SAN JOSE, Calif. – Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), today released its annual threat predictions report for 2023. Forecasts from the Trellix Advanced Research Center anticipate spikes in geopolitically motivated attacks across Asia and Europe, hacktivism fueled by tensions from opposing political parties, and vulnerabilities in core software supply chains.
“Analyzing current trends is necessary but being predictive in cybersecurity is vital. While organizations focus on near-term threats, we advise all to look beyond the horizon to ensure a proactive posture,” said John Fokker, Head of Threat Intelligence, Trellix. “Global political events and the adoption of new technology will breed novel threats from more innovative threat actors.”
The Trellix Advanced Research Center brings together hundreds of the world’s most skilled security analysts and researchers to serve the global threat intelligence community and organizations with the latest threat indicators and insights collected from Trellix’s extensive sensor network.
Trellix Advanced Research Center forecasts the following threats in 2023:
Geopolitics and grey-zone conflict. Geopolitical factors will continue to be a high motivation for misinformation campaigns and cyberattacks timed with kinetic military activity.
Hacktivism takes center stage. As groups of loosely organized individuals fueled by propaganda align for a common cause, they will ramp up their use of cyber tools to voice their anger and cause disruption across the globe.
Skeletons in the software closet will multiply. Both threat actors and security researchers will heighten their study of underlying software frameworks and libraries resulting in an increase in breaches related to software supply chain issues.
Increasing activity by teen cybercriminals. Teens and young adults will engage at increasing levels in cybercrime – everything from large-scale attacks on enterprises and governments to low-level crimes that target family, friends, peers, and strangers.
Declining accuracy of code-based attribution. The outsourcing of malware creation and operation, diversification of malware development, and use of leaked source code will make attribution of cyberthreats to specific threat actors increasingly challenging.
Imminent global cyberthreat to critical infrastructure as cyberwarfare evolves. A significant rise in advanced cyberactors causing disruptions to critical infrastructure in vulnerable targets will be observed.
With more collaboration comes more phishing. Weaponized phishing attacks will increase across commonly used business communication services and apps, like Microsoft Teams, Slack, and others.
“Alexa, start mining bitcoins.” The advanced capabilities of consumer and enterprise IoT devices will be leveraged by hackers to mine cryptocurrencies.
Space hacking: only go up from here. The compromise of satellites and other space assets will increase and become more public in 2023.
Here’s my number, so call me, maybe. There will be a huge jump in reverse-vishing – or voice phishing – attacks, with less tech-aware users being the primary target.
Attacks against Windows domain will scale. More domain privilege escalation vulnerabilities will be discovered as well as more real-world attacks against Microsoft Windows with the explicit goal of complete network takeover.
Report: Trellix Advanced Research Center 2023 Threat Predictions
Webinar: Top 3 Insights from the Trellix Advanced Research Center 2023 Threat Predictions
Trellix Advanced Research Center
About the Trellix Advanced Research Center
The Trellix Advanced Research Center brings together an elite team of security professionals and researchers to produce insightful and actionable real-time intelligence to propel customer outcomes and the industry at large. Driven by the industry’s most comprehensive charter, our skilled researchers detect trends ahead of the market to empower our customers and partners to solve for emerging threats. More at https://www.trellix.com/en-us/advanced-research-center.html.