Cyberattacks

Kaspersky releases predictions for Advanced Threats Landscape in 2024

Kaspersky Global Research and Analysis Team (GReAT) experts have released their predictions for Advanced Persistent Threats (APTs) in 2024 in the kickoff to the annual Kaspersky Security Bulletin series.

Kaspersky researchers predict APT actors will introduce new exploits on mobile, wearables, and smart devices and use them to form botnets, as well as refine supply chain attack methods, and utilize AI for more effective spear phishing. These advancements are anticipated to intensify politically motivated attacks and cybercrime.

AI-powered impersonation, the rise of creative exploits for mobile, and new botnets

Emerging AI tools will streamline spear phishing message production, even enabling the mimicry of specific individuals. Attackers may devise creative automation methods by gathering online data and feeding it to LLMs to craft letters in the style of a person connected to the victim.

“Operation Triangulation” made 2023 a groundbreaking year for mobile exploits, potentially inspiring more research into APTs attacking mobile, wearables, and smart devices. We will likely witness threat actors broadening their surveillance efforts, targeting various consumer devices through vulnerabilities and “silent” exploit delivery methods, including zero-click attacks through messengers, one-click attacks via SMS or messaging apps, and network traffic interception. Protection of personal and corporate devices has become increasingly vital.

The exploitation of vulnerabilities in commonly used software and appliances is yet another point where organizations should be vigilant. The discovery of high and critical severity vulnerabilities sometimes receives limited research and delayed fixes, potentially paving the way for new, large-scale, and stealthy botnets capable of targeted attacks.

Growth in cyberattacks by state-sponsored actors and hacktivism as a new normal

State-sponsored cyberattack numbers also have the potential to surge in the year ahead, amid increasing geopolitical tensions. These attacks will likely threaten data theft or encryption, IT infrastructure destruction, long-term espionage, and cyber sabotage.

Another notable trend is hacktivism, which has become more common as part of geopolitical conflicts. Geopolitical tensions indicate a likely increase in hacktivist activity, both destructive and aimed at spreading false information, leading to unnecessary investigations and subsequent alert fatigue of SOC analysts and cybersecurity researchers.

Other advanced threat predictions for 2024 include:

–       Supply chain attacks as a service: operators bulk-buying access

Supply chain attacks targeting smaller firms to breach major ones: the Okta breaches in 2022-2023 highlight the threat’s scale. Motives of such attacks may range from financial gain to espionage. 2024 might witness new developments in dark web access market activities related to supply chains, enabling more efficient and large-scale attacks.

–       Emergence of more groups offering hack-for-hire services

Hack-for-hire groups are on the rise, providing data theft services to clients ranging from private investigators to business rivals. This trend is expected to grow in the coming year.

–       Kernel rootkits are hot again

Despite modern security measures like Kernel Mode Code Signing, PatchGuard, and HVCI (Hypervisor-Protected Code Integrity), kernel-level code execution barriers are being bypassed by APTs and cybercrime groups. Windows kernel attacks are on the rise, enabled by WHCP abuses, and the underground market for EV certificates and stolen code signing certificates is growing. Threat actors are increasingly leveraging BYOVD (Bring Your Own Vulnerable Driver) in their tactics.

–       Managed File Transfer (MFT) systems used for advanced attacks

Managed File Transfer (MFT) systems face escalating cyber threats, exemplified by 2023 breaches of MOVEit and GoAnywhere. This trend is poised to escalate, with cyber adversaries eyeing financial gains and operational disruptions. The intricate MFT architecture, integrated into broader networks, harbors security weaknesses. Organizations should implement robust cybersecurity measures, including Data Loss Prevention and encryption, and foster cybersecurity awareness to fortify MFT systems against evolving threats.

“In 2023, the notable surge in the availability of AI tools didn’t elude the attention of advanced malicious actors engaged in extensive and highly sophisticated campaigns,” Igor Kuznetsov, director, Global Research and Analysis Team (GReAT) at Kaspersky. “However, we anticipate that upcoming trends go beyond AI implications, including new methods for conducting supply chain attacks, the emergence of hack-for-hire services, novel exploits for consumer devices, and more. Our goal is to provide defenders with advanced threat intelligence that stays ahead of the latest threat developments, enhancing their capacity to fend off cyberattacks more effectively.”

The APT predictions have been developed thanks to Kaspersky’s threat intelligence services used around the world. Read the full report on Securelist.

Visit AITechPark for cutting-edge Tech Trends around AI, ML, Cybersecurity, along with AITech News, and timely updates from industry professionals!

Related posts

CyCognito announces Major Platform Expansion

PR Newswire

Persistent Launches Cyber Recovery Solution with Google Cloud

PR Newswire

Illumio & Armis Announce Joint Solution to Protect IT & OT Networks

GlobeNewswire