Security

Threats and Consequences: Cybersecurity Landscape

Johan Carlsson
SALES & COMMUNICATION DIRECTOR
1:31 pm

Understanding why cyber-attacks occur

Cyber-attacks all point in one direction: to cause maximum damage to a business or organization. Their objectives can be specifically categorized into motives such as, financial gain, motives of revenge or one-upmanship, or even cyber-warfare between two organizations or whole nations.

Before we dive into the most common ways companies are affected, let’s have a brief look at some trends in relation to the threat landscape:

  • There were 137.7 million new malware samples in 2020 (AV-Test), a slight reduction from the 144.91 samples in 2019. As of June 2021, there have been 92.45 million new samples, so we may well see a new high before the end of the year.
  • Almost 50% of business PCs and 53% of consumer PCs that got infected once were re-infected within the same year (2021 Webroot Threat Report)
  • By the end of 2021, cybercrime is expected to cost the world $6 trillion. By 2025, this figure will climb to $10.5 trillion.
  • The global information security market is projected to grow to $170.4 billion in 2022 to cope with the rising cyber-crime projection.
  • 61% of cybersecurity professionals believe that their cybersecurity team is understaffed. Moreover, the cybersecurity skills gap will remain a huge challenge, creating 3.5 million unfilled jobs in 2021.

With those big numbers out of the way, let’s dive into the most common ways organizations are affected:

Malwares

Malwares are packages or types of malicious software that are created to spy, infiltrate, and compromise a business or an organization’s data. Ransomware, worms, trojans, adware and spyware can all be classified under malwares. They can cause major data breaches, disrupt businesses and cause a lot of financial loss to an organization and damages reputations of the victims. Malware usage has been up almost 800% since early 2020. “WannaCry” a malware group, took advantage of a security liability of Microsoft and displayed ransom messages to connected businesses, hospitals, banks and manufacturers. The development of Malware is expected to remain static during 2021 (neither decrease nor increase in amount).

Phishing attacks

These attacks will steal information from users or trick them into downloading malware by sending malicious emails that resemble real/official requests but are, in fact, a scam. An example can be when cyber criminals hacked the AP News Twitter account and falsely tweeted that the White House was under attack. The attackers used a targeted phishing attack (spear-phishing) to gain access to the account. Another example is when Hillary Clinton’s emails were leaked during her Presidential campaign. Phishing attacks are more tricky to handle. Since they pose as something else entirely, and since they are very easy to perform. They are also one of the most common methods used by cyber criminals to access data and perform identity theft. Phishing attacks are in an ever-growing curve, with the expectation of number of attacks increasing even further during 2021/2022.

Distributed Denial of Service (DDoS) attacks

These attacks disrupt or stop the traffic to a website, or an application, server, service, or even a network by flooding it with traffic from botnets (compromised computer networks), preventing actual users from accessing it. In 2018, GitHub experienced the largest DDoS attack ever when it was hit with 1.35 terabits of traffic per second and was offline for almost 20 minutes as a result. DdoS attacks are currently in a downward trend, expected to decrease in the number of attacks during 2021/2022.

Man-in-the-middle (MitM) attacks

These attacks occur when an internal resource at an organization, spies on or intercepts communication between users and businesses or even employees within their organization. MitM attacks target personal or company information or redirect that information to another destination or for espionage purposes, for example: Russian intelligence operatives attempted to breach the Organisation for the Prohibition of Chemical Weapons (OPCW), a weapons watchdog organization, by using espionage equipment in a car next to the OPCW headquarters in Hague. MitM attacks have recently surged all around the world, resulting in Governments enforcing cybersecurity norms.

Hijacking of Accounts

The growing popularity of IoT devices and the growing concept of a connected world exposes users to further risk of account data being compromised. Hijacking of accounts can have devastating consequences on a business if their data is leaked, falsified, or plagiarised. Account hijacking incidents can be minimized by constant monitoring, multifactor access systems, proper security logs, and encrypting data. Example: In July, the Twitter accounts of some of the world’s most influential people — including Barack Obama, Bill Gates, Joe Biden, Elon Musk, and Kanye West — all posted suspicious tweets asking for Bitcoin. The scam tweets would vanish and appear in a whimsical fashion. Identity thefts and hijacking accounts have been on the rise from the past two years and these attacks are maintaining an upward curve.

Cyber Security

So how do you keep your business, data, assets, and resources safe in the wake of all these potential threats?

Businesses need a dedicated and experienced team of certified security experts to keep up with the security challenges. Cyber criminals are quickly developing and improving their methods – and there’s no way for organizations to single-handedly stay on top of this rate of growth and pace of destructive innovation.

If you wish further information, or security consulting specific to your organization’s needs and goals – do not hesitate to reach out to Opsio.

About Johan Carlsson
Johan Carlsson
SALES & COMMUNICATION DIRECTOR
Johan joined Opsio during its’ founding year, working closely with our customers on their evolution in the cloud landscape. Johan’s favourite subject is innovation, and is driven by curiosity to understand and help solve organization’s unique challenges in the cloud.
Cloud Migration
Migration of WorkBuster to AWS
Read More
Cloud Migration
Migration of Branäsgruppen AB to AWS
Read More
Cloud Migration
Migration of ET Network to AWS
Read More
Tell us about your business requirement
And our team will get back to you.