“Over this past year, we have seen cybercriminals get smarter and quicker at retooling their tactics to follow new bad actor schemes – from ransomware to nation states – and we don’t anticipate that changing in 2022,” said Raj Samani, fellow and chief scientist of the combined company. “With the evolving threat landscape and continued impact of the global pandemic, it is crucial that enterprises stay aware of the cybersecurity trends so that they can be proactive and actionable in protecting their information.”
Nation States will weaponize social media to target more enterprise professionals, looking to infiltrate organizations for their own criminal gain. While this approach is not new, it is relatively uncommon. After all, it does demand a level of research to “hook” the target into interactions and establishing fake profiles is more work but targeting of individuals has proven to be a very successful channel, and we predict the use of this vector could grow not only through espionage groups, but also other threat actors.
Nation states will increase their offensive operations by leveraging cybercriminals. With the predicted increase of blurring between cybercrime and nation-state actors in 2022, companies should audit their visibility and learn from operations conducted by actors targeting their sectors.
Self-reliant cybercrime groups will increase and shift the balance of power within the Ransomware-as-a-Service (RaaS) eco-kingdom from those who control the ransomware to those who control the victim’s networks. Ransomware has generated billions of dollars in recent years and it’s only a matter of time before some individuals who believe they aren’t getting their fair share become unhappy.
For a long time, RaaS admins and developers were prioritized as the top targets, often neglecting the affiliates since they were perceived as less skilled. This, combined with the lack of disruptions in the RaaS ecosystem, created an atmosphere where those lesser-skilled affiliates could thrive and grow into very competent cybercriminals, eventually with a mind of their own.
5G and IoT traffic between API services and apps will make them increasingly lucrative targets, causing unwanted exposure of information. The connected nature of APIs potentially also introduces additional risks to businesses as they become an entry vector for wider supply chain attacks. In most cases, attacks targeting APIs go undetected as they are generally considered as trusted paths and lack the same level of governance and security controls.
Expanded exploitation of containers and vulnerable applications will lead to endpoint resource hijacking such as through crypto-mining malware, spinning up other resources, data theft, attacker persistence, and container-escape to host systems.
The time to repurpose vulnerabilities into working exploits will be measured in hours and there’s nothing you can do about it… except patch.