{"id":10801,"date":"2015-12-09T11:19:14","date_gmt":"2015-12-09T16:19:14","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=10801"},"modified":"2017-09-24T08:11:27","modified_gmt":"2017-09-24T12:11:27","slug":"kaspersky-predictions-2016","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/kaspersky-predictions-2016\/10801\/","title":{"rendered":"Kaspersky Lab cybersecurity predictions for 2016"},"content":{"rendered":"<p>The Internet changes from year to year and online threats develop along with the World Wide Web. So what will the cyber-nightmare of home and corporate users look like in 2016?<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/12\/06023510\/ksb-predictions-2016-FB.jpg\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/12\/06023510\/ksb-predictions-2016-FB.jpg\" alt=\"Kaspersky Lab cybersecurity predictions for 2016 \" width=\"1280\" height=\"1280\" class=\"aligncenter size-full wp-image-10804\"><\/a><\/p>\n<h3>What\u2019s on the horizon for you and me?<\/h3>\n<p>Let\u2019s start with the threats targeting common users. In 2015 a lot of people suffered from <a href=\"https:\/\/www.kaspersky.com\/blog\/ask-expert-ransomware-epidemic\/9332\/\" target=\"_blank\" rel=\"noopener nofollow\">ransomware<\/a> attacks, and in 2016 this trend will continue to grow.<\/p>\n<p>For cybercriminals these viruses seem to be rather profitable. Mass infections are relatively cheap, lead to direct monetization and are complemented with victims\u2019 eagerness to pay the ransom. In short, it\u2019s an effective way to earn a lot of easy money.<\/p>\n<p>In 2016 ransomware creators could probably switch their attention to new platforms. An attack targeting Linux devices has already been tracked, but Mac OS X seems to be a tasty morsel for hackers as potentially owners of expensive Apple devices can pay more. It\u2019s also possible we\u2019ll see ransomware designed to lock different parts of the Internet of Things. How much are you ready to pay to use your smartwatch again? And what about a refrigerator or your car?<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">10 tips to protect your files from ransomware <a href=\"https:\/\/t.co\/o0IpUU9CHb\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/o0IpUU9CHb<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/iteducation?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#iteducation<\/a> <a href=\"https:\/\/t.co\/I47sPIiWFF\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/I47sPIiWFF<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/671348678607642624?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">November 30, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Another cyber trend deals with blackmailing and squeezing money for stolen photos and hacked accounts. We\u2019ve already seen a number of scandalous leaks including <a href=\"https:\/\/www.kaspersky.com\/blog\/multi-factor-authentication\/9669\/\" target=\"_blank\" rel=\"noopener nofollow\">nude celebrities\u2019 photos<\/a> and personal data of <a href=\"https:\/\/www.kaspersky.com\/blog\/ashley-madison-data-finally-leaked\/9620\/\" target=\"_blank\" rel=\"noopener nofollow\">Ashley Madison<\/a> users.<\/p>\n<p>Databases are leaked by different people and for different purposes. Some of them demand ransom; others do it to show off \u2014 just because they can. And sometimes hackers leak data to dishonor particular people and\/or organizations. Regardless of their goals, the amount of these attacks is likely to increase in 2016.<\/p>\n<p>Recently a new problem appeared. For a long time, transportation had no connection to the Internet, but now it is becoming more and more connected and thus vulnerable to cyberattacks. Now it\u2019s quite possible to <a href=\"https:\/\/www.kaspersky.com\/blog\/blackhat-jeep-cherokee-hack-explained\/9493\/\" target=\"_blank\" rel=\"noopener nofollow\">hack certain car models<\/a> and take the control over inner systems. But it\u2019s not all of it.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/BlackHat?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#BlackHat<\/a> 2015: The full story of how that Jeep was hacked <a href=\"https:\/\/t.co\/y0d6k8UE4n\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/y0d6k8UE4n<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/bhUSA?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#bhUSA<\/a> <a href=\"http:\/\/t.co\/SWulPz4Et7\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/SWulPz4Et7<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/629651596876644352?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">August 7, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Thanks to self-driving cars, remote control systems become more and more widespread, and they will surely attract hackers\u2019 attention sooner or later.<\/p>\n<p>Culprits probably won\u2019t focus on the systems themselves, but rather on the special protocols, which are implemented to enable communications between cars. Compromise them \u2014 and you\u2019ll be able to send fake commands to cars. These actions can lead to a crashes of expensive car and even to lethal consequences.<\/p>\n<h3>What are the main threats for business?<\/h3>\n<p>Judging by 2015, massive Advanced Persistent Threats (APT) against countries and organizations will almost disappear the way we now know them. However it is not time to relax yet: hackers just are about to switch from creating custom-made malware to improving existing off-the-shelf developments, making them leave less of a footprint.<\/p>\n<p>This approach makes it difficult for security experts to detect the criminals. Also this is cheaper for the customers and nothing makes a hacker\u2019s client happier than high profit with low initial investments.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">We\u2019ll see members of well-established APT teams potentially coming out of the shadows <a href=\"https:\/\/twitter.com\/hashtag\/KL2016Prediction?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#KL2016Prediction<\/a> <a href=\"https:\/\/t.co\/J7J5vTQnpb\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/J7J5vTQnpb<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/infosec?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#infosec<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/666652532412915715?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">November 17, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Nowadays every cyber campaign is unique and designed from scratch. But it\u2019s quite possible that soon we\u2019ll see them offered as a service. Criminals can even start selling not a campaign itself, but results of a breach: access to data and systems of victims, hacked beforehand.<\/p>\n<p>In 2015 hackers successfully targeted banks and financial services, and in 2016 the amount of similar attacks will only increase. Though the majority of financial attacks were directed against ATMs, one can\u2019t but think of the <a href=\"https:\/\/www.kaspersky.com\/blog\/billion-dollar-apt-carbanak\/7519\/\" target=\"_blank\" rel=\"noopener nofollow\">Carbanak group<\/a>, which stole up to $1bln from dozens of banks worldwide.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Hackers used <a href=\"https:\/\/twitter.com\/hashtag\/malware?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#malware<\/a> to steal up to $1 bln from banks in at least 2 dozen countries. <a href=\"http:\/\/t.co\/uhgtJ7hM2j\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/uhgtJ7hM2j<\/a> via <a href=\"https:\/\/twitter.com\/NBCNightlyNews?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@NBCNightlyNews<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Carbanak?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Carbanak<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/568073729139466240?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 18, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/apple-pay\/5964\/\" target=\"_blank\" rel=\"noopener nofollow\">Apple Pay<\/a>, <a href=\"https:\/\/www.kaspersky.com\/blog\/samsung-pay-security\/7932\/\" target=\"_blank\" rel=\"noopener nofollow\">Samsung Pay<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/google-io2015-news\/8850\/\" target=\"_blank\" rel=\"noopener nofollow\">Android Pay<\/a> can very well be the next targets, along with the various other new and popular untested financial services.<\/p>\n<h3>What should we all be ready for?<\/h3>\n<p>The Internet is, of course, relatively young, but it develops so rapidly, that some ideas, which lie deep in the root of World Wide Web, are already out of date. Or you can say that they are not capable of dealing with the modern design of the Internet.<\/p>\n<p>Different problems appear here and there: <a href=\"https:\/\/threatpost.com\/default-credentials-lead-to-massive-ddos-for-hire-botnet\/112767\/\" target=\"_blank\" rel=\"noopener nofollow\">botnets are found in routers<\/a>, BGP \u2014 the main routing protocol of the Internet \u2014 can be compromised, numerous <a href=\"https:\/\/threatpost.com\/exploit-kit-using-csrf-to-redirect-soho-router-dns-settings\/112993\/\" target=\"_blank\" rel=\"noopener nofollow\">attacks targeting router DNS settings<\/a> are performed and so on. The Internet falls apart and this can lead to the reconstruction of the World Wide Web, as governments will take more and more control over it. In this case the web will be subdivided according to the bounds of different countries. Basically, even now Internet in China is quite different from what it is for users from USA, Europe or Russia.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Pharming Attack Targets Home Router DNS Settings \u2013 <a href=\"http:\/\/t.co\/0Rq3PD9M7j\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/0Rq3PD9M7j<\/a> via <a href=\"https:\/\/twitter.com\/threatpost?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@Threatpost<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/571482470769668096?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 28, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>As a result, many sites and services may go underground. Users will need to pay to get access to anything, and this market will continue to grow. Correspondingly, anonymizing technologies will develop significantly.<\/p>\n<p>Another global problem may be happening even on a bigger scale \u2014 it is that unhackable things become really hackable \u2014 or will become in the nearest future. Modern cryptographic standards were designed with the idea that they cannot be compromised using existing computational powers, but they are not geared to cope with the performance of <a href=\"https:\/\/www.kaspersky.com\/blog\/prepare-to-quantim-computers-reality\/10750\/\" target=\"_blank\" rel=\"noopener nofollow\">quantum computers<\/a> and upcoming technological progress.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Quantum computers: what does it mean for you today? <a href=\"https:\/\/t.co\/E3Fwee3j2W\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/E3Fwee3j2W<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/futuretech?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#futuretech<\/a> <a href=\"https:\/\/t.co\/mBSnlpoVtV\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/mBSnlpoVtV<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/674253247528501248?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">December 8, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>It is to be hoped that quantum computers will not come into the criminal\u2019s hands in the near future, but sooner or later it will happen \u2014 and then experts will have to reconsider encryption techniques completely, and thereby change root and branch of the Internet.<\/p>\n<p>For more predictions on what 2016 holds, please <a href=\"https:\/\/securelist.com\/analysis\/kaspersky-security-bulletin\/72771\/kaspersky-security-bulletin-2016-predictions\/\" target=\"_blank\" rel=\"noopener\">visit Securelist<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Predicting the status of cybersecurity in 2016<\/p>\n","protected":false},"author":40,"featured_media":10803,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2683],"tags":[880,1337,36,192,97,422],"class_list":{"0":"post-10801","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-future","10":"tag-kl2016prediction","11":"tag-malware-2","12":"tag-protection","13":"tag-security-2","14":"tag-threats"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/kaspersky-predictions-2016\/10801\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/kaspersky-predictions-2016\/6396\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/kaspersky-predictions-2016\/6457\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/kaspersky-predictions-2016\/7359\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/kaspersky-predictions-2016\/7049\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/kaspersky-predictions-2016\/10160\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/kaspersky-predictions-2016\/6576\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/kaspersky-predictions-2016\/9827\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/kaspersky-predictions-2016\/10160\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/kaspersky-predictions-2016\/10801\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/kaspersky-predictions-2016\/10801\/"}],"acf":[],"banners":"","maintag":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/10801","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=10801"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/10801\/revisions"}],"predecessor-version":[{"id":18851,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/10801\/revisions\/18851"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/10803"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=10801"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=10801"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=10801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}