{"id":108456,"date":"2023-01-18T08:00:45","date_gmt":"2023-01-18T08:00:45","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/securelist\/?p=108456"},"modified":"2023-02-17T13:40:53","modified_gmt":"2023-02-17T13:40:53","slug":"corporate-threat-predictions-2023","status":"publish","type":"post","link":"https:\/\/securelist.com\/corporate-threat-predictions-2023\/108456\/","title":{"rendered":"What threatens corporations in 2023: media blackmail, fake leaks and cloud attacks"},"content":{"rendered":"
Kaspersky detects an average of 400,000 malicious files every day. These add up to 144 million annually. The threat landscape is constantly updated through new malware and spyware, advanced phishing methods, and new social engineering techniques. The media routinely report incidents and leaks of data that end up publicly accessible on the dark web. Hacker attacks constantly hurt individuals, corporations, and entire countries, and not just financially. In certain cases, cyberattacks may threaten human lives, for example if they target critical infrastructure.<\/p>\n
Last year, the cybersecurity of corporations and government agencies was more significant than ever before, and will become even more so in 2023. As part of the Kaspersky Security Bulletin, the DFI (Digital Footprint Intelligence) and DFIR (Digital Forensics and Incident Response) teams have come up with an overview of threats that will be relevant to the segment in question.<\/p>\n
The trend for personal data leaks grew rapidly in 2022 and will continue into 2023. Last year saw, a number of high-profile cases, such as Medibank<\/a>, Uber<\/a>, and WhatsApp<\/a>. The leaks affected various organizations and amounts of data. For example, last September, an attacker offered for sale a database containing 105 million records with information about Indonesian citizens. The compromised data included full name, place and date of birth, gender, as well as national identification number. The perpetrator valued the data, seemingly taken from the General Elections Commission of Indonesia, at US$5,000 and put it up for sale on the dark web.<\/p>\n <\/a><\/p>\n A post on the dark web that offers Indonesian data for sale and was found with the help of Digital Footprint Intelligence<\/a><\/em><\/strong><\/p>\n We often see people use work email addresses to register with third-party sites and services, which can be hacked and exposed to a data leak, putting the security of the company that owns the email at risk. The attack surface in its infrastructure increases with the number of potentially vulnerable objects. When sensitive data becomes publicly accessible, it may invoke the interest of cybercriminals and trigger discussions of potential attacks on the organization on dark web sites (forums, instant messaging channels, onion resources, etc.). In addition, the likelihood of the data being used for phishing and social engineering increases.\u00a0<\/strong><\/p>\n Ransomware operators set up blogs where they post about new successful hacks of businesses and publish the data they stole. The number of posts in those blogs grew in 2022, both in open sources and on the dark web. Whereas we were seeing 200 to 300 posts in each of the first ten months of 2021, the number peaked at more than 500 monthly at the end of 2021 and the first half of 2022[1]<\/sup><\/a>.<\/p>\nMedia blackmail: businesses to learn they were hacked from hackers’ public posts with a countdown to publication<\/h2>\n