Editor’s brief: Every last quarter of the year, cybersecurity vendors will begin to make predictions for what’s next and what’s dangerous in cybersecurity. According to cybersecurity stalwart Check Point Software, challenges such as deepfakes, cryptocurrency, mobile wallet, supply chain attacks and fake news will continue to dominate the cybersecurity scene in 2022. The vendor’s release is below.
Deepfakes, Cryptocurrency and Mobile Wallets: Cybercriminals Find New Opportunities in 2022
Check Point Software 2022 cyber-security predictions also anticipates an increase in supply chain attacks in the new year
SINGAPORE, @mcgallen #microwireinfo, October 27, 2021 – Check Point® Software Technologies released its cyber-security predictions for 2022 detailing the key security challenges that organisations will face over the next year. While cybercriminals continue to leverage the impact of the COVID-19 pandemic, they will also find new opportunities for attack with deepfakes, cryptocurrency, mobile wallets and more.
Key highlights from the 2022 Global cyber-security predictions report include:
- Fake news and misinformation campaigns return: Throughout 2021, misinformation was spread about the COVID-19 pandemic and vaccination information. In 2022, cyber groups will continue to leverage fake news campaigns to execute various phishing attacks and scams.
- Supply chain cyber-attacks continue to increase: Supply chain attacks will become more common and governments will begin to establish regulations to address these attacks and protect networks, as well as collaborate with the private sectors and other countries to identify and target more threat groups globally.
- The cyber ‘cold war’ intensifies: Improved infrastructure and technological capabilities will enable terrorists groups and political activists to further their agendas and carry out more sophisticated, wide spread attacks. Cyber-attacks will increasingly be used as proxy conflicts to destabilise activities globally.
- Data breaches are larger scale and more costly: Data breaches will happen more frequently at a larger scale and cost organisations and governments more to recover. In May 2021, US insurance giant paid US$40 million in ransom to hackers. This was a record, and we can expect ransom demanded by attackers to increase in 2022.
- Cryptocurrency gains popularity with attackers: When money becomes purely software, the cyber security needed to protect against hackers stealing and manipulating bitcoins and altcoins is sure to change in unexpected ways.
- Attackers target mobile: As mobile wallets and mobile payment platforms are used more frequently, cybercriminals will evolve and adapt their techniques to exploit the growing reliance on mobile devices.
- Attackers will leverage microservices’ vulnerabilities: With microservices architecture being embraced by Cloud Service Providers (CSPs), attackers are using vulnerabilities found in them, to launch large-scale attacks on CSPs.
- Deepfake technology is weaponised for attacks: Techniques for fake video or audio are now advanced enough to be weaponised and used to create targeted content to manipulate opinions, stock prices or worse. Threat actors will use deepfake social engineering attacks to gain permissions and access sensitive data.
- Penetration tools continue to grow: Globally in 2021, 1 out of every 61 organisations was being impacted by ransomware each week. Threat actors will continue to target companies that can afford paying ransom, and ransomware attacks will become more sophisticated in 2022. Hackers will increasingly use penetration tools to customise attacks in real time and to live and work within victim networks.
“In 2021, cyber criminals adapted their attack strategy to exploit vaccination mandates, elections and the shift to hybrid working, to target organisations’ supply chains and networks to achieve maximum disruption,” said Maya Horowitz, VP Research at Check Point Software. “The sophistication and scale of cyber-attacks will continue to break records and we can expect a huge increase in the number of ransomware and mobile attacks. Looking ahead, organisations should remain aware of the risks and ensure that they have the appropriate solutions in place to prevent, without disrupting the normal business flow, the majority of attacks including the most advanced ones. To stay ahead of threats, organisations must be proactive and leave no part of their attack surface unprotected or unmonitored, or they risk becoming the next victim of sophisticated, targeted attacks.”
About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network and mobile device held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organisations of all sizes.
Follow Check Point via:
- Twitter: http://www.twitter.com/checkpointsw
- Facebook: https://www.facebook.com/checkpointsoftware
- Blog: http://blog.checkpoint.com
- YouTube: http://www.youtube.com/user/CPGlobal
- LinkedIn: https://www.linkedin.com/company/check-point-software-technologies