The Five Most Dangerous New Attack Techniques – And What to Do for Each

In this SANS session from RSAC 2025, top cybersecurity experts shared five of the most dangerous and emerging attack techniques based on real-world field intelligence, with actionable defense strategies for each. Below are the key takeaways from each segment:

 

About Speaker:

1) Heather Barnhart - DFIR Curriculum Lead and Sr. Director, SANS Institute and Cellebrite

2) Tim Conway - ICS Curriculum Lead , SANS Institute

3) Rob T Lee - Chief of Research & Head of Faculty, SANS Institute

4) Ed Skoudis -  President, SANS Technology Institute College

5) Joshua Wright - Faculty Fellow and Senior Technical Director, SANS Institute and Counter Hack Innovations

 

Executive Summary:

1. Authorization Sprawl & Identity Abuse

Speaker: Joshua Wright

Attackers are exploiting centralized identity platforms (IDPs) without deploying malware. Instead, they leverage pre-approved access from compromised user accounts to move laterally across systems—on-prem and cloud—accessing services like Jira, Confluence, Microsoft 365, GitHub, and Snowflake.

Tactic in Focus: This technique, termed “Authorization Sprawl”, has been notably used by the threat actor Scattered Spider, who favors stealthy access over persistence mechanisms.

Mitigations:

  • Enforce cross-platform privilege mapping

  • Demand improved cloud logging (as per NSA’s guidance)

  • Enhance browser visibility with in-browser monitoring tools

 

2. Ransomware Targeting ICS/OT Environments

Speaker: Tim Conway (Part 1)

Ransomware attacks are now targeting operational technology (OT) and industrial control systems (ICS), affecting vital sectors like fuel, food, and manufacturing (e.g., Colonial Pipeline, JBS Foods). These attacks often originate in IT systems and spread to operational layers.

Key Issue: Many organizations lack visibility into the OT/ICS layer and its connectivity with IT systems, making them prime targets.

Mitigations:

  • Conduct thorough asset and risk assessments

  • Apply five critical controls for ICS

  • Adopt Cyber-Informed Engineering (CCE) from Idaho National Lab for mature defenses

 

3. Nation-State Attacks on Critical Infrastructure

Speaker: Tim Conway (Part 2)

State-sponsored actors are increasingly launching ICS/OT-targeted attacks for geopolitical influence, deterrence, or destruction. These operations mirror advanced persistent threats (APTs), leveraging initial IT compromise to cause disruption or destruction of physical systems (e.g., Ukraine power grid attacks).

Strategy Shift: These actors misuse legitimate ICS tools rather than introducing malware, making detection harder.

Mitigations:

  • Prepare for assumed breaches in IT

  • Prioritize segmentation and monitoring of OT environments

  • Conduct impact modeling to plan for worst-case scenarios

 

4. Lack of Logging – The “Darkness” Threat

Speaker: Heather Mahalik Barnhart

A recurring self-inflicted vulnerability is inadequate logging. Without proper data, even world-class responders can’t investigate incidents or attribute attacks. Attackers are learning to look normal—and when logs don’t exist, it’s like investigating in the dark.

Real-World Impact: Cases like Bybit demonstrate how attackers evade AI-driven threat detection by mimicking normal behavior.

Mitigations:

  • Ensure comprehensive logging across on-prem and cloud

  • Train AI models to detect deviations from ‘normal’

  • Conduct periodic log reviews and red teaming exercises

 

5. AI-Powered Normalization of Attacks (Previewed)

The next discussion hints at the evolution of AI being used to mask attacker behavior as “normal,” complicating detection and response further.

 

Final Thought

This session is a wake-up call for defenders to shift from passive monitoring to active threat anticipation. The common theme? Attackers are adapting faster—using access and weaknesses already in place. As defenders, we must improve visibility, reduce trust assumptions, and prepare for both stealthy and destructive threats.

Votes: 0
E-mail me when people leave their comments –

Community Manager, CISO Platform

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

CISO Platform Talks : Security FireSide Chat With A Top CISO or equivalent (Monthly)

  • Description:

    CISO Platform Talks: Security Fireside Chat With a Top CISO

    Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.

    We’ve had the privilege of…

  • Created by: Biswajit Banerjee
  • Tags: ciso, fireside chat

6 City Round Table On "New Guidelines & CISO Priorities for 2025" (Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata)

  • Description:

    We are pleased to invite you to an exclusive roundtable series hosted by CISO Platform in partnership with FireCompass. The roundtable will focus on "New Guidelines & CISO Priorities for 2025"

    Date: December 1st - December 31st 2025

    Venue: Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata

    >> Register Here

  • Created by: Biswajit Banerjee

Fireside Chat With Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.)

  • Description:

    We’re excited to bring you an insightful fireside chat with Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.) and Erik Laird (Vice President - North America, FireCompass). 

    About Sandro:

    Sandro Bucchianeri is an award-winning global cybersecurity leader with over 25…

  • Created by: Biswajit Banerjee
  • Tags: ciso, sandro bucchianeri, nab