FortiGuard Labs predicts wide range of cyberattacks
Published
Fortinet, a provider of broad, integrated, and automated cybersecurity solutions, has released predictions about the cyberthreat landscape for 2022 and beyond from the FortiGuard Labs global threat intelligence and research team.
Cyber adversaries are evolving and broadening their attack methods to target new areas for exploit across the entire attack surface, especially as work-from-anywhere adoption grows. They are looking to maximise opportunities from the 5G-enabled edge to the core network, the home, and even satellite internet in space.
“Cybercriminals are becoming more like traditional APT groups: zero-day equipped, destructive, and able to expand their techniques as needed to achieve their goals. We will see attacks spanning further outside of the extended network, even into space, as attackers take advantage of a fragmented perimeter, siloed teams and tools as well as a greatly expanded attack surface. To combat these evolving threats, organizations need to adopt a Security Fabric platform founded on a cybersecurity mesh architecture,” said Michael Joseph, Director System Engineering, India & SAARC, Fortinet.
Prediction highlights:
Cybercriminals are leveraging AI to thwart the complicated algorithms used to detect their abnormal activity. Going forward, this will evolve as deep fakes become a growing concern because they leverage AI to mimic human activities and can be used to enhance social engineering attacks.
There will continue to be a crimeware expansion and ransomware will remain a focus going forward.
FortiGuard Labs expects to see new proof-of-concept (POC) threats targeting satellite networks over the next year as satellite-based internet access continues to grow. The biggest targets will be organizations that rely on satellite-based connectivity to support low-latency activities, like online gaming or delivering critical services to remote locations, as well as remote field offices, pipelines, or cruises and airlines.
More malware will be designed specifically to target stored credentials and to drain digital wallets. Cybercriminals have learned that they can make money reselling their malware online as a service. Rather than competing with others offering similar tools, they will expand their portfolios to include OT-based attacks.