Home Editor's Picks Cyber Threat Report Highlights Five Areas of Concern

Cyber Threat Report Highlights Five Areas of Concern

Cyber Threat Report Highlights Five Areas of Concern
0
Get started on your cybersecurity degree at American Military University.

By Marissa Bergen 
Contributor, InCyberDefense

Despite the growing awareness of cyber threats and the available knowledge on cybersecurity protection, there are still several serious threats in the cybersecurity landscape. Accenture Security iDefense identified five problematic areas in a recent report.

1: The Iranian Threat

Iran remains a threat to cybersecurity because its malicious activities and capabilities continue to grow. The cyber threat from Iran is due mainly to the development and use of ransomware and the repurposing of existing popular malware. This threat could lead to destructive behavior against organizations, businesses and governments.

2: Attackers Targeting Low-Level Vendors in Supply Chains

Cyber adversaries have shifted their attack patterns to exploit third- and fourth-party supply chain partners to gain entry to the systems of their targets. Cyber criminals, spies and hacking groups will continue to target supply chains and their associates for monetary and political gain.

3: Critical Infrastructure Is a High-Value Target

The oil and gas industry remains a popular target for cyber criminals. A significant cyberattack could have a major negative effect on the security and economy of energy producers and their customers.

Oil and gas organizations are advised to hire specialists to protect them. They should support emerging technologies and align information technology and operation technology (IT-OT) convergence.

4: Threats Have Become More Financially Motivated

Popular cybercrime organizations like FIN7 and Cobalt Group have upped their game by targeting large financial institutions and restaurant chains. For example, FIN7 updated its Bateleur malware version 1.1.0 in April 2018. Although the organization has been less active this year than previously, the threat is still there.

5: Mining Malware Creating a Cryptocurrency Surge

The use of cryptocurrency miner malware is expected to grow. There is a shift toward malware mining alternative cryptocurrencies, most notably Monero. Ransomware is most commonly used for extortions and attacks, which are on the rise with most incidents affecting corporations.

The growth of these cyber threats can be scary, but businesses can take defensive measures by:

  • Having incident response plans in place
  • Always operating with the attitude that a business has been breached
  • Training hunting teams to be on the lookout for the next breach

Protect yourself and your company by being proactive. Be aware of trends and hire the appropriate staff to keep your sensitive information safe.

About the Author

Marissa Bergen is a freelance writer from Brooklyn, New York. Passionate about everything from fashion to technology, her writing experience has increased her awareness of digital marketing, cybersecurity and the ever-expanding World Wide Web. She now lives in Los Angeles with her husband and two children. Google her to find out more about her writing and her other life as a bass player in her family band, The CheeseBergens.

Comments

comments