The globe is preparing for a year of recovery in 2022, two years into the pandemic. Companies and individuals of all ages are preparing to revert to routine, with back-to-office, back-to-school, and back-to-travel rules presently in place.
This is according to Kaspersky, a cyber security organisation, which has announced the four top trends to watch for this year.
As seen last year, cybercriminals can use sophisticated methods to target a wide range of industries, including airlines, hospitals, government websites, banks, telecom corporations, universities, e-commerce, and even social media behemoths.
Reduced Number of Targeted Ransomware Attacks
The epidemic period corresponded with an increase in targeted ransomware assaults around the world, focusing on the most valued targets as well as interruption-sensitive enterprises.
Several SEA companies have been targeted in such attacks. However, Kaspersky researchers anticipate that with strong international collaboration and several task forces to track down ransomware gangs, the incidence of such assaults would drop in 2022.
"The US government made the initial call, involving the FBI and even offensive capabilities of the US Cyber Command. We believe that the assaults will reemerge later, with a focus on developing countries with limited cyber-investigative skills or countries that are not US allies "says Vitaly Kamluk, Kaspersky's director of global research and analysis team (GReAT) for Asia Pacific.
"Given the geopolitical posture of some Southeast Asian countries, it's likely that there will be fewer or even no such assaults in certain Southeast Asian countries in 2022," he says.
"Yet, widely available hosting services provided by nations such as Singapore and Malaysia, as well as data centre services and infrastructure, can still be used by targeted ransomware gangs."
Social Engineering and Advanced Scam
The enhanced sense of safety that inhabitants of developed countries have is one of their distinguishing characteristics. Increased investment in technology, especially cybersecurity, creates a long-term sense of security online.
As a result, the general public is less vulnerable to classic cyberthreats; it's simply more difficult to identify unsecured equipment or infect consumers. This is why attackers concentrate on non-technological attacks, exploiting human vulnerabilities, and involving various types of scam via SMS, automated phone calls, popular messengers, social networks, and so on.
According to the Singapore Police Force, the number of fraud reports is increasing year after year: +16 percent (2021), +108.8 percent (2020), +27.1 percent (2019), and +19.5 percent (2018).
It has ramifications for other countries in the region. In Thailand, approximately 40,000 people were defrauded because their bank accounts and credit cards showed unusual activity. Last year, scammers exploited bogus bank websites to steal Malaysians' banking information. Impersonation of leading e-commerce platforms in Vietnam was also utilised to dupe customers into sending money.
Automation of some services, such as automatic dialling and automatic initial message delivery with expected follow-up action, is fueling this trend, which stimulates manual human-driven scam operations.
"We expect this trend will continue in the future, including the creation of victim-tailored papers, graphics, deep fake movies, and voice synthesis," Kamluk says.
"It's possible that computer-assisted criminal schemes (scams) will give way to pure cybercrime based on complete digital asset compromise (user accounts, smartphones, personal computers). The first attempts at such technologically advanced schemes are likely to occur in 2022 "..
Unidentified Attackers Commit More Data Breach
With fewer targeted ransomware assaults openly exposing stolen data and accepting responsibility for a breach, we will see an increase in stolen data being sold on underground markets.
"In recent years, we've noticed that in many incidents of data breaches, the victims were unable to identify the attackers or determine how they became infiltrated," Kamluk explains.
"Although identifying the attacker and the source of the breach has always been difficult," he continues, "the percentage of such incidents has climbed dramatically in the last two years, reaching over 75 percent according to our data."
According to Kaspersky experts, it is not only a symptom of the major issues that cyber defenders face, but also a motivator and a signal for other passive cybercriminals to enter the sector of data theft and unlawful trading.
"As a result," Kamluk predicts, "we will see more stolen databases, internal communications, and personal details taken from various companies and traded on the black market."
Attacks on the Cryptocurrency and NFT Industries
Kaspersky researchers determined that we can expect an even larger wave of attacks on bitcoin businesses by analysing cutting-edge attackers with enormous human resources, such as the Lazarus group and its sub-group, BlueNoroff.
Cybercriminals will also attack the developing NFT (non-fungible token) market. This is because SEA countries dominate in terms of NFT ownership, with the Philippines topping the list with 32% admitting they own such digital assets.
Thailand (26.2 percent) came in second among the 20 countries polled, closely followed by Malaysia (23.9 percent). Vietnam came in fifth (17.4 percent) and Singapore came in fourteenth (6.8 percent).
"From direct attacks against cryptocurrency startup and exchange personnel using sophisticated social engineering, software exploits, and even phoney suppliers to widespread attacks via supply-chain software or its components" explains Kamluk.
"Furthermore, we could expect to witness more cases of NFT property theft in the coming years. Because this is a completely new area, there will be a shortage of trained police investigators, resulting in an initial rise of such attacks "He continues.
Furthermore, specialists from a worldwide cybersecurity firm believe that these attacks will have an impact not only on the global cryptocurrency markets, but also on the share prices of specific firms, which will be monetised by the attackers through stock market illegal insider trading.