G DATA IT Security Trends 2022: To achieve their goals, attackers rely on multi-ransomware attacks and use artificial intelligence to create better malicious code. […]
“Criminals have to adapt their strategies because it is no longer enough to hide malicious code from security software with packers,” says Karsten Hahn, malware analyst at G DATA CyberDefense. “Malicious code in new programming languages can sometimes be more difficult to analyze, because at the beginning there is no support for special analysis tools. But this is only a matter of time. So the well-known cat-and-mouse game between criminal hackers and defenders continues.“
Ransomware on Steroids
But not only new attack possibilities threaten the networks in companies, organizations and municipalities, but also the further development of existing and profitable attack vectors. Therefore, we can expect more multi-ransomware attacks. The criminals combine several attack vectors: they derive data from the company, encrypt the data on the network and carry out a DDoS attack on the company’s website. Subsequently, they blackmail not only the company, but also the customers and threaten with the publication of personal data in case of non-payment. In addition, attackers adjust their targets to increase the pressure on their victims. Therefore, in the future they will no longer only attack the infrastructure of a company, but also networked products – from vehicles to game consoles to kitchen appliances or networked industrial plants. Another trend: Operators of critical infrastructures in particular are increasingly being targeted, because they have a large and valuable treasure trove of data.
“The level of IT security in companies is directly related to the entire level of IT,” says Tim Berghoff, Security Evangelist at G DATA CyberDefense. “The more professional a company is, the higher the security here. Small and medium-sized enterprises have considerable catching up to do. To do this, you need to free up your budget and either hire specialized personnel or work with external service providers.“
Windows 11: access through the Android backdoor
With the possible integration of Android apps in Windows 11, Microsoft is not only opening up new possibilities for users to play games on a large monitor instead of the smartphone screen in the future. There are also new ways for cybercriminals to attack Windows computers and inject malicious code into systems. Companies or IT administrators are also required here if a bring-your-own-device policy allows the use of private Android devices for business purposes. Currently, mobile malware developers are still struggling with a number of practical problems, such as approval procedures in app stores. However, mobile malware can be disguised as an update for a popular software package and thus infects smartphones because many people are careless and do not pay attention to warnings.
Small and medium-sized enterprises in the crosshairs
2021 has already shown that cybercriminals are increasingly attacking supply chains in order to infiltrate companies. This trend will not only continue, but also intensify. In particular, small and medium-sized companies are coming into focus because they are still not paying the necessary attention to the topic of IT security. They are often the weakest link in the chain and offer attackers the gateway to infiltrate even larger organizations.