Keynote: Cyber Threats in the Age of AI

BBlack Hat
253,000
1,494 views
42 likes
5 months ago
41:45

Description

Edward Chen of Singapore's Cyber Security Agency (CSA) provides a deep dive into the evolving threat landscape, focusing on Ransomware, Scams, and APTs (RSA). He illustrates how modern adversaries utilize Docker, automation, and AI while highlighting that foundational security hygiene remains the most effective defense.

Beyond the Hype: Navigating Ransomware, Scams, and APTs in the Age of AI

The cybersecurity landscape is currently dominated by two conflicting narratives: the existential dread of AI-powered super-attacks and the reality that most breaches still happen because of unpatched systems and weak credentials. In his recent keynote at Black Hat Asia, Edward Chen, Deputy Chief Executive of the Cyber Security Agency (CSA) of Singapore, bridged this gap. He introduced a framework he calls "RSA"—standing for Ransomware, Scams, and Advanced Persistent Threats—to describe the "Really Serious Adversaries" currently operating in our digital ecosystem.

While the media often focuses on the novelty of AI, Chen's insights remind us that the most dangerous threats are those that combine cutting-edge technology with disciplined, professionalized criminal operations. This post will dive deep into the technical findings shared by the CSA, from "patented" malware to the automated infrastructure of scam syndicates.

The "RSA" Framework: Understanding the Core Threats

1. Ransomware: The Shift to Extortion without Encryption

Traditionally, ransomware was defined by its payload: a script that encrypts files and demands payment for the key. However, we are seeing a tactical evolution. Attackers are increasingly skipping the encryption phase entirely. Why? Because encryption is noisy, time-consuming, and can be mitigated by robust backups.

Instead, threat actors are focusing on data exfiltration and wiping. By stealing sensitive data and then wiping the original copies, they achieve the same result—loss of availability and confidentiality—with much higher speed and lower detection rates. Furthermore, Chen highlighted the rise of "multi-tier extortion." Attackers no longer just pressure the infected company; they concurrently extort that company’s clients and end-users, weaponizing the entire trust chain to maximize the pressure to pay.

2. The Professionalization of Scams

One of the most eye-opening parts of the keynote was the analysis of a transnational job scam syndicate. Far from being a "fly-by-night" operation, this group functioned like a high-growth tech startup. Their technical stack included:

  • Telegram Bot C2: Full remote administration through simple chat interfaces, allowing them to register domains and spin up web hosting in minutes.
  • Docker Containerization: This ensured their infrastructure was portable and resilient. If a hosting provider took down a node, they could redeploy the entire environment to a new jurisdiction almost instantly.
  • Automated Continuity: They utilized automated bash scripts to perform database backups every two hours, ensuring that even a successful law enforcement takedown resulted in minimal data loss for the criminals.

3. APTs and the "Patented" Malware Framework

When discussing Advanced Persistent Threats, Chen detailed a variant of the Mirai botnet that demonstrated surprising architectural complexity. Unlike standard botnets that use a single layer of Command and Control (C2), this variant utilized a three-tier architecture:

  1. Exploitation Servers: Focused solely on identifying and compromising vulnerable targets.
  2. Payload Servers: Delivered the specific malware tailored to the victim's architecture.
  3. C2 Servers: Managed the persistent connection and exfiltration.

This botnet was designed for massive scale, supporting architectures like PowerPC and SH4, which are common in industrial equipment and IoT but rare in standard IT. Most interestingly, the orchestration framework was so novel that its developers actually filed a patent for it. This signals a new era where threat intelligence can be found in the most unlikely of places: patent offices.

Technical Deep Dive: The Foundation of Defense

Despite the sophistication of these threats, the root causes remain strikingly familiar. Chen pointed to the recent vulnerabilities in AI giants like ChatGPT and DeepSeek.

  • ChatGPT: The first critical vulnerability found was a web cache vulnerability, a well-known web security flaw.
  • DeepSeek: A major flaw was attributed to unsecured open ports in its database.

These examples serve as a crucial reminder: the "AI attack surface" is still largely built on traditional web and network infrastructure. If the foundations are weak, the AI sitting on top is irrelevant.

Strategic Defense: The Singapore Model

How does a nation-state defend against such agile adversaries? Singapore employs a "Whole-of-Nation" approach divided into three lenses:

  1. Top-Down (Legal Mandates): The Singapore Cybersecurity Act provides the authority to protect Critical Information Infrastructure (CII). Recent updates now include foundational digital infrastructure like cloud service providers.
  2. Bottom-Up (Empowerment): Programs like SG CyberSafe provide SMEs with "CISO-as-a-Service," making high-level security expertise accessible to smaller businesses that lack in-house teams.
  3. Future-Forward (AI Defense): Singapore uses AI to fight AI. The SETIS (Scam Analytics and Tactical Intervention System) uses proprietary models to triage and take down scam sites with 90% accuracy, effectively automating the counter-offensive against scam syndicates.

Key Takeaways for Security Professionals

  • Foundational Hygiene is Non-Negotiable: You cannot "AI-protect" your way out of open database ports or unpatched web caches.
  • Prepare for Encryption-Less Ransomware: Your incident response plan should prioritize data exfiltration detection as much as file integrity monitoring.
  • Audit Your Trust Chain: If your vendors are attacked, you are the next target. Understand how your data is segmented and protected at the third-party level.
  • Embrace Automation: If the attackers are using Docker and Telegram bots to scale, defenders must use automated triage and response tools (like Google Play Protect for mobile) to keep pace.

Conclusion

Cybersecurity is an "infinite game." The landscape will continue to shift as AI becomes more integrated into our lives, but the core principles of discipline, creativity, and agility remain constant. As Edward Chen aptly put it, we are dealing with "Really Serious Adversaries," and our response must be equally serious, professionalized, and collaborative. Stay vigilant, maintain your hygiene, and remember: in the age of AI, the basics matter more than ever.

AI Summary

The keynote opens with Jeff Moss discussing the current era of 'Great Power Competition' and the resulting fragmentation of technology stacks. He highlights the movement toward regional sovereignty in tech (European, Chinese, and US stacks) and the pressures this puts on cybersecurity professionals to choose sides and platforms. Moss emphasizes that the future is unpredictable, requiring companies to shift from lean, fragile centralized systems to more resilient, diversified architectures. He introduces the concept of 'unconflicted parties' disappearing, as even neutral organizations like the Red Cross find themselves entangled in the geopolitical implications of their technology choices. Edward Chen, Deputy Chief Executive of the Cyber Security Agency (CSA) of Singapore, then takes the stage to discuss the national threat landscape through the lens of 'RSA': Ransomware, Scams, and Advanced Persistent Threats (APTs). Chen clarifies that while AI is a transformative force, many high-profile AI breaches, such as those involving ChatGPT and DeepSeek, stemmed from traditional vulnerabilities like web cache flaws and unsecured database ports rather than advanced AI-specific exploits. This reinforces his primary thesis: foundational cybersecurity is the bedrock of resilience. In the realm of Ransomware, Chen notes a 20% global and local surge. He identifies three key trends: a shift in victimology toward professional services (law firms and consultants) due to their sensitive data; a move away from encryption toward pure data exfiltration and wiping (speed and simplicity); and multi-tier extortion where attackers target the victim, their clients, and end-users simultaneously. Regarding Scams, Chen reveals the technical sophistication of modern syndicates. He details an investigation into a job scam syndicate that utilized Telegram bots for full remote administration, allowing them to spin up new infrastructure in minutes. These groups use Docker containerization for portability and automated Bash scripts to back up databases every two hours, demonstrating a level of business continuity and agility that rivals legitimate software companies. Singapore's response includes the 'SETIS' system, an AI-powered analytics tool that triages and takes down scam websites with over 90% accuracy. Finally, Chen addresses APTs, highlighting a global botnet disruption involving a Mirai malware variant. This specific botnet featured a sophisticated three-tier architecture (Payload, Exploitation, and C2 servers) and was designed for extreme cross-platform compatibility, targeting unusual architectures like PowerPC and SH4 to compromise industrial equipment and IoT devices. Remarkably, the developers of this malware orchestration framework even filed a patent for their work. Chen concludes by outlining Singapore's 'Whole-of-Nation' strategy, which combines top-down legislation (Cybersecurity Act), bottom-up empowerment (SME support programs like SG CyberSafe), and future-forward AI initiatives to maintain a resilient digital ecosystem.

More from this Playlist

Behind Closed Doors - Bypassing RFID Readers
42:04
Travel & Eventsresearch-presentationhybridrfid
DriveThru Car Hacking: Fast Food, Faster Data Breach
36:35
Travel & Eventsresearch-presentationhybriddashcam
Impostor Syndrome - Hacking Apple MDMs Using Rogue Device Enrolments
34:53
Travel & Eventsresearch-presentationhybridapple
Dismantling the SEOS Protocol
26:50
Travel & Eventsresearch-presentationtechnical-deep-diverfid
The ByzRP Solution: A Global Operational Shield for RPKI Validators
47:04
Travel & Eventsresearch-presentationtechnical-deep-divebgp
Powered by Kuboid

We break your app
before they do.

Kuboid is a cybersecurity agency that finds hidden vulnerabilities before real attackers can exploit them. Proactive security testing, so you can ship with confidence.

Get in Touch

Trusted by the security community • Visit kuboid.in