Besides insight into the evolution of cyberattacks as a state-level weapon complementing actual military conflict, and the elevation of ransomware utilized in nation-state level attacks for financial and social gain, the report also delves into the growth of cloud supply chain attacks through new sources of modules in the open-source community.
Up-to-date statistics on industry and regional cyberattacks as well as advice and predictions for the remainder of 2022 including an analysis of Incident Response exploring the full lifecycle of a cyberattack, presents an integrated view of how cyberattacks have led to major disruption, causing real harm to civic and cyber life in 2022.
“The war in
Top predictions for H2 highlighted in the report include:
- Ransomware will become a much more fragmented ecosystem – while ransomware groups have become more structured and operate like regular businesses, with set targets to hit, there will be a lesson learned from the Conti ransomware group, whose size and power garnered too much attention, which led to its downfall. Going forward, we think there will be many small-medium groups instead of a few large ones, to hide in plain sight more effectively.
- More diverse email infection chains – due to the implementation of internet macros being blocked by default in Microsoft office, the more sophisticated malware families will accelerate the development of new infection chains, with different file types that are password protected to prevent detection as sophisticated social engineering attacks increase.
- Hacktivism will continue to evolve – hacktivist groups will continue to align their attacks with the agenda of their chosen nation state, particularly as the
Russia -Ukraine war is still ongoing. - Continued attacks on decentralized blockchain networks with expected first attacks in Metaverse – with major incidents relating to blockchain platforms, such as a vulnerability on Rarible market place or ApeCoin Airdrop vulnerability , we expect to see continued efforts by hackers to breach and hijack crypto assets. In addition we believe that we will see initial attacks in the Metaverse that will exploit smart contract vulnerabilities.
The ‘Cyber Attack Trends: 2022 Mid-Year Report’ gives a detailed overview of the cyber-threat landscape. These findings are based on data drawn from Check Point Software’s ThreatCloud Intelligence between January and
Blog: https://research.checkpoint.com/
Twitter: https://twitter.com/_cpresearch_
About Check Point Research
About Check Point Software Technologies Ltd.
MEDIA CONTACT: | INVESTOR CONTACT: |
press@us.checkpoint.com | ir@us.checkpoint.com |
Source: Check Point Software Technologies INC
2022 GlobeNewswire, Inc., source