IT disaster recovery, cloud computing and information security news

Hacktivism, deepfakes, attacks on business collaboration tools, new regulatory mandates, and pressure to cut complexity will top organizations’ security agendas over coming year.

Check Point Software Technologies Ltd has released its cyber threat predictions for 2023, detailing the key security challenges that organizations will face over the next year.

Cyber attacks across all industry sectors increased by 28 percent in the third quarter of 2022 compared to 2021, and Check Point predicts a continued sharp rise worldwide, driven by increases in ransomware exploits and in state-mobilized hacktivism driven by international conflicts. At the same time, organizations’ security teams will face growing pressure, as the global cyber workforce gap of 3.4 million employees widens further, and Governments are expected to introduce new cyber regulations to protect citizens against breaches.

In 2022 cyber criminals and state-linked threat actors continued to exploit organizations’ hybrid working practices, and the increase in these attacks is showing no signs of slowing as the Russia – Ukraine conflict continues to have a profound impact globally.

Check Point’s predictions for 2023 fall into four categories: malware and phishing;  hacktivism;  emerging Government regulations;  and security consolidation:

Hikes in malware and hacking exploits

  • No respite from ransomware: this was the leading threat to organizations in the first half of 2022, and the ransomware ecosystem will continue to evolve and grow with smaller, more agile criminal groups forming to evade law enforcement.
  • Compromising collaboration tools: while phishing attempts against business and personal email accounts are an everyday threat, in 2023 criminals will widen their aim to target business collaboration tools such as Slack, Teams, OneDrive and Google Drive with phishing exploits. These are a rich source of sensitive data given most organizations’ employees continue to often work remotely.  

Hacktivism and deepfakes evolve

  • State-mobilized hacktivism: in the past year, hacktivism has evolved from social groups with fluid agendas (such as Anonymous) to state-backed groups that are more organized, structured and sophisticated. Such groups have attacked targets in the US, Germany, Italy, Norway, Finland, Poland and Japan recently, and these ideological attacks will continue to grow in 2023.
  • Weaponizing deepfakes: in October 2022, a deepfake of US President Joe Biden singing ‘Baby Shark’ instead of the national anthem was circulated widely. Was this a joke, or an attempt to influence the important US mid-term elections? Deepfakes technology will be increasingly used to target and manipulate opinions, or to trick employees into giving up access credentials.

Governments step up measures to protect citizens

  • New laws around data breaches: the breach at Australian telco Optus has driven the country’s Government to introduce new data breach regulations that other telcos must follow, to protect customers against subsequent fraud. We will see other national governments following this example in 2023, in addition to existing measures such as GDPR.
  • New national cybercrime task forces: more governments will follow Singapore’s example of setting up inter-agency task forces to counter ransomware and cybercrime, bringing businesses, state departments and law enforcement together to combat the growing threat to commerce and consumers.  These efforts are partially a result of questions over whether the cyber insurance sector can be relied upon as a safety net for cyber incidents.
  • Mandating security and privacy by design: the automotive industry has already moved to introduce measures to protect the data of vehicle owners. This example will be followed in other areas of consumer goods that store and process data, holding manufacturers accountable for vulnerabilities in their products.

Consolidation matters

  • Cutting complexity to reduce risks: the global cyber-skills gap grew by over 25 percent in 2022. Yet organizations have more complex, distributed networks and cloud deployments than ever before because of the pandemic. Security teams need to consolidate their IT and security infrastructures to improve their defences and reduce their workload, to help them stay ahead of threats. Over two-thirds of CISOs stated that working with fewer vendors’ solutions would increase their company’s security.

Predictions from Check Point executives:

Mark Ostrowski, Office of the CTO, Check Point Software 
“Deepfakes will go mainstream with hacktivists and cybercriminals leveraging video and voicemails for successful phishing and ransomware attacks.” 

Maya Horowitz, VP of Research, Check Point Software
“We’re entering a new era of hacktivism, with increasing attacks motivated by political and social causes. Threat actors are becoming increasingly shameless and will turn their attention to critical infrastructure.” 

Micki Boland, Office of the CTO, Check Point Software  
“We will see a nation-state lead a sustained and lengthy attack against the USA’s power grid, leading to power disruptions impacting critical business and societal functions.” 

Deryck Mitchelson, EMEA CISO, Check Point 
“Cloud transformation will slow due to cost and complexity, with many firms considering bringing workloads back in-house or to private data centres to reduce their overall threat surface.” 

Deryck Mitchelson, EMEA CISO, Check Point Software 
“We will see much more debate around and push for security regulation, as the current carrot and stick approach has not worked.” 

Dan Wiley, Head of Threat Management, Check Point Software 
“The cyber insurance industry is undergoing major tectonic shifts. Companies will most likely not be able to rely on insurance as a safety net for cyber incidents. Like we’ve seen with the auto industry, policymakers will act to protect their constituents with legislation holding makers accountable for software defects that create cyber vulnerabilities. In turn, this will put the onus on software vendors to build in security validations.” 

Jeremy Fuchs, Research Analyst, Avanan, a Check Point company 
“While email and phishing go hand-in-hand and will still be dangerous and proliferate, in 2023 cyber criminals will also turn to business collaboration compromise, with phishing attacks used to access Slack, Teams, OneDrive, Google Drive, etc. Employees are often loose with sharing data and personal information while using these business apps, making them a lucrative source of data for hackers.”

Jony Fischbein, CISO, Check Point Software 
“In our multi-hybrid environment, many CISOs struggle to build a comprehensive security program with multiple vendors. In 2023, CISOs will decrease the number of security solutions deployed in favor of a comprehensive, single solution to reduce complexity.” 

Oded Vanunu, Head of Products Vulnerability Research, Check Point Software 
“Dramatic increase of digital scams, due to a global economic slowdown and inflation. Cyber criminals will increasingly turn to social media campaigns via Telegram, WhatsApp and other popular messaging apps. There will also be more cyber attacks on Web3 blockchain platforms, mainly to overtake platforms and their users’ crypto assets.”  

www.checkpoint.com


Want news and features emailed to you?

Signup to our free newsletters and never miss a story.

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.