2020 Cyber Attack Predictions

According to some the prediction, hackers will use new technologies and a few old vulnerabilities to wreak havoc across the globe in the year ahead. 

Phishing, through short message service (SMS), will be among the main methods of obtaining sensitive and banking data. Hackers will mostly target people joining like-minded social media groups, to provide financial support to social causes or political candidates. Drones that operate across the sky may be fitted with “affordable mobile hacking devices”, that criminals could use to steal sensitive data from the people below. Experian says there are more than a million drones flying across the US at present.

As the 2020 budget meetings come and go, business teams are forced to assess their current defences by analysing their historical attacks in order to anticipate/predict future attack trends.  A difficult but worthwhile exercise for security leadership as they attempt to assess the adversaries' trajectory and work to remain several moves ahead. More often than not, adversaries stay true to their methods but only make slight variations to their attacks often the criminal thinks, why change what historically works? 

A Sharper Concentration Of Cloud Attacks 

Companies continue to flock to cloud deployments, both private and public, to regain budget and unburden their IT departments. Teams have slightly more control and oversight over private cloud deployments but the public multi-tenant cloud deployments are target rich for an attacker. No need for the adversary to enumerate their prey when they can infiltrate the 'entire herd'. By studying how a single cloud technology operates from infrastructure to defences, adversaries become more efficient and significantly decrease their attack costs.

Most adversaries are driven by financial gains and a significant operating metric for them revolves around their operational costs. Very similar to defensive budgets, adversaries must weigh their operating costs against their potential profits. Therefore, their motivation to gain access to cloud environments provide an exponential financial gain.

This is not saying "all" cloud deployments are doomed but security teams must absolutely have a voice at the table when deciding 'which' cloud environment. 

Security teams must evaluate and scrutinise cloud security practices to ensure due diligence is being performed by the vendor, for instance, ensuring the cloud vendor is undergoing routine penetration tests and not only resolving any weaknesses, but how quickly is their security team identifying the penetration test.

A Staggering Surge of Botnet Armies.

Botnet armies are nothing new, however, as endpoint devices in households become "connected" and schools provide each individual student with personal computing devices it opens the doors for widespread takeover. As with any botnet army the individual devices don't hold any real threat value but when controlled in the masses they provide a formidable attack mechanism for cyber criminals. Whether used for computation resources, like brute forcing passwords or used to launch denial of service attacks against a target, the volume of botnet armies will surely increase exponentially.

An Operational Technology Will Fall Victim To Ransomware 

Operational Technology (OT) networks are the primary life source for oil, gas and energy companies, as well as, massive manufacturing industries such as automotive and shipping. These environments typically rely heavily on older infrastructure and technology and are infrequently updated to the latest security levels. 

OT networks are often overlooked because they don't have the traditional weak points most organisations are defending for two primary reasons: 

  • They generally are not connected to the Internet. 
  • They do not have the high number of end users who are susceptible to crafty email spear phish attacks or 'click-happy' web-surfing.

But as manufacturers live and die by product branding, the importance for a company to comply with criminal demands warrants a lofty ransom threat. 

Corporate systems and data are already critical assets for many enterprises. As digitisation continues to transform the business landscape, their value will rise yet further, and protecting them from infiltration and attack will be a chief priority for leaders across all industries and sectors. 

Against that backdrop, exploring emerging security models such as zero trust, which may be able to reduce the risk of compromise more effectively than the legacy, perimeter-based arrangements of yesteryear, makes sound sense.
2020 will see at least one high-value OT network get infiltrated and held for ransom.

ITWeb Africa:         CSO Online:      ITProPortal

You Might Also Read:

Reduce Business Disruption - Make Cyber Security A Priority:

 

 

« Going To The Dark Web
Microsoft Warning: Avoid Reusing Passwords »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Advent IM

Advent IM

Advent IM is one of the UK’s leading independent cyber security specialists, with a unique approach to providing holistic security management solutions.

Logpoint

Logpoint

Logpoint is a creator of innovative security platforms to empower security teams in accelerating threat detection, investigation and response with a consolidated tech stack.

IDnext

IDnext

IDnext is the open and independent platform to support innovative approaches in the world of the Digital identity.

Fornetix

Fornetix

Fornetix is a cybersecurity platform enabling Zero Trust while delivering critical encryption automation, access controls, authorization services, machine identity, and ICAM solutions,

Flipside

Flipside

Information Security training provider specialized in personalized training and security awareness campaigns.

SecureLogix

SecureLogix

SecureLogix deliver a unified voice network security and call verification solution. Protect against call attacks & fraud.

Armenia Startup Academy

Armenia Startup Academy

Armenia Startup Academy is a pre-acceleration program for selected Armenian tech companies and startups in areas including cybersecurity.

Agile Underwriting

Agile Underwriting

Agile, an underwriting agency, insurtech and Coverholder at Lloyd's, provides niche insurance products across Aviation, Marine & Cargo, Cyber and Financial Lines.

Automation Workz

Automation Workz

Automation Workz has been ranked as a top 10 Cybersecurity Bootcamp in the US by Career Karma.

Q5id

Q5id

At Q5id, we prove that your customers' digital identity and real-world identity are the same, our verification and authentication solution delivers a Proven and Secure digital identity for everyone.

Cygna Labs

Cygna Labs

Cygna Labs is a software developer and one of the top three global DDI (DNS, DHCP, and IP address management) vendors.

ThreatNix

ThreatNix

ThreatNix is a tight knit group of experienced security professionals who are committed to providing competent cybersecurity solutions that adhere to international standards.

Evolve Business Group

Evolve Business Group

Evolve is an independently-owned managed network solutions provider, creating bespoke packages for customers globally since 2005.

DarkHorse Security

DarkHorse Security

DarkHorse exists to make it easy and affordable for organizations to be able to identify their cybersecurity vulnerabilities.

Securafy

Securafy

At Securafy, we understand how important it is to have the right IT partner by your side. For over 30 years, we’ve helped businesses stay secure, connected, and compliant.

Charm Security

Charm Security

Charm Security is an AI-powered customer security platform that protects organizations and their customers from scams, social engineering, and human-centric fraud.