{"id":108456,"date":"2023-01-18T08:00:45","date_gmt":"2023-01-18T08:00:45","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/securelist\/?p=108456"},"modified":"2023-02-17T13:40:53","modified_gmt":"2023-02-17T13:40:53","slug":"corporate-threat-predictions-2023","status":"publish","type":"post","link":"https:\/\/securelist.com\/corporate-threat-predictions-2023\/108456\/","title":{"rendered":"What threatens corporations in 2023: media blackmail, fake leaks and cloud attacks"},"content":{"rendered":"

Kaspersky detects an average of 400,000 malicious files every day. These add up to 144 million annually. The threat landscape is constantly updated through new malware and spyware, advanced phishing methods, and new social engineering techniques. The media routinely report incidents and leaks of data that end up publicly accessible on the dark web. Hacker attacks constantly hurt individuals, corporations, and entire countries, and not just financially. In certain cases, cyberattacks may threaten human lives, for example if they target critical infrastructure.<\/p>\n

Last year, the cybersecurity of corporations and government agencies was more significant than ever before, and will become even more so in 2023. As part of the Kaspersky Security Bulletin, the DFI (Digital Footprint Intelligence) and DFIR (Digital Forensics and Incident Response) teams have come up with an overview of threats that will be relevant to the segment in question.<\/p>\n

More personal data leaks; corporate email at risk<\/h2>\n

The trend for personal data leaks grew rapidly in 2022 and will continue into 2023. Last year saw, a number of high-profile cases, such as Medibank<\/a>, Uber<\/a>, and WhatsApp<\/a>. The leaks affected various organizations and amounts of data. For example, last September, an attacker offered for sale a database containing 105 million records with information about Indonesian citizens. The compromised data included full name, place and date of birth, gender, as well as national identification number. The perpetrator valued the data, seemingly taken from the General Elections Commission of Indonesia, at US$5,000 and put it up for sale on the dark web.<\/p>\n

\"A<\/a><\/p>\n

A post on the dark web that offers Indonesian data for sale and was found with the help of Digital Footprint Intelligence<\/a><\/em><\/strong><\/p>\n

We often see people use work email addresses to register with third-party sites and services, which can be hacked and exposed to a data leak, putting the security of the company that owns the email at risk. The attack surface in its infrastructure increases with the number of potentially vulnerable objects. When sensitive data becomes publicly accessible, it may invoke the interest of cybercriminals and trigger discussions of potential attacks on the organization on dark web sites (forums, instant messaging channels, onion resources, etc.). In addition, the likelihood of the data being used for phishing and social engineering increases.\u00a0<\/strong><\/p>\n

Media blackmail: businesses to learn they were hacked from hackers’ public posts with a countdown to publication<\/h2>\n

Ransomware operators set up blogs where they post about new successful hacks of businesses and publish the data they stole. The number of posts in those blogs grew in 2022, both in open sources and on the dark web. Whereas we were seeing 200 to 300 posts in each of the first ten months of 2021, the number peaked at more than 500 monthly at the end of 2021 and the first half of 2022[1]<\/sup><\/a>.<\/p>\n

<\/div>\n

Changes in the number of ransomware blog posts in 2021\u20132022, worldwide (download<\/a>)<\/p>\n

Extortionists used to try to settle matters with victim businesses in private, without attracting the attention of the broader public. Cybercriminals used to strive to keep a low profile until they got what they wanted, while the hack victims preferred to avoid reputational damage or any other consequences of the attack. These days, hackers post about the security breach in their blogs instead of contacting the victim, set a countdown timer to the publication of the leaked data, and wait for the victim’s reaction. This pattern helps cybercriminals win regardless of whether the victim pays up or not. Data is often auctioned, with the closing bid sometimes exceeding the demanded ransom.<\/p>\n

\"Example:<\/a><\/p>\n

Example: a post about the hack of the Australian company Medibank, found with the help of Digital Footprint Intelligence<\/a><\/em><\/strong><\/p>\n

We expect that in 2023, cybercriminals will try to reach out to victim businesses ever less often, while the number of blog posts and mentions of victims’ names in the news will increase.<\/p>\n

\"Example<\/a><\/p>\n

Example of a countdown to the publication of leaked data as seen in the LockBit ransomware blog<\/em><\/strong><\/p>\n

Enjoying the fun part: cybercriminals to post fake hack reports more often<\/h2>\n

These days, hardly a day goes by without a new leak being reported. The number of fake reports grows along with that. We believe that in 2023, cybercriminals will more frequently allege, that they have hacked a company, as an ego trip and a rep boost. A leak report that appears in public sources can be used as a media manipulation tool and hurt the target business regardless of whether the hack happened or not. It is key to identify these messages in a timely manner and initiate a response process similar to that for information security incidents. This includes monitoring of dark and deep web sites for leak or compromise reports.<\/p>\n