Trend Micro Predicts 2018 Cyberattacks Will Rely on Vulnerabilities
CEO Insights Team
As information technology and operational technology (IT/OT) continue to converge, enterprise applications and platforms will be at risk of manipulation and vulnerabilities, as stated in Trend Micro’s 2018 predictions report. Additionally, Trend Micro predicts an increase in Internet of Things vulnerabilities as more devices are manufactured without security regulations or industry standards. Overall, the increased connectivity and enlarged attack surface present new opportunities for cybercriminals to leverage known issues to penetrate a corporate network.
Ransomware will continue to be a mainstay due to its proven success. There will be an increase in targeted ransomware attacks, in which the criminals go after a single organization to disrupt operations and force a larger ransom payout. Business Email Compromise (BEC) attacks will also continue to gain popularity with attackers, as the return on investment for successful attacks is quite high.
“We foresee that the ransomware business model will still be a cybercrime mainstay in 2018, while other forms of digital extortion will gain more ground.
The ransomware attacks will manifest itself in a more ‘Specialized’ and ‘Targeted manner’, unlike the earlier approach. With respect to India, in 2018 we will experience more number of attacks targeted at the ATMs, especially malware attacks. We also expect to see a rise in security incidents across Public Cloud platforms,” said Nilesh Jain, Country Manager, India & SAARC, Trend Micro.
“We at Trend Micro are constantly scouting out future threats that will have the greatest impact for businesses, and we predict which vulnerabilities will make the biggest waves in the coming year,” said Rik Ferguson, VP of security research for Trend Micro. “Many devastating cyberattacks in 2017 leveraged known vulnerabilities that could have been prevented had they been patched beforehand. This trend will continue next year as corporate attack surfaces expand and expose more security holes. While this remains a challenge for enterprises, executives should prioritize vulnerability management as they make 2018 cybersecurity plans, particularly in the looming shadow of GDPR implementation.”
“The private sector continues to be under siege from a variety of cyber threats,” said Edwin Martinez, chief information security officer for CEC Entertainment. “Institutions must continue to share critical information so we can better prevent and respond to these cyber threats limiting exposure to sensitive data.”
Threat actors will also leverage growing technologies, like blockchain and machine learning, to enhance obfuscation against traditional cybersecurity protections. For this reason, the company recommends a layered, cross-generational defense strategy, which combines the latest security techniques with proven tactics that reinforce nearly 30 years of experience protecting some of the biggest global brands.
“We at Trend Micro are constantly scouting out future threats that will have the greatest impact for businesses, and we predict which vulnerabilities will make the biggest waves in the coming year,” said Rik Ferguson, VP of security research for Trend Micro. “Many devastating cyberattacks in 2017 leveraged known vulnerabilities that could have been prevented had they been patched beforehand. This trend will continue next year as corporate attack surfaces expand and expose more security holes. While this remains a challenge for enterprises, executives should prioritize vulnerability management as they make 2018 cybersecurity plans, particularly in the looming shadow of GDPR implementation.”
Trend Micro Incorporated predicts the trend of known vulnerabilities being used in major attacks will continue in 2018 as corporate attack surfaces expand and expose more security holes
“The private sector continues to be under siege from a variety of cyber threats,” said Edwin Martinez, chief information security officer for CEC Entertainment. “Institutions must continue to share critical information so we can better prevent and respond to these cyber threats limiting exposure to sensitive data.”
Threat actors will also leverage growing technologies, like blockchain and machine learning, to enhance obfuscation against traditional cybersecurity protections. For this reason, the company recommends a layered, cross-generational defense strategy, which combines the latest security techniques with proven tactics that reinforce nearly 30 years of experience protecting some of the biggest global brands.