2020 Cyber Attack Predictions

According to some the prediction, hackers will use new technologies and a few old vulnerabilities to wreak havoc across the globe in the year ahead. 

Phishing, through short message service (SMS), will be among the main methods of obtaining sensitive and banking data. Hackers will mostly target people joining like-minded social media groups, to provide financial support to social causes or political candidates. Drones that operate across the sky may be fitted with “affordable mobile hacking devices”, that criminals could use to steal sensitive data from the people below. Experian says there are more than a million drones flying across the US at present.

As the 2020 budget meetings come and go, business teams are forced to assess their current defences by analysing their historical attacks in order to anticipate/predict future attack trends.  A difficult but worthwhile exercise for security leadership as they attempt to assess the adversaries' trajectory and work to remain several moves ahead. More often than not, adversaries stay true to their methods but only make slight variations to their attacks often the criminal thinks, why change what historically works? 

A Sharper Concentration Of Cloud Attacks 

Companies continue to flock to cloud deployments, both private and public, to regain budget and unburden their IT departments. Teams have slightly more control and oversight over private cloud deployments but the public multi-tenant cloud deployments are target rich for an attacker. No need for the adversary to enumerate their prey when they can infiltrate the 'entire herd'. By studying how a single cloud technology operates from infrastructure to defences, adversaries become more efficient and significantly decrease their attack costs.

Most adversaries are driven by financial gains and a significant operating metric for them revolves around their operational costs. Very similar to defensive budgets, adversaries must weigh their operating costs against their potential profits. Therefore, their motivation to gain access to cloud environments provide an exponential financial gain.

This is not saying "all" cloud deployments are doomed but security teams must absolutely have a voice at the table when deciding 'which' cloud environment. 

Security teams must evaluate and scrutinise cloud security practices to ensure due diligence is being performed by the vendor, for instance, ensuring the cloud vendor is undergoing routine penetration tests and not only resolving any weaknesses, but how quickly is their security team identifying the penetration test.

A Staggering Surge of Botnet Armies.

Botnet armies are nothing new, however, as endpoint devices in households become "connected" and schools provide each individual student with personal computing devices it opens the doors for widespread takeover. As with any botnet army the individual devices don't hold any real threat value but when controlled in the masses they provide a formidable attack mechanism for cyber criminals. Whether used for computation resources, like brute forcing passwords or used to launch denial of service attacks against a target, the volume of botnet armies will surely increase exponentially.

An Operational Technology Will Fall Victim To Ransomware 

Operational Technology (OT) networks are the primary life source for oil, gas and energy companies, as well as, massive manufacturing industries such as automotive and shipping. These environments typically rely heavily on older infrastructure and technology and are infrequently updated to the latest security levels. 

OT networks are often overlooked because they don't have the traditional weak points most organisations are defending for two primary reasons: 

  • They generally are not connected to the Internet. 
  • They do not have the high number of end users who are susceptible to crafty email spear phish attacks or 'click-happy' web-surfing.

But as manufacturers live and die by product branding, the importance for a company to comply with criminal demands warrants a lofty ransom threat. 

Corporate systems and data are already critical assets for many enterprises. As digitisation continues to transform the business landscape, their value will rise yet further, and protecting them from infiltration and attack will be a chief priority for leaders across all industries and sectors. 

Against that backdrop, exploring emerging security models such as zero trust, which may be able to reduce the risk of compromise more effectively than the legacy, perimeter-based arrangements of yesteryear, makes sound sense.
2020 will see at least one high-value OT network get infiltrated and held for ransom.

ITWeb Africa:         CSO Online:      ITProPortal

You Might Also Read:

Reduce Business Disruption - Make Cyber Security A Priority:

 

 

« Going To The Dark Web
Microsoft Warning: Avoid Reusing Passwords »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Logscape

Logscape

Logscape provides a big data analytical tool for log file analysis and operational analytics.

IDpendant

IDpendant

IDpendant offers a wide range of services, including authentication technology, client security products, single sign on systems, encryption solutions, card and mobile device management systems.

Intrusion

Intrusion

Intrusion provides IT professionals with the most robust tool set available for performing in-depth research and analysis of network traffic.

QSecure

QSecure

QSecure specializes in the provision of information security and risk management services.

RATEL (SRB-CERT)

RATEL (SRB-CERT)

RATEL has been appointed as the National Center for the Prevention of Security Risks in ICT systems of the Republic of Serbia (SRB-CERT).

Eskive

Eskive

Eskive is a Brazilian cyber security awareness and education platform that empowers users and strengthens their company in the face of cyber threats.

e.Kraal Innovation Hub

e.Kraal Innovation Hub

e.Kraal is a Cybersecurity Innovation Hub whose mission is to secure the future of Cybersecurity in Kenya by accelerating innovation and creativity in the cyberspace ecosystem.

About Cyber Security.

About Cyber Security.

About Cybersecurity provides a galaxy-wide knowledge base of cybersecurity tactics and techniques derived from actual experience.

SafeGuard Cyber

SafeGuard Cyber

The SafeGuard Cyber SaaS platform empowers enterprises to adopt the social and digital channels they need to reach customers, while reducing digital risk and staying secure and compliant.

Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC)

Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC)

MTS-ISAC promotes and facilitates maritime cybersecurity information sharing, awareness, training, and collaboration efforts between private and public sector stakeholders.

Alacrinet

Alacrinet

Alacrinet is an IT and cyber security consultancy. From penetration testing to fully managed MSSP, our team is focused on knowing the latest threats, preventing vulnerabilities, and providing value.

Navisite

Navisite

Navisite is a combination of eight respected IT consulting and managed service providers that were brought together under the Navisite brand.

TPx Communications

TPx Communications

TPx is a leading managed services provider offering a full suite of managed IT, unified communications, network connectivity and security services.

Trenton Systems

Trenton Systems

Trenton Systems are committed to providing high-performance computing solutions to customers running mission-critical applications in harsh settings worldwide and across various industries.

Q5id

Q5id

At Q5id, we prove that your customers' digital identity and real-world identity are the same, our verification and authentication solution delivers a Proven and Secure digital identity for everyone.

Red Maple Technologies

Red Maple Technologies

Started and run by engineers from the UK Intelligence and Defence communities, Red Maple is a technical consultancy and product company.