senior Editor, Cable/Video, 4/19/2018
Facebook Hearings Were the TIP of the Data Iceberg
Dan Jones, Mobile Editor, 4/20/2018
Pay-for-Play Is a Sticking Point in Congress
Mari Silbey, Senior Editor, Cable/Video, 4/18/2018
Live Digital Audio

A CSP's digital transformation involves so much more than technology. Crucial – and often most challenging – is the cultural transformation that goes along with it. As Sigma's Chief Technology Officer, Catherine Michel has extensive experience with technology as she leads the company's entire product portfolio and strategy. But she's also no stranger to merging technology and culture, having taken a company — Tribold — from inception to acquisition (by Sigma in 2013), and she continues to advise service providers on how to drive their own transformations. This impressive female leader and vocal advocate for other women in the industry will join Women in Comms for a live radio show to discuss all things digital transformation, including the cultural transformation that goes along with it.

Like Us on Facebook
Twitter Feed