Researchers at
Kaspersky's Security Services shared
their predictions for next year's trending cyberthreats that large businesses
and government entities should prepare for. They
include cybercriminals using media to blackmail organizations, reporting fake
data leaks, and purchasing initial access to previously compromised companies
on the darknet. Other threats involve the rise of the Malware-as-a-Service
model and attacks via the cloud. The
report
is part of Kaspersky Security Bulletin (KSB), an annual series of predictions
and analytical reports on key shifts within the cybersecurity world.
As part of the
Kaspersky Security Bulletin, Kaspersky Security Services experts - a group that
helps businesses enhance existing security systems and equips them to meet new
threats - has reviewed the threats that will be relevant to big business and
the government sector in the coming year.
Blackmailing: hackers' public posts with a
countdown to data leaks
Ransomware actors are
increasingly posting to the blogs about new successful
hacking incidents perpetrated on businesses. The number of such publications
grew in 2022. The peak number exceeded 500 per month, and this occurred
several times between the end of 2021 and the first half of 2022. This compares
to 200 to 300 posts observed monthly by experts at the beginning of 2021.
Extortionists were also active at the end of last year: in September and
November, Kaspersky's Digital Footprint Intelligence
tracked
roughly 400 and 500 posts, respectively.
Cybercriminals used to reach the victim
directly, but now they post about the security breach in their blogs
immediately, setting a countdown timer to the publication of the leaked data
instead of privately demanding a ransom. This dark trend will continue
developing in 2023 because the tactic benefits cybercriminals whether the
victim pays up or not. Data is often auctioned, with the closing bid sometimes
exceeding the demanded ransom.
Cybercriminals post about fake
leaks to boost their reputation
Blog posts about extortion attract media
attention, and some lesser-known actors might take advantage of this in 2023,
by claiming they have hacked a company. Whether the hack actually happened or
not, a leak report might hurt the business. The key to staying safe is to
identify these messages in a timely fashion and initiate a response process
similar to that used in information security incidents.
More personal data leaks,
corporate emails at risk
The experts expect the trend of personal data
leaks to continue into 2023. Even though it directly affects individuals'
privacy, corporate cybersecurity is put at risk as well. People often use work
email addresses to register with third-party sites, which can be exposed to a
data leak. When sensitive information such as email addresses become publicly
accessible, it may invite the interest of cybercriminals and trigger
discussions of potential attacks on the organization on darknet websites.
Additionally, the data can be used for phishing and social engineering.
Malware-as-a-service, attacks via
cloud and compromised
data sourced on the dark web
Experts also expect ransomware
attacks to grow in similarity due to
the rise of malware-as-a-service (MaaS) tools. The complexity of attacks
will increase, meaning automated systems won't be
sufficient to ensure complete security. Furthermore, cloud technology will
become a popular attack vector, as digitalization brings increased cybersecurity
risks with it. Apart from that, cybercriminals will tap dark web sites more
often in 2023 to purchase access to previously compromised organizations.
"The threat landscape is
rapidly developing, and companies are being forced to adapt quickly," said Anna
Pavlovskaya, security services analyst at Kaspersky. "In order to protect a
large business or a government agency from trending threats, it is necessary to
monitor the digital footprint of the organization. It is important to be
prepared to investigate and respond to incidents, since it is not always
possible to stop attackers before they penetrate a perimeter. However,
preventing an attack development and limiting potential damage is an absolutely
feasible task."
To read the full report on enterprise security
threats in 2023, please visit
Securelist.com.