As the year comes to an end, it’s time to take a look back at the cybersecurity trends that have taken the world by storm. From the continued impact of pandemics over the past few years, to major geopolitical events and nation-state cyberattacks, 2022 saw a surge in cyberattacks with no signs of slowing down. But what exactly is driving the rise in cyberattacks and what to expect in the year ahead?Top cybersecurity seen in 2022. Dig into his trends and the year ahead. Let’s explore how it continues to evolve.
identity-based attack
As the world transitioned to post-pandemic life in 2022, the shift to remote work further contributed to the rise in identity-based attacks as businesses increased their adoption of IoT and digital identities. Creating a larger attack surface for cybercriminals to exploit has been the risk trend of his identity-based attacks this past year.
In March 2022, the Lapsus$ digital extortion gang compromised Microsoft’s Bing and Cortana products and released their source code. The hack also led to compromise of control over Okta’s admin accounts (a popular identity management platform), giving the attacker system privileges such as resetting passwords, changing emails, and accessing sensitive data. I was.
In May 2022, Cisco, one of the world’s largest networking companies, suffered a serious identity-based breach when hackers used vishing (voice phishing) attacks and MFA fatigue techniques to gain access to employee credentials. attacked. The hackers used these tactics to gain his VPN access to his Cisco system and attempted to exfiltrate the content, but the attack was unsuccessful. These incidents highlight the importance of strong security measures to protect against identity-based attacks.
Business Email Compromise (BEC)
Business Email Compromise (BEC) attacks, also known as “CEO fraud” or “whaling,” have long been a concern for organizations, but in 2022 the risks are greater than ever. These types of attacks involve hackers impersonating trusted individuals to trick employees into transferring funds or divulging sensitive information.
Earlier this year, security researchers at Microsoft discovered a phishing campaign that bypassed multi-factor authentication and hijacked Office 365 accounts. Adversary-in-the-middle phishing was used to access victims’ personal email logins and inboxes, with attackers searching for email threads related to financial transactions and invoices. This type of attack has targeted over 10,000 of her organizations and caused billions of dollars in losses worldwide in 2022 alone.
national athlete
Russian-based ransomware
In 2022, Russia-based ransomware attacks reached new heights. This is largely due to the ongoing conflict between Russia and Ukraine. This year saw a significant increase in cyberattacks against Ukraine and its allies from the previous year.
Earlier this year, Ukraine was hit by a spike in cyberattacks against government websites as the Russian-Ukrainian war broke out. Her websites of about 70 Ukrainian governments were compromised, and users were instead directed to prepare for war warning messages.
As early as March 2022, the Russian government-backed Sandworm group has been attributed to a wave of ransomware attacks against transportation and logistics infrastructure in Ukraine and NATO member Poland. The attack, believed to be aimed at companies supporting Ukraine in its ongoing conflict, was carried out using the ‘Prestige’ ransomware.
China-based supply chain attack
China has long been known for sophisticated supply chain cyberattacks, including penetrating networks of suppliers and other third-party partners to gain access to targeted organizations. This type of attack has become increasingly prevalent in recent years, with China-based attackers exploiting the complex and poorly secured networks of global supply chains to access sensitive data and disrupt operations.
In February 2022, the China-based APT10 group targeted financial institutions and securities traders in Taiwan in a lengthy cyberattack. Attackers exploited vulnerabilities in financial software to gain advanced access to multiple companies. This isn’t the first time APT10 has used a “smokescreen” attack, having previously used ransomware as a cover for a targeted attack against CPC Corporation.
Phishing North Korean and Iranian Regimes to Steal Funds
North Korea and Iran have emerged as major state-based cyber threats due to ongoing conflict and political instability within their borders. The North Korean regime’s missile test has alarmed the international community, and widespread protests in Iran have sparked international concern.
North Korea has been linked to numerous cyberattacks, including phishing attacks used to steal funds from organizations and individuals. North Korea’s successful crypto heist in the first nine months of 2022 is estimated to have stolen her $1 billion from a decentralized crypto exchange. A UN panel report condemns the country’s criminal cyber activities for funding its illegal ballistic missile and nuclear programs.
Human Rights Watch (HRW) reports that APT42, an Iran-linked cyber espionage group, has targeted human rights activists, journalists, academics and government officials amid widespread protests in Iran sparked by the death of Martha Amini. Reported to be targeted. In a coordinated phishing campaign via WhatsApp, APT42 used advanced social engineering techniques to impersonate conference and summit members to gain the trust of victims and gain access to sensitive information and contacts. .
Adapting a dynamic and adaptable cybersecurity strategy for 2023
The 2022 trend of ransomware and advanced cyberattacks will continue. These threats are becoming more accessible and sophisticated, making it increasingly important for businesses to have dynamic and adaptable cybersecurity strategies in place. HolistiCyber experts understand the complexity of today’s threat landscape and are ready to help your business navigate it. Deploy a defense program and develop a comprehensive cybersecurity roadmap to protect against emerging cyber threats and provide the stability and resilience needed to adjust cyber risk to manageable levels. . Don’t let fear of the unknown hold you back. Let HolistiCyber guide you in creating a strong and effective cybersecurity framework.
Talk to an expert now.
The post 2022 Review – Where is cybersecurity headed? First appeared on HolistiCyber.
*** This is HolistiCyber’s Security Bloggers Network syndicated blog written by Leora Pudell. Read the original post: https://holisticyber.com/blog/year-in-review-for-2022-where-is-cybersecurity-headed/