Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), released its annual threat predictions report for 2023.
Forecasts from the Trellix Advanced Research Centre anticipate spikes in geopolitically motivated attacks across Asia and Europe, hacktivism fueled by tensions from opposing political parties, and vulnerabilities in core software supply chains.
“Analyzing current trends is necessary but being predictive in cybersecurity is vital. While organisations focus on near-term threats, we advise all to look beyond the horizon to ensure a proactive posture,” said John Fokker, Head of Threat Intelligence, Trellix. “Global political events and the adoption of new technology will breed novel threats from more innovative threat actors.”
The Trellix Advanced Research Centre brings together hundreds of the world’s most skilled security analysts and researchers to serve the global threat intelligence community and organisations with the latest threat indicators and insights from Trellix’s extensive sensor network.
Trellix Advanced Research Center forecasts the following threats in 2023:
- Geopolitics and grey-zone conflict. Geopolitical factors will continue to be a high motivation for misinformation campaigns and cyberattacks.
- Hacktivism takes centre stage. As groups of loosely organised individuals fueled by propaganda align for a common cause, they will ramp up their use of cyber tools to voice their anger and cause disruption across the globe.
- Skeletons in the software closet will multiply. Both threat actors and security researchers will heighten their study of underlying software frameworks and libraries, increasing breaches related to software supply chain issues.
- Increasing activity by teen cybercriminals. Teens and young adults will increasingly engage in cybercrime – everything from large-scale attacks on enterprises and governments to low-level crimes targeting family, friends, peers, and strangers.
- Declining accuracy of code-based attribution. Outsourcing malware creation and operation, diversification of malware development, and use of leaked source code will make attributing cyberthreats to specific threat actors increasingly challenging.
- Imminent global cyber threat to critical infrastructure as cyberwarfare evolves. A significant rise in advanced cyber actors causing disruptions to critical infrastructure in vulnerable targets will be observed.
- With more collaboration comes more phishing. Weaponized phishing attacks will increase across commonly used business communication services and apps, like Microsoft Teams, Slack, and others.
- “Alexa, start mining bitcoins.” The advanced capabilities of consumer and enterprise IoT devices will be leveraged by hackers to mine cryptocurrencies.
- Space hacking: only going up from here. The compromise of satellites and other space assets will increase and become more public in 2023.
- Here’s my number, so call me, maybe. There will be a huge jump in call-back phishing attacks, with less tech-aware users being the primary target.
- Attacks against Windows domain will scale. More domain privilege escalation vulnerabilities will be discovered as well as more real-world attacks against Microsoft Windows with the explicit goal of complete network takeover.
“We started 2022 with an industry-wide vulnerability in Log4J, which was closely followed by cyber and physical war targeting Ukraine. We’re closing the year observing hacktivists taking matters into their own hands, new actors in operation, and a changed but increasingly active ransomware landscape. As stress continues to weigh on the global economy, as we head into the new year, organisations should expect increased activity from threat actors looking to advance their own agenda – whether for political or financial gain,” commented Vibin Shaju, VP EMEA, Solutions Engineering, Trellix. “To outwit and outpace bad actors and advance defenses proactively, security must be always-on and always learning.”