The japanese security specialist Trend Micro wants to sensitize companies to the latest cyber-crime threats. The software manufacturer has published the report »The new standard: Trend Micro security forecasts for 2020«.
The report of Trend Micro describes how the threat landscape will expand in the new decade and what steps companies can derive from it. The report supports companies in making informed security decisions for specific areas of focus that will pose challenges in 2020 and in the years ahead.
It is no longer a current trend for companies to operate networks behind a corporate firewall. There are now a wide variety of applications, services and platforms that should have multi-layered security systems. Blackmail, concealment and phishing are still part of daily business, but cyber criminals are also developing new methods to damage companies. The developments around artificial intelligence (AI) and Internet of Things (IoT) applications in particular open the door to hackers.
Cyber criminals are still not afraid to damage systems for their own benefit. But they are changing their attack vectors and tactics – which means users and businesses, should always be ahead of them.
Attackers punish so-called »patch gaps«. These are security gaps between a bug in an open source component that is being fixed and its patch.
Attacks with mobile malware on online banking and payment systems are expected to be very popular in 2020, as online payments will become more important in the wake of the revised EU Payment Services Directive. Furthermore, according to Trend Micro, the sale of ATM malware will increase.
Deepfakes are AI-based forgeries of images, video and audio material. Their use will change from fake pornographic videos of celebrities to the manipulation of companies and their operations. Especially the members of the management are in the focus of the criminals, as they often participate in telephone conferences or appear in videos.
There will be further attempts to exploit critical and serious vulnerabilities, such as BlueKeep, which is worm-susceptible. Common protocols such as Server Message Block (SMB) and Remote Desktop Protocol (RDP) will be exploited to compromise vulnerable systems. The latter are already a common entry vector for ransomware.
The converging future will lead to old and new forms and techniques of attack, making information and operational technology (IT and OT) resources vulnerable to risk.
Increasingly, cyber criminals use machine learning (ML) and AI to tap into networked devices such as smart TVs and speakers to eavesdrop on personal and business conversations. The acquired material can be used for extortion and corporate espionage.
Upgrades in connection with 5G are similar to updates for smartphones and therefore contain vulnerabilities. Exploiting 5G vulnerabilities via low-cost hardware and software platforms has already proven to be feasible.
Trend Micro is currently expecting attacks on the utilities sector, but food production, transportation, and manufacturing are also expected to be targets of hacker attacks.
Cloud and DevOps migrations present both risks and opportunities for users. They highlight the importance of security across the entire deployment line.
Companies must keep an eye on their security in relation to different components of the container architecture – from container runtimes to orchestrators to development environments.
Outdated libraries, misconfigurations and known and unknown vulnerabilities can be the entry points of attackers on serverless applications.
As cloud computing models for software, infrastructure and Platform-as-a-Service become more widespread, there will be an increase in data breaches in the cloud.
The shortage of safety experts and a lack of safety hygiene are fuelling a failure in protective applications. Risk management and comprehensive threat information are essential to creating a secure environment.
The following aspects help companies defend against hacker attacks:
If you would like more detailed information about the threats and possible countermeasures, you can find the complete report on the Trend Micro homepage.