{"id":43317,"date":"2022-01-12T10:17:51","date_gmt":"2022-01-12T15:17:51","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=43317"},"modified":"2022-11-17T04:03:13","modified_gmt":"2022-11-17T09:03:13","slug":"cyber-threats-business-2022","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/cyber-threats-business-2022\/43317\/","title":{"rendered":"Five business cyberthreats taking center stage in 2022"},"content":{"rendered":"<p>Every year, businesses face a changing threat landscape. It pays for leaders to know what the experts think will come next. If you\u2019re upgrading your cybersecurity or <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/choosing-cybersecurity-vendor\/35748\/\" target=\"_blank\" rel=\"noopener nofollow\">looking for a new vendor<\/a>, knowing what attacks are likely in 2022 will help you make the right choice.<\/p>\n<p>It turns out <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/cybersecurity-predictions-2021\/38136\/\" target=\"_blank\" rel=\"noopener nofollow\">our predictions for 2021<\/a> were on the money. So what should you and your colleagues plan for this year? We\u2019re forecasting these four events that could have flow-on effects for other industries.<\/p>\n<h2>1.\u00a0 Financial organizations will face more threats around cryptocurrency<\/h2>\n<p>Cryptocurrency keeps growing, and people will keep investing in it for many reasons, including its anonymity, which also makes it attractive to cybercrime groups.<\/p>\n<blockquote><p>State-sponsored groups have already started targeting the financial industry, and we think that will keep happening.<\/p>\n<\/blockquote>\n<p>In the scramble for cryptocurrency investment opportunities, cybercriminals will use social engineering campaigns, fabricating and selling rogue devices with <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/backdoor\/\" target=\"_blank\" rel=\"noopener\">backdoors<\/a> to steal financial assets.<\/p>\n<p><a href=\"https:\/\/securelist.com\/cyberthreats-to-financial-organizations-in-2022\/104974\/\" target=\"_blank\" rel=\"noopener\">More financial industry cyberthreats we\u2019ll see in 2022<\/a><\/p>\n\t\t\t<div class=\"c-promo-product\">\n\t\t\t\t\t\t<article class=\"c-card c-card--link c-card--medium@sm c-card--aside-hor@lg\">\n\t\t\t\t<div class=\"c-card__body  \">\n\t\t\t\t\t<header class=\"c-card__header\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"c-card__headline\">Are aliens the next big cyber-hackers?<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"c-card__title \"><span>Cybercrime in space<\/span><\/h3>\n\t\t\t\t\t\t\t\t\t\t\t<\/header>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"c-card__desc \">\n\t\t\t\t\t\t\t<p>Cyberattacks happen in space more than you might think. <\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"c-card__aside\">\n\t\t\t\t\t<a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/space-infrastructure-cybersecurity-future\/41724\/\" class=\"c-button c-card__link\" target=\"_blank\" rel=\"noopener nofollow\">Read more<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/article>\n\t\t<\/div>\n\t\n<h2>2.\u00a0 Fake medical documentation will trouble healthcare<\/h2>\n<p>We saw the trade in faked medical documents like COVID-19 vaccination passports and test results in 2021. <a href=\"https:\/\/www.kaspersky.com\/blog\/coronavirus-vaccines-darknet\/38903\/\" target=\"_blank\" rel=\"noopener nofollow\">Fake vaccines were even spotted for sale on the dark web<\/a>. As more countries roll out privileges alongside vaccination or test documentation, criminals will roll out more fakes.<\/p>\n<p>Medical-themed bait has long featured in cybercrime. With the pandemic triggering increased use of online medical services, patients watch for notifications about test results and messages from doctors.<\/p>\n<blockquote><p>Spoofed medical notifications will catch anxious patients off guard, putting their private health data at risk.<\/p>\n<\/blockquote>\n<p><a href=\"https:\/\/securelist.com\/connected-healthcare-predictions-for-2022\/104969\/\" target=\"_blank\" rel=\"noopener\">More healthcare cyberthreats likely in 2022<\/a><\/p>\n<h2>3.\u00a0 Governments will conflict and compromise with big tech<\/h2>\n<p>Governments are wary of big tech\u2019s growing power and data hoarding. As states build more digital infrastructure for delivering services and deeper insights into their population, they\u2019ll show more interest in what citizen data big business holds.<\/p>\n<p>We\u2019ll see more regulation, such as privacy and data localization laws, and regulation around how law enforcement can access data. <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-apple-csam-detection\/41502\/\" target=\"_blank\" rel=\"noopener nofollow\">Apple\u2019s new system that scans devices for child abuse images<\/a> shows the challenges of balancing user privacy against stopping crime.<\/p>\n<p><a href=\"https:\/\/securelist.com\/privacy-predictions-2022\/104912\/\" target=\"_blank\" rel=\"noopener\">More privacy predictions for 2022<\/a><\/p>\n<h2>4.\u00a0 Industrial attacks will become more focused<\/h2>\n<p>In many parts of the world, a rapidly snowballing trend is laser-focused attacks, particularly on Industrial Computer Systems (ICS.) We\u2019ve seen increasing theft of authentication data using spyware, with each attack directed at only a handful of targets. We think these kinds of attacks will make up an even greater portion of the threat landscape in 2022, and we\u2019ll see the tactic used more widely.<\/p>\n<p>These attacks show why industrial shop floors must be protected. <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/industrial-iot\/28210\/\" target=\"_blank\" rel=\"noopener nofollow\">Industrial internet of things (IIoT) devices<\/a> are easily overlooked and often vulnerable.<\/p>\n<p><a href=\"https:\/\/securelist.com\/threats-to-ics-and-industrial-enterprises-in-2022\/104957\/\" target=\"_blank\" rel=\"noopener\">More predictions for industrial cybercrime in 2022<\/a><\/p>\n<h2>5.\u00a0 Ransomware attacks will get more targeted<\/h2>\n<p><a href=\"https:\/\/securelist.com\/the-story-of-the-year-ransomware-in-the-headlines\/105138\/\" target=\"_blank\" rel=\"noopener\">2021 was a big year in ransomware<\/a>, with a 30 percent growth in Ransomware 2.0, also known as double extortion. These attacks go beyond demanding a ransom to de-encrypt systems to using stolen sensitive data as leverage to pressure victims to pay up.<\/p>\n<p>In November 2021, the US <a href=\"https:\/\/www.ic3.gov\/Media\/News\/2021\/211101.pdf\" target=\"_blank\" rel=\"noopener nofollow\">FBI warned ransomware actors are \u201cusing significant financial events<\/a>, such as mergers and acquisitions, to target and leverage victim companies for ransomware infections.\u201d At these times, any leaked information could have devastating consequences, making victims more inclined to pay ransoms. In 2022, this type of extortion will become more common.<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/security-awareness-behavioral-psychology\/37285\/\" target=\"_blank\" rel=\"noopener nofollow\">Regular, high-quality cybersecurity training for all staff<\/a> is one of the best ways of avoiding falling victim to ransomware. Kaspersky is one of several organizations behind the <a href=\"https:\/\/www.nomoreransom.org\/\" target=\"_blank\" rel=\"noopener nofollow\">No More Ransom<\/a> initiative, providing free decryption tools and advice for ransomware victims.<\/p>\n<p><a href=\"https:\/\/securelist.com\/the-story-of-the-year-ransomware-in-the-headlines\/105138\/\" target=\"_blank\" rel=\"noopener\">More on ransomware activity in 2021<\/a><\/p>\n<p>As your strategic plans for 2022 take shape, improving cybersecurity will no doubt be among them. Your business must adapt as cybercriminals\u2019 ways and means change. These predictions will help you and your team be forewarned and forearmed.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By scanning the horizon of cyberthreats, business leaders can stay ahead of each year\u2019s changing roster of fraudsters, scammers and data thieves.<\/p>\n","protected":false},"author":2522,"featured_media":46231,"template":"","coauthors":[3495],"class_list":{"0":"post-43317","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-safer-business","7":"emagazine-category-tech-for-business","8":"emagazine-category-threat-intelligence","9":"emagazine-tag-financial","10":"emagazine-tag-industrial","11":"emagazine-tag-predictions"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/cyber-threats-business-2022\/43317\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/secure-futures-magazine\/cyber-threats-business-2022\/26063\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/43317","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2522"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/46231"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=43317"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=43317"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}