Take note of these five threats and work to close security gaps as soon as possible. They may target different areas, but each is concerning. Complexity and lack of visibility will leave your organization vulnerable.
1. Linux system attack
Were you around when everyone recommended ditching Windows and switching to Linux because it was never attacked? Until recently, Linux was primarily ignored by cybercriminals. Unfortunately, that is no longer the case. Linux operating systems and the applications that run on them are becoming as vulnerable to attacks as Windows systems. You might be familiar with defending against Windows attacks, but you might not know how to protect Linux against malware.
2. Attacks in Space
Satellite internet has made space no longer safe from cyberattacks, even though it may be the final frontier. The number of exploits targeting satellite Internet networks will rise, and the most likely targets will be organizations that depend on satellite connectivity to support low-latency activities. Among these activities are online gaming and delivering critical services to remote locations and remote offices, pipelines, cruise ships, and airlines. Organizations that add satellite networks to connect off-grid systems, such as remote OT devices previously, to their interconnected networks will increase their attack surface.
3. Crypto wallet scams attack
Just as a pickpocket can run off with your money in the real world, in the digital world, crypto wallets are now at risk. Attackers are creating more malware designed to target stored information so that they can steal credentials such as a bitcoin private keys, bitcoin addresses, and crypto wallet addresses. Many attacks begin with a phishing scam with a malicious Microsoft Word document attached to a spam email. A Word document macro then delivers the malware that steals the crypto wallet information and credentials from a victim’s infected devices. Once an attacker has vital information, they can drain the digital wallet.
4. Critical infrastructure attack
There has been an increase in ransomware attacks over the last year, but now they are increasingly targeting critical infrastructure. Cybercriminals are now attacking larger, more public targets instead of smaller, more personal targets. The convergence of IT and OT networks has made it easier for attackers to access OT systems. Accessing compromised home networks or the devices used by remote workers allows them to gain access to IT and then OT systems. Now that ransomware is available as a service, and attackers don’t need specialized technical knowledge.
Some attacks that target critical infrastructure have been referred to as “kiloware,” even though they don’t directly target people. Unlike common exploits, this malware targets vital infrastructure such as hospitals, pipelines, water treatment plants, and other systems that directly affect people.
5. Attacks on the Network Edge
Remote work has led to an exponential increase in new network edges, which has significantly expanded the attack surface and made corporate networks vulnerable to many of the same threats as residential networks. This increase in network edges opens the door to more “living off the land” threats. It uses malware created with existing tools and capabilities, so the attacks and data exfiltration appear to be standard system operations.
Threats like these exemplify why organizations must prioritize cybersecurity. The threats aren’t going away, so organizations need a coordinated, integrated approach to security rather than assembling a collection of point products. As an alternative to adding yet another security product to solve a problem, organizations should consider a cybersecurity mesh platform approach to security for unified visibility, automated control, and coordinated protection.