Supply chain attackers taking advantage

With 1 out 61 organizations impacted by ransomware each week, with this stating that supply chain cyber-attacks will become more common and proliferate next year. Expect ransom demanded by hackers to break records next year. Secondly, the Mobile malware attacks will increase, as mobile wallets and mobile payment platforms are used more frequently and the Cryptocurrency is anticipated to become a focal point for cyberattacks, the Check Point cyber security predictions for 2022 says.
Check Point Research believes that supply chain attacks will become more common, and governments will begin to establish regulations to address these attacks and protect networks. They will also look into collaborating with the private sectors as well as other countries to identify and target more threat groups operating on a global and regional scale. Supply chain attackers take advantage of a lack of monitoring within an organization’s environment. They can be used to perform any type of cyber-attack, such as data breaches and malware infections. Going into 2022 we will see an increase in data breaches that will be larger scale. These breaches will also have the potential to cost organizations and governments more to recover.
In May 2021, the US insurance giant paid $40 million in ransom to hackers. This was a record, and we can expect ransom demanded by attackers to increase in 2022.
The report states, as mobile wallets and mobile payment platforms are used more frequently, cybercriminals will evolve and adapt their techniques to exploit the growing reliance on mobile devices. Secondly, Cryptocurrency to become a focal point for cyberattacks globally. As reports of stolen crypto wallets triggered by free airdropped NFTs become more frequent. In 2022, we can expect to see an increase in cryptocurrency-related attacks. Going forward, attackers to leverage vulnerabilities in microservices to launch large scale attacks.
With microservices becoming the leading method for application development, and microservices architecture being embraced by Cloud Service Providers, attackers are using vulnerabilities found in microservices, to launch their attacks. We can also expect to see large-scale attacks targeting CSPs. Secondly, the attackers to weaponize deepfake technologies. Threat actors will use deepfake social engineering attacks to gain permission and access sensitive data. Finally, Penetration tools continue to grow. Hackers will increasingly use penetration tools to customize attacks in real-time and to live and work within victim networks. To stay ahead of threats, organizations must be proactive and leave no part of their attack surface unprotected or unmonitored, or they risk becoming the next victim of sophisticated, targeted attacks.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.