{"id":44809,"date":"2022-07-06T10:39:13","date_gmt":"2022-07-06T14:39:13","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=44809"},"modified":"2022-07-26T09:58:09","modified_gmt":"2022-07-26T13:58:09","slug":"5-advanced-cyberthreats-2022","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/5-advanced-cyberthreats-2022\/44809\/","title":{"rendered":"Five indispensable cyberthreat insights for enterprises"},"content":{"rendered":"<p>Cyberthreats and cybercriminals\u2019 methods change all the time. Each year, we see things we\u2019ve never seen before. Understanding what cyber researchers are finding can help your enterprise stay ahead of evolving cyberthreats, preventing costly data breaches and malicious damage.<\/p>\n<p>Kaspersky has the biggest global network of cybersecurity research and analyst teams, collaborating closely with product research and development. With expert researchers distributed across the globe, we see can escalate and respond to local situations fast.<\/p>\n<p>Here, we share some of our recent observations your business can act on today.<\/p>\n\t\t\t<div class=\"c-promo-product\">\n\t\t\t\t\t\t<article class=\"c-card c-card--link c-card--medium@sm c-card--aside-hor@lg\">\n\t\t\t\t<div class=\"c-card__body  \">\n\t\t\t\t\t<header class=\"c-card__header\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"c-card__headline\">Our solution<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"c-card__title \"><span>Kaspersky Enterprise Cybersecurity<\/span><\/h3>\n\t\t\t\t\t\t\t\t\t\t\t<\/header>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"c-card__desc \">\n\t\t\t\t\t\t\t<p>One cybersecurity partner for all your enterprise security needs.<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"c-card__aside\">\n\t\t\t\t\t<a href=\"https:\/\/go.kaspersky.com\/onepartner\" class=\"c-button c-card__link\" target=\"_blank\" rel=\"noopener nofollow\">See solution<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/article>\n\t\t<\/div>\n\t\n<h2>1. Ransomware is stepping it up a notch<\/h2>\n<div id=\"attachment_44817\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" aria-describedby=\"caption-attachment-44817\" class=\"wp-image-44817\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/07\/06070356\/Fabio_Assolini-886x1024.jpg\" alt=\" Fabio Assolini\" width=\"300\" height=\"347\"><p id=\"caption-attachment-44817\" class=\"wp-caption-text\">Fabio Assolini<\/p><\/div>\n<p>Fabio Assolini, Senior Security Researcher, Global Research and Analysis Team (GReAT,) Latin America, says:<\/p>\n<p>\u201cThis year, ransomware is no less active. Cybercriminals keep threatening retailers and enterprises worldwide. Watching these tendencies gives us threat intelligence to fight cybercrime today and helps us prepare for what we may see in the months to come.<\/p>\n<p>\u201cOur <a href=\"https:\/\/securelist.com\/new-ransomware-trends-in-2022\/106457\/\" target=\"_blank\" rel=\"noopener\">research groups ransomware into three big trends<\/a>: Ransomware that adapts to be able to infect different platforms, ransomware becoming more \u201cindustrialized\u201d and cybercriminals taking sides in geopolitical conflicts. But despite its ever-increasing sophistication and targeting, there\u2019s still much enterprises can do to stay safe.\u201d<\/p>\n<p><strong>What to do<\/strong>: Find out about the <a href=\"https:\/\/securelist.com\/new-ransomware-trends-in-2022\/106457\/\" target=\"_blank\" rel=\"noopener\">five best steps your business can take to fight ransomware<\/a> \u2013 from keeping software up to date, to ensuring your Security Operations team has access to the latest threat intelligence.<\/p>\n<h2>2. Advanced Persistent Threats are coming out of the woodwork<\/h2>\n<p>An <a href=\"https:\/\/www.kaspersky.com\/resource-center\/definitions\/advanced-persistent-threats\" target=\"_blank\" rel=\"noopener nofollow\">Advanced Persistent Threat (APT)<\/a> involves sneaky, sophisticated hacking techniques. It may hide malicious software in your system for a long time, stealing information or waiting for the moment to cause maximum damage. Kaspersky tracks more than 900 groups of APTs.<\/p>\n<div id=\"attachment_44813\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" aria-describedby=\"caption-attachment-44813\" class=\"wp-image-44813\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/07\/06063917\/David_Emm-245x300.jpg\" alt=\"David Emm\" width=\"300\" height=\"367\"><p id=\"caption-attachment-44813\" class=\"wp-caption-text\">David Emm<\/p><\/div>\n<p>David Emm, Principal Security Researcher, GReAT Global, says:<\/p>\n<p>\u201cWe <a href=\"https:\/\/securelist.com\/it-threat-evolution-q1-2022\/106513\/\" target=\"_blank\" rel=\"noopener\">became aware of a firmware-level APT compromise<\/a> through our <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/wiki-section\/products\/anti-rootkit-and-remediation-technology\" target=\"_blank\" rel=\"noopener nofollow\">firmware scanner<\/a> logs. The attackers had modified a single component to intercept the machine\u2019s boot sequence and introduce a sophisticated infection chain. The chain leaves no traces on the hard drive, as its components operate in memory only \u2013 a fileless attack with a small footprint.\u201d<\/p>\n<p>The researchers named the new ATP MoonBounce and have linked it to a known threat actor.<\/p>\n<p><strong>What to do: <\/strong>Arm employees with the knowledge they need to protect your organization. <a href=\"https:\/\/securelist.com\/tag\/apt\" target=\"_blank\" rel=\"noopener\">Get APT threat reports on SecureList<\/a>.<\/p>\n<h2>3. Apps can make Internet of Things devices even more vulnerable<\/h2>\n<p>The Internet of Things (IoT) is a fast-growing ecosystem \u2013 forecasts predict <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/industrial-iot\/28210\/\" target=\"_blank\" rel=\"noopener nofollow\">we\u2019ll use more than 75 billion IoT devices by 2025<\/a>. Among these, companion apps for internet-connected cars have attracted special attention. In early 2022, a <a href=\"https:\/\/securelist.com\/third-party-automotive-app-security\/106538\/\" target=\"_blank\" rel=\"noopener\">19-year-old hacker shared how he had accessed and controlled more than a dozen Tesla cars through their apps<\/a>.<\/p>\n<p>The vulnerability of IoT devices, increasingly part of <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/industrial-iot\/28210\/\" target=\"_blank\" rel=\"noopener nofollow\">manufacturing and industry processes<\/a>, has long been known. Our <a href=\"https:\/\/www.kaspersky.com\/transparency-center\" target=\"_blank\" rel=\"noopener nofollow\">interest in transparency<\/a> recently spurred Kaspersky analysts to look at car-controlling apps, finding their security and openness often lacking.<\/p>\n<div id=\"attachment_44814\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" aria-describedby=\"caption-attachment-44814\" class=\"wp-image-44814\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/07\/06064330\/Dan_Demeter-886x1024.jpg\" alt=\"Dan Demeter\" width=\"300\" height=\"347\"><p id=\"caption-attachment-44814\" class=\"wp-caption-text\">Dan Demeter<\/p><\/div>\n<p><strong>What to do:<\/strong> Dan Demeter, Senior Security Researcher, GReAT Europe, Middle East and Africa says:<\/p>\n<p>\u201cFor an ongoing well-established security perimeter, we recommend periodic checks and updates for all applications used withing the perimeter, whether it\u2019s a consumer or a business environment. Remove any obsolete or not used apps from these environments as soon as possible.\u201d<\/p>\n<p>Demeter also highlights better practice among some vehicle companion apps. \u201cSome use specially designed solutions from automakers, which, for example, make it impossible to unlock the doors remotely. With access to the vehicle\u2019s data through the manufacturer\u2019s website, there\u2019s no need to give credentials to an app, and users can revoke access any time.\u201d<\/p>\n<h2>4. Geopolitical tensions are raising denial-of-service risk<\/h2>\n<p><a href=\"https:\/\/www.kaspersky.com\/resource-center\/threats\/ddos-attacks\" target=\"_blank\" rel=\"noopener nofollow\">Distributed Denial of Service (DDoS) attacks<\/a> are cybercriminals\u2019 go-to targeted attack. They overwhelm a server, service or network with a flood of traffic, so you can\u2019t give your customers reliable online service.<\/p>\n<p>The <a href=\"https:\/\/securelist.com\/ddos-attacks-in-q1-2022\/106358\/\" target=\"_blank\" rel=\"noopener\">Russia-Ukraine conflict has triggered a spate of DDoS attacks in both countries<\/a>, targeting critical infrastructure, media and state-run services. <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/hacktivism\/\" target=\"_blank\" rel=\"noopener\">Hacktivist<\/a> groups have instigated some of these attacks, distributing apps, software and even games which can teach cybercrime skills to those with other aims, like extortion. Kaspersky researchers have noted a sharp rise in DDoS attacks across the board.<\/p>\n<p><strong>What to do:<\/strong> Researchers advise businesses and nation states to prepare for DDoS attacks before they happen, through investing in suitable security controls and preparing defensive strategies with national internet service providers (ISPs.)<\/p>\n<div id=\"attachment_44816\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" aria-describedby=\"caption-attachment-44816\" class=\"wp-image-44816\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/07\/06065952\/great-yamout.png\" alt=\"Maher Yamout\" width=\"300\" height=\"325\"><p id=\"caption-attachment-44816\" class=\"wp-caption-text\">Maher Yamout<\/p><\/div>\n<p>Maher Yamout, Senior Security Researcher, GReAT Middle East, Turkey and Africa, says:<\/p>\n<p>\u201cDeploy cyber defenses in advance. When an attack comes, it\u2019s too late. You never know when an emergency will happen, so today\u2019s the day to take care of your <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/ddos-protection\" target=\"_blank\" rel=\"noopener nofollow\">anti-DDoS protection<\/a>.\u201d<\/p>\n<p>Threat intelligence also plays an important role in preventing DDoS attacks. Kaspersky is the only global threat intelligence provider with a major presence and expertise in Russia, where most advanced persistent threats and attacks originate. Security teams should <a href=\"https:\/\/securelist.com\/\" target=\"_blank\" rel=\"noopener\">subscribe to Kaspersky SecureList<\/a> to stay up-to-date.<\/p>\n<h2>5. Malware keeps upping the ante<\/h2>\n<p><a href=\"https:\/\/www.comparitech.com\/antivirus\/malware-statistics-facts\/\" target=\"_blank\" rel=\"noopener nofollow\">Malware is common<\/a> and costly. Over the past year, Kaspersky software prevented at least one malware attack on 20 percent of our users. Recently we\u2019ve seen plenty of <a href=\"https:\/\/securelist.com\/emotet-modules-and-recent-attacks\/106290\/\" target=\"_blank\" rel=\"noopener\">new and rehashed techniques aimed at disguising malware or letting it do more damage<\/a>.<\/p>\n<div id=\"attachment_44815\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" aria-describedby=\"caption-attachment-44815\" class=\"wp-image-44815\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/07\/06064951\/Mohammad_Amin_Hasbini-850x1024.jpg\" alt=\"Mohammad Amin Hasbini\" width=\"300\" height=\"361\"><p id=\"caption-attachment-44815\" class=\"wp-caption-text\">Dr Amin Hasbini<\/p><\/div>\n<p>Dr Amin Hasbini, Unit Head of GReAT Middle East, Turkey and Africa, says:<\/p>\n<p>\u201cSince its discovery in 2014, we\u2019ve seen the malware Emotet \u2013 originally designed to steal banking credentials \u2013 in many other forms, like as a delivery system for other malware and and <a href=\"https:\/\/www.kaspersky.com\/resource-center\/threats\/botnet-attacks\" target=\"_blank\" rel=\"noopener nofollow\">botnet<\/a> executable, using small employee mistakes to create big incidents. It mostly spreads nowadays through malicious email spam.\u201d<\/p>\n<p><strong>What to do:<\/strong> Malware attacks often start with an employee making a small error of judgment, like clicking a link in a dodgy email, so one of the best ways to stay safe is to thoroughly educate all your staff in cybersecurity. Kaspersky research in partnership with Longitude, a Financial Times company, found <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/research-cybersecurity-skills-training\/43771\/\" target=\"_blank\" rel=\"noopener nofollow\">leaders whose cybersecurity training programs can keep pace with the threat landscape<\/a> say their companies are better prepared for a cyberattack.<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/cyber-security-training\" target=\"_blank\" rel=\"noopener nofollow\">Immersive cybersecurity training<\/a> is a powerful way to engage your workforce with learning in an age when there is <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/cyber-security-training\" target=\"_blank\" rel=\"noopener nofollow\">much competition for their attention<\/a>.<\/p>\n<p>Advanced cyberthreats are common. They have a big impact on business reputation and bottom line. When business leaders take cybersecurity action, they avoid spending more time later mopping up a cyberattack\u2019s damage.<\/p>\n<p>When choosing your cybersecurity vendor, look for those that <a href=\"https:\/\/www.kaspersky.com\/about\/press-releases\/2022_kaspersky-named-top-player-in-apt-protection-market-by-radicati-group\" target=\"_blank\" rel=\"noopener nofollow\">participate in third-party tests and reviews<\/a>, win awards and achieve top scores in independent tests. What\u2019s clear is that advanced threats are ever-changing, so having the <a href=\"https:\/\/securelist.com\/\" target=\"_blank\" rel=\"noopener\">most up-to-date threat intelligence<\/a> will always be crucial for your business.<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Each year, Kaspersky research sees advanced cyberthreats trends business should know about. These five action points could save you a big clean-up job.<\/p>\n","protected":false},"author":2521,"featured_media":44810,"template":"","coauthors":[3452],"class_list":{"0":"post-44809","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-enterprise-cybersecurity","7":"emagazine-tag-advanced-threats","8":"emagazine-tag-malware","9":"emagazine-tag-ransomware"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/5-advanced-cyberthreats-2022\/44809\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/secure-futures-magazine\/5-advanced-cyberthreats-2022\/26728\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/44809","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2521"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/44810"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=44809"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=44809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}