Cyber 5,10,15-1

What Are The Biggest Cyber Threats of The Future?

Reading time: 12 min
Share this Share on email Share on twitter Share on linkedin Share on facebook

Cybersecurity was a growing concern even before the Internet became the dominant form of communication. Now with the exponential growth of economic activity taking place solely online, cyberthreats to business, and particularly small business, will only grow in the coming years.

Cybercrime is on the rise

Data by RiskIQ suggests cybercrime costs organizations $2.9 million every minute, and major businesses lose $25 per minute as a result of data breaches. Despite the warning signs, most businesses are not prepared to deal with cyber threats. Research from Accenture shows nearly 70% of business leaders feel their cybersecurity risks are increasing and, according to Varonis, only 5% of companies’ data is properly protected.

Research shows things are only going to get worse. “Cybercrime has been on an ascending pace since the widespread adoption of commercial and residential Internet,” says cybersecurity expert Bogdan Botezatu, director of threat research at Bitdefender. “Along with a sharp increase in the number of cyber attacks, there’s also a growing diversity in the types of cyber threats, making it difficult to effectively protect important data moving forward.”

“Ransomware attacks have become mainstream with the proliferation of ransomware-as-a-service, where cyber-criminal groups create and market ransomware to affiliates,” he explains. 

“Data breaches have also become the new normal as attackers are capitalizing on illegally-gained access to steal customer information, intellectual property or trade secrets to be sold or exchanged in specialized underground forums.”

Cyber threats will continue to plague businesses

The pandemic has exacerbated the cyber threat problem, as companies of all sizes turned to remote work. Work-from-home is likely to stay in the foreseeable future, so these problems will persist, Botezatu says.

  1. Easy Access: “Work-from-home has forced companies to open up access to previously-private areas of the infrastructure. Either through cloud adoption or through more relaxed access policies, companies allow workers outside the premises to interact with data and processes, which may negatively impact business security and confidentiality.”
  2. Human Factor: “Users working from home are often more likely to take security less seriously and lack the security insight at the network level.”
  3. More Vulnerabilities: “Combined with a plethora of IoT devices and misconfigured networking equipment at the personal network, vulnerabilities at the employee’s end can have nefarious consequences on business security and safety.”
  4. New Avenues of Attack: “Access control, outdated software, or improperly exposed services across the network can open new avenues of attack. Endpoint risk analytics and security auditing play a key role in identifying misconfiguration and plugging the gap before attackers gain access to the network.”

The future victims

While most industries experience some form of cyber threats, certain sectors need to be extra cautious as they tend to be more affected than others. “Hospitals, critical infrastructure, transportation, and education are some of the most frequently targeted industries,” Botezatu says. 

Take healthcare, for example. “Ransomware attacks on the sector occurred at a rate of four incidents per week in the first half of 2021, and we know this is just the tip of the iceberg, as there is a significant absence of public reporting and available data in many regions,” writes Stephane Duguin, CEO of the CyberPeace Institute. 

“Health records are low-risk, high reward targets for cybercriminals — each record can fetch a high value on the underground market, and there is little chance of those responsible being caught,” he explains. 

Beyond these, “Cyber-attacks have also evolved into the realm of warfare as more and more nation states are arming themselves with digital weapons in the form of zero-day exploits and technology designed for espionage or data exfiltration,” Botezatu says.

How to prepare for future cyber threats (now)

Looking at cyber threat statistics, fear is a natural response, but Botezatu assures businesses still have several ways to protect themselves. Here’s what he suggests:

  1. Machine learning: “The widespread adoption of machine learning has made it possible to detect fresh malware based on features seen in previous attacks,” he says.
    Implementation of such technology can reduce the human labor required for cyber surveillance and increase the efficiency with which businesses can defend themselves against cyber threats in the future.
  2. Bug bounty programs: Bug bounty programs reward people for identifying or resolving bugs, creating a win-win situation for both the bug-finder and the organization that can now work on fixing the problem.
  3. Testing or security audits: Testing and security audits work by recruiting people to put the organization’s security system to test. “By employing ethical hackers to run penetration testing or security audits, companies can identify misconfiguration and security issues in products before they get actively exploited by cyber-criminals,” Botezatu says.

How to deal with RaaS attacks

Ransomware attacks can be damaging for an organization of any size. Now, cybercriminals are creating and marketing ransomware to affiliates, or Ransomware-as-a-Service, which means their attacks are more ruthless and it’s even harder to catch them. 

This means a bleak future for all, unless both the business community and governments around the world adopt a more active policy. “Ransomware has become too large of a threat for any entity or sector to address alone; the magnitude of this challenge urgently demands united global action,” says INTERPOL Secretary General Jürgen Stock.

Here public-private partnerships come into play. “As ransomware becomes an increasingly important risk for the economy and society, law enforcement organizations have started partnering with cybersecurity vendors to dismantle ransomware rings,” Botezatu says. “This collaboration results in decryption tools that help victims recover from an attack without contributing to the financial success of the ransomware operator and affiliates.”

“All investigations benefit from a strong cooperation between private and public sides, where we provide decryptors for victims, perform attack attribution, and open source our intelligence findings,” says Bitdefender's Chief Security Strategist Alexandru Catalin Cosoi. “But all of that is useless if no one acts on it.. and cybercriminals walk away.”

For many years, this worked: cybersecurity reacted to attacks and mitigated the damage caused. But now, it’s not just the private-public partnerships that are changing this dynamic. Technological innovations also make it easier for defenders to proactively protect against emerging threats.

Leveraging AI and other tech like “Virtualization,” “Blockchain Networks,” and “Cloud and Quantum Computing” are among some of these future-looking tools. For instance, working with cloud computing can make data storage and protection easier, while AI can offer automatic threat detection programs to identify attacks before they happen.

How to future-proof your cyber defenses

With the ever-evolving threats, companies are advised to consider investing more in anti-ransomware protection as data encryption is just half of the story, Botezatu says. 

“Victims often have their data exfiltrated and become subject to additional extortion, legal obligation, and ultimately, loss of reputation and/or business. Investing in multi-layered cyber-security defense increases the cost for cyber-criminals and decreases the likelihood of a successful attack,” he adds. 

“Sophisticated attacks designed to evade security technology detection often mimic 'normal' processes or execute in multiple stages through multiple vectors including endpoints, networks, supply chains, hosted IT and cloud services,” Botezatu says.

Bitdefender XEDR thwarts complex attacks by ingesting, examining, and correlating telemetry across endpoints to detect indicators of compromise (IOCs), APT techniques, malware signatures, vulnerabilities, and abnormal behaviors.” This advanced monitoring automates early detection of attack scenarios, providing security and IT staff with a single dashboard view wherever the attack started.

Learn more about how you can protect your organization with Bitdefender XEDR.

 

CONTACT AN EXPERT