Table Of Contents
The following text in Arabic: The increasing number of operations impersonating identities and using artificial intelligence techniques, as well as the innovative exploitation of vulnerabilities in computer systems and networks. Mobile devices and wearable devices scene of cyber threats in 2024, security experts in the Global Research and Analysis Team (GReAT) at Kaspersky presented insights and forecasts for 2024, focusing on the continuous evolution in the field of Advanced Persistent Threats (APTs).
Researchers at Kaspersky expect that sources of continuous advanced threats will rely on new ways to exploit vulnerabilities in mobile devices, wearable devices, and smart devices, then use them to form robotic networks and enhance the efficiency of supply chain attacks and use artificial intelligence to boost the effectiveness of targeted fraud operations. These developments are expected to contribute to an increase in the frequency of attacks and politically motivated cybercrimes.
Personification based on Artificial Intelligence:
Advanced artificial intelligence tools are useful in facilitating the preparation of fraudulent phishing messages, and also enable impersonating specific individuals; where attackers may invent innovative ways of automation by collecting data from the internet, and then using it in sophisticated linguistic models to prepare messages closely resembling the style of the targeted person.
Increasing Creative Exploitation of Mobile Device Vulnerabilities.
– The new campaign is called (Operation Triangulation). – The new campaign aims and is named (Operation Triangulation). – The new campaign, named (Operation Triangulation), expresses. Operation Triangulation, and the following phrase describes the targeting of the iOS operating system in Arabic: “The attacks targeted the iOS operating system.” These discoveries, made by Kaspersky experts in the current year, represent a very significant evolution in the field of exploiting vulnerabilities in mobile phones, and can be a source of inspiration for further research on continuous advanced threats across mobile, wearable, and smart devices.
We may witness efforts by threat sources to expand the scope of surveillance, targeting various devices by exploiting their weaknesses and using silent methods to seize vulnerabilities. These attacks include those that do not require clicks or file downloads via chat programs, single-click attacks via text messages or chat applications, and intercepting data flows over the network. Therefore, protecting personal and corporate devices has become essential.
We must also be vigilant against exploiting security vulnerabilities in commonly used software and devices. Sometimes, serious and sensitive security vulnerabilities may not be discovered until after limited research and delayed security measures, leaving the door open for new robotic networks that may execute targeted cyber attacks.
The coming year may see an increase in cyber attack incidents backed by nations, especially amidst increasing geopolitical tensions. These attacks appear to pose several threats, including data theft or encryption, destruction of IT infrastructure, long-range espionage, and cyber sabotage.
There is also a notable trend of activist infiltration, which has been widely used in geopolitical conflicts. The escalation of these conflicts indicates the possibility of increased activist infiltration, whether for sabotage or spreading misleading information, necessitating unnecessary investigations and causing disruptions in the attention of analysts in cybersecurity operations centers and cybersecurity researchers.
Kaspersky’s Forecast for Advanced Security Threats in 2024 Included the Following Points:
Increasing Supply Chain Attacks.
From 2017 to 2020, there has been a rise in breaches targeting data of numerous major corporations. Hackers aim to access sensitive information like customer, financial, and business data of large companies to exploit it in their fraudulent activities. The period from 2022 to 2023 highlights the magnitude of this threat.
The motives behind such attacks vary between financial gain and espionage objectives. The year 2024 might witness new developments in the underground market activities related to the supply chain breaches on the dark web, enabling more efficient and widespread attacks.
Rising Numbers of Rentable Hacking Groups.
The quantity of groups offering paid hacking services has notably increased. These groups provide data theft services to various clients, whether private investigators or commercial competitors of the victims. This trend is expected to grow in the upcoming year.
Noticeable Surge in Kernel Rootkits Targeted Attacks.
The kernel rootkits face ongoing and advanced challenges from threats and online crime groups, despite modern security measures like kernel driver signing, kernel protection, and its associated protected software integration.
The Windows kernel experiences an increase in attacks due to the Windows Hardware Compatibility Program (WHCP) violation. Furthermore, the black market for Extensible Validation (EV) certificates and stolen code-signing certificates is growing. Threat actors benefit from BYOVD attacks in executing their maneuvers.
Utilization of Managed File Transfer (MFT) Systems in Advanced Attacks.
Managed File Transfer systems face escalating electronic threats. These threats were realized in 2023 through penetrations in MOVEit and GoAnywhere. This trend is expected to escalate in 2024, as online criminals seek financial gains and disrupt their operations.
These complex systems integrated into wide networks suffer from security vulnerabilities. Hence, companies need to take stringent security measures such as data loss prevention or encryption, and enhance cybersecurity awareness to safeguard Managed File Transfer systems from advanced threats.
Kaspersky’s Director of Global Research and Analysis Team, Igor Kuznetsov, states that the abundance of artificial intelligence tools in 2023 didn’t deter the interest of advanced malicious actors in launching widespread and highly evolved attack campaigns. However, upcoming trends are expected to encompass not only the impacts of artificial intelligence but also introduce new methods for supply chain attacks, the rise of rentable hacking services, consumer device exploitation, and more. Our goal is to provide advanced security information to cybersecurity professionals so they can effectively combat cyber attacks and evade the latest threat developments.