The Five Most Dangerous New Attack Techniques – And What to Do for Each

In this SANS session from RSAC 2025, top cybersecurity experts shared five of the most dangerous and emerging attack techniques based on real-world field intelligence, with actionable defense strategies for each. Below are the key takeaways from each segment:

 

About Speaker:

1) Heather Barnhart - DFIR Curriculum Lead and Sr. Director, SANS Institute and Cellebrite

2) Tim Conway - ICS Curriculum Lead , SANS Institute

3) Rob T Lee - Chief of Research & Head of Faculty, SANS Institute

4) Ed Skoudis -  President, SANS Technology Institute College

5) Joshua Wright - Faculty Fellow and Senior Technical Director, SANS Institute and Counter Hack Innovations

 

Executive Summary:

1. Authorization Sprawl & Identity Abuse

Speaker: Joshua Wright

Attackers are exploiting centralized identity platforms (IDPs) without deploying malware. Instead, they leverage pre-approved access from compromised user accounts to move laterally across systems—on-prem and cloud—accessing services like Jira, Confluence, Microsoft 365, GitHub, and Snowflake.

Tactic in Focus: This technique, termed “Authorization Sprawl”, has been notably used by the threat actor Scattered Spider, who favors stealthy access over persistence mechanisms.

Mitigations:

  • Enforce cross-platform privilege mapping

  • Demand improved cloud logging (as per NSA’s guidance)

  • Enhance browser visibility with in-browser monitoring tools

 

2. Ransomware Targeting ICS/OT Environments

Speaker: Tim Conway (Part 1)

Ransomware attacks are now targeting operational technology (OT) and industrial control systems (ICS), affecting vital sectors like fuel, food, and manufacturing (e.g., Colonial Pipeline, JBS Foods). These attacks often originate in IT systems and spread to operational layers.

Key Issue: Many organizations lack visibility into the OT/ICS layer and its connectivity with IT systems, making them prime targets.

Mitigations:

  • Conduct thorough asset and risk assessments

  • Apply five critical controls for ICS

  • Adopt Cyber-Informed Engineering (CCE) from Idaho National Lab for mature defenses

 

3. Nation-State Attacks on Critical Infrastructure

Speaker: Tim Conway (Part 2)

State-sponsored actors are increasingly launching ICS/OT-targeted attacks for geopolitical influence, deterrence, or destruction. These operations mirror advanced persistent threats (APTs), leveraging initial IT compromise to cause disruption or destruction of physical systems (e.g., Ukraine power grid attacks).

Strategy Shift: These actors misuse legitimate ICS tools rather than introducing malware, making detection harder.

Mitigations:

  • Prepare for assumed breaches in IT

  • Prioritize segmentation and monitoring of OT environments

  • Conduct impact modeling to plan for worst-case scenarios

 

4. Lack of Logging – The “Darkness” Threat

Speaker: Heather Mahalik Barnhart

A recurring self-inflicted vulnerability is inadequate logging. Without proper data, even world-class responders can’t investigate incidents or attribute attacks. Attackers are learning to look normal—and when logs don’t exist, it’s like investigating in the dark.

Real-World Impact: Cases like Bybit demonstrate how attackers evade AI-driven threat detection by mimicking normal behavior.

Mitigations:

  • Ensure comprehensive logging across on-prem and cloud

  • Train AI models to detect deviations from ‘normal’

  • Conduct periodic log reviews and red teaming exercises

 

5. AI-Powered Normalization of Attacks (Previewed)

The next discussion hints at the evolution of AI being used to mask attacker behavior as “normal,” complicating detection and response further.

 

Final Thought

This session is a wake-up call for defenders to shift from passive monitoring to active threat anticipation. The common theme? Attackers are adapting faster—using access and weaknesses already in place. As defenders, we must improve visibility, reduce trust assumptions, and prepare for both stealthy and destructive threats.

Votes: 0
E-mail me when people leave their comments –

Community Manager, CISO Platform

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

Atlanta Chapter Meet: Build the Pen Test Maturity Model (Virtual Session)

  • Description:

    The Atlanta Pen Test Chapter has officially begun and is now actively underway.

    Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …

  • Created by: Biswajit Banerjee
  • Tags: ciso, pen testing, red team, security leadership