From ransomware attacks to election misinformation to consumer scams, the cybersecurity industry will be in overdrive.
Security threats are expected to accelerate in 2022 as cybercriminals refine tried-but-true ransomware methods and try to exploit vulnerabilities in the software that weaves together the Internet. US elections would also present a tempting target for spreading misinformation.
The ramp-up in hacks, attacks and data thefts is expected after a massive boom in ransomware -- the takeover of computer systems that remain locked until the ransom is paid -- spread into consumers' lives in 2021. Cyber attacks that shut down oil transporter Colonial Pipeline and meat packer JBS USA contributed to temporary gas price hikes and meat shortages in parts of the US.
The December discovery of the Log4j bug, a critical flaw in logging software that is widely used across the Internet, offered a glimpse of a vulnerability in the software supply chain, which had already been hit with the 2020 SolarWinds hack. Security experts say hackers are probably looking for ways to exploit log4j and other vulnerabilities in the interconnected services we rely on.
The anticipated attacks come against the backdrop of a never-ending pandemic that creates additional vulnerabilities. With many still working from home, attackers will try to exploit remote connections to infiltrate corporate networks. Some scammers will even target everyday people, who are spending more and more time in front of computer screens to capture banking information, personal passwords and other data that can be used to compromise accounts.
Part of the problem is that companies don't know the size of the problem, because there's a lot of information on corporate networks, says Andrew Youseks, chief technology officer and co-founder of cybersecurity firm ThreatX.
"Many organizations just don't understand how exposed they are," Yousekas said.
Many cyber crimes, both large and small, go unreported, making aggregated data difficult to track. Still, experts say a handful of key metrics jumped to sound the alarm last year.
Notably, according to the Identity Theft Resource Center, the total number of publicly reported data breaches in the first nine months of 2021 exceeded that of 2020. According to an October report from the Treasury Department, suspicious ransomware payments reported by banks and other financial institutions totaled $590 million for the first six months of last year. This figure easily exceeded $416 million in all doubtful payments for 2020.
President Joe Biden's administration has taken steps to curb ransomware and other cyber attacks. The White House recently held a global online counter-ransomware event and promised sanctions against crypto exchanges and other financial institutions that facilitate ransomware.
In the wake of Log4j, the White House plans to hold a gathering of software company executives later this month to look for ways to boost software security.
If the balance of power in the House and Senate changes, Congressional elections in November could also result in new security priorities. The election will bring its own security risks, and experts warn that a flood of misinformation will swallow up social media platforms as of November 8.
Cyber attacks keep coming, but will the government act?
Ransomware attacks that affect only corporate back office operations often escape public notice. But when hackers shut down companies that consumers trust, everyone is aware.
The Treasury Department said in September that it would begin approving cryptocurrency exchanges and other entities that launder ransomware payments. The idea behind the move: Cracking down on the shady activity surrounding crypto — the currency of choice for ransomware payments thanks to its largely untraceable nature — would discourage ransomware attackers.
Meanwhile, lawmakers in the US and other countries began drafting legislation that would require companies to disclose if ransomware or other cyber attacks occur. Many ransomware attacks go unreported, making it difficult for law enforcement to track how many attacks are occurring, who is being targeted, and how much money is going to cybercriminals.
If attacks and demands continue to increase, politicians will need to step up legislation in an effort to show they are combating the issue, said Tony Anscombe, chief security evangelist for antivirus company ESET. That law could expand to include the prohibition of ransomware payments.
“It could then become a worldwide race to legislate because cybercriminals would target areas where payments are still allowed,” Anscombe said.
Concerns about the software supply chain
A bug in Log4j, a widely used Java library that logs error messages in network applications, highlighted that everything from government agencies to the consumer-focused Internet of Things can freely access What is to be done is dependent on the software that is included in a host of other software products.
Simple exploits, which allow attackers to take control of Internet-connected devices running affected software, are an example of vulnerabilities in a software supply chain. Often it may not be clear which devices are running the software. Like cars, software depends on a supply chain. Engineers build software with prefabricated parts that are often made up of smaller components.
Once a piece of software is finished, it can be difficult to determine all of its different parts and where they all came from.
Justin Capos, an associate professor at New York University's Tandon School of Engineering, says the current setup of the software supply chain is not transparent because so many products rely on open-source code. Even if you're buying software from a big company, you don't know what native code might have been put into it.
Capos says the software industry would benefit if it disclosed the sources of the components it uses, such as the way food manufacturers list ingredients. "Software companies can contract to one company, which then contracts to another company," Capos said. "You don't know where the source code is coming from."
Experts also expect more software supply chain hacks to occur in the coming year. Instead of taking advantage of existing loopholes, cybercriminals can insert malicious code into commonly used software to infect corporate systems.
This happened two years ago, when hackers secretly inserted bad code into an update to SolarWinds' popular Orion IT software products. Corporate customers then incorporated those products into their systems, giving cybercriminals access to their systems. Thousands of customers installed the tainted update, although SolarWinds says very few companies were actually hacked.
US officials say Russia was behind the attack. The Russian government has denied involvement.
"The fact that a nation-state has gone to these lengths to target the actor [Solarwinds]," Capos said. "I think, unfortunately, this is the beginning of a trend rather than a one-time event."
Misinformation rises ahead of mid-term elections
Already a curse, misinformation is only going to get worse in 2022. Misinformation, or false information that is spread, even if it is just to deceive, can take many forms.
Conspiracy theories, global cabals and election shenanigans about vaccines have already dominated social media. Facebook, Twitter and other social media platforms have tried to control it, but it has become a never-ending game. Fact-checkers from the media and other organizations have also tried to dispel the streams of lies. More misinformation is undoubtedly on the way.
Sophisticated deepfakes, manipulated video and audio clips that twist reality to make someone appear to say something they didn't, are getting cheaper and easier to use. Although they haven't been widely used except for demonstrations, their very existence may be enough to make some people distrust seeing them online.
Part of the problem is that as America becomes more polarized, people are more inclined to believe information that supports their world view, regardless of the accuracy of the information. Capos says the news media has become more silent and sometimes leaves out stories that don't fit an agenda.
It serves to further divide an already divided America, undermining confidence in government and democracy ahead of the midterm elections.
"People believe all kinds of weird things they want to believe," Capos said. "In a lot of cases, they won't listen to the fact-checkers."
Russia, China and others are happy to see anti-American polarization, even if they are not behind the campaigns. anything that causes infighting and stalemate; slows down the American political process; or undermines faith in democracy, may work to their advantage.
John Clay, vice president of threat intelligence for cybersecurity company Trend Micro, said he expects propaganda attacks from Russia and others to increase ahead of the November election. It will be up to the consumers to tell the truth from the lie.
"People will have to be very critical of information and where they get their information from," he said, adding that this will be difficult, given how fast information travels on social media regardless of its accuracy. Is.
The number of scams increases, go mobile
COVID changed the way we work forever. Even in the highly unlikely event that the pandemic winds down this year, many people will continue to work from home at least part of the time.
Cyber criminals will also work. They will be looking for new ways to take advantage of the connections and equipment that workers use to dial remotely.
NYU's Capos says the cybersecurity industry is more likely to manage hybrid work situations, introducing new recommendations and products that promote safety and make it easier for workers to connect.
Consumers will also need to step up their safety game, says Clay. Good methods of two-factor authentication like biometrics and push notifications are a must. Simple methods of verification, such as codes sent in the form of SMS messages, cannot be relied upon anymore.
The same goes for smartphones. Phishing, the practice of sending deceptive emails seeking personal information, is moving to mobile. Clay says similar efforts to use SMS, unimaginably known as smishing, and voice calls, called — you guessed it — Vishing, will become more common this year as people Take your online activity on mobile devices. In addition, the use of scam QR codes or quishing is also on the rise.
"The attackers are going to continue their activities and they're going to target consumers," Clay said. "People will need to secure their data."