Kaspersky researchers shared their vision for Advanced Persistent Threats (APTs) 2020, noting that the landscape of targeted attacks will change in the coming months. The general trend shows that threats will evolve into quality and become more targeted, such as the development and dissemination of machine learning, deep-growth technologies or tensions around trade routes between Asia and Europe.
The forecasts were developed based on the changes followed by 2019 research and analysis team around the world to support the cyber community with some guidelines and ideas. Along with a series of forecasts on the threat of industry and technology, it will help prepare for the challenges that will arise in the coming 12 months.
Following a number of personal data leaks in recent years, the number of personal data available made it easy for attackers to carry out targeted attacks, based on information leaked to victims.
False flag attacks reach a whole new level
This will be further developed, with threat actors seeking not only to avoid performance but also to actively take responsibility for someone else. Malware, scripts, publicly available security tools, or admin software are mixed with two false flags, where security researchers are "hungry" for any small indication.
Ransomware is shifting towards targeted threats
One possible change may be that, instead of destroying all files, the hackers may threaten to publish data that has been stolen by the company.
New banking regulations in the EU are opening up new attackers
As banks have to open up their infrastructure and data to third parties, it is likely that attackers will seek to abuse them. mechanisms with new fraudulent systems.
Mobile APTs are growing faster
There is no reason to believe that this will stop soon. However, due to the increased attention given to this issue by the security community, we believe that the number of attacks identified and analyzed in detail will also increase.
Misuse of personal information is increasing because of AI
This technology is already in use and it is only a matter of time before some attackers take advantage of it.
How useful was this post?
Average rating / 5. Vote count:
No votes so far! Be the first to rate this post.