web analytics

10 Ways Hacker Threats are Going to Focus on This Year

Data leaks, viruses and other hacker threats are not about to stop. On the contrary, these events are likely to increase in the coming years. Avira, a German multinational security software company, looked at the patterns, figures and trends of last year and compiled a list of forecasts that could be expected this year.

1. Connected objects reach a critical volume and associated risks

The more widespread adoption of connected objects has the greatest potential impact on user and Internet security in general.

“We are seeing a dangerous combination of low security on these devices and strong consumer demand for these gadgets. So we can expect cybercriminals to exploit this flaw in innovative ways,” says Travis Witteveen, CEO of Avira.

“The conditions are there for this threat to explode in three ways: it could touch any Internet with a Mirai botnet, expose the privacy of users via the moderately legal surveillance of their activities or exploit the vulnerabilities of networks and users via cryptomining activities. These three scenarios are very likely.”

2. Cryptominage goes beyond ransomware

Despite the decline in cryptocurrency values, cryptominage is here to stay.

We expect an increase in cryptominations attacks, targeting connected objects, because they are more and more present and still unprotected.

Ransomware attacks will target large, large-scale organizations such as municipalities and hospitals.

3. The AI ​​joins the dark side of the force

Cyber ​​criminals will begin to use Artificial Intelligence for malicious purposes, making the environment even harder to protect.

AI will allow criminals to develop more targeted and stealth attacks.

These AI-led attacks will use a variety of techniques and may increase the pace of potential cyberattacks.

4. Threats are organized on mobile

In 2019, we will see the emergence of more and more sophisticated malware campaigns on mobile.

Expect new banking Trojans and devices to steal personal data.

5. Personal devices enrolled in click fraud mounts

Click fraud (targeting online advertising in particular) will no longer be the problem only of advertisers, publishers and ad networks.

Expect an increase in special proxy software installed on personal devices.

These applications were previously distributed by malicious code and potentially unwanted (bundled) applications, but recently cybercriminals have switched to “dual-use” software such as “web proxy” or “easy-to-use” applications.

6. Stolen data gets to work

Attacks targeting e-mails will remain a major problem, fueled by large volumes of personal data stolen or leaked.

With data available, we expect more and more targeted social engineering and phishing attacks, used in a variety of economic criminal operations.

7. It is not on your hard drive, but it’s still there

File-free malware that resides in a device’s memory, rather than on the hard drive, will continue to increase.

By their nature, they are much more difficult to locate and therefore much more interesting for attackers. Expect the new generation to be able to self-propagate as well.

8. All is out of focus

The border between good and bad will be increasingly blurred, due to the more frequent diversion of legitimate tools from operating systems and admin tools.

From a security perspective, it can be problematic to differentiate between legitimate and unauthorized use of these tools. In addition, expect more encrypted cyber attacks using SSL/TLS as a means of communication.

9. Money is growing in the cloud

More and more companies are storing more data in the cloud, so this infrastructure is an increasingly attractive target for cybercriminals.

The data is money, and the attackers go where the money is. Companies have shown a disturbing ability to leave their major assets unprotected.

10. We live in a world of mass surveillance and manipulation

We will see more examples of monitoring and manipulation at the individual level for different types of campaigns, whether political or commercial.

In addition, we can also expect other state-sponsored attacks, as well as espionage and criminal activity, which could have a significant impact on the political and economic worlds.

You may also like

(Views: 51)

Leave a Reply

Your email address will not be published.