A look into the future can be worthwhile. Especially with regards to cybercrime, it is advantageous if companies already know at least approximately what they can expect in the year to come. Because so far each year was characterized individually by different scenarios of threats.
For example, the year 2016 was still considered the golden age of phishing, as can be seen from an article by heise online. 2017 brought us a change in trend and was particularly strongly influenced by ransomware attacks such as WannaCry, Bad Rabbit and NotPetya. So what can or should we expect for 2018? Let’s take a glimpse.
Cryptocurrencies in the focus
At least one thing can already be said: In 2018, new and more complex methods of attack will set new standards again. The cryptojacking attacks, which are already growing rapidly in numbers, could for example be influential for the coming year. Cryptojacking is an attack method in which cybercriminals hijack foreign computers in order to dig for cryptocurrencies, mostly bitcoins. It can be enough to visit one of more than 50,000 websites that contain the malicious code. They contain a tiny javascript piece of the cryptomining service “Coinhive”, which automatically causes the computers to “dig” cryptocurrencies for the hackers. The performance of the processor of affected devices is demanded in such a way that they can hardly be used for other activities.Given the persistently high price of cryptocurrencies, it is also likely that there will be new types of ransomware in 2018 that specialize in blackmailing Bitcoin and others. New targets could be smart devices such as televisions or mobile phones with Android system software, as these are particularly easy to hijack for hackers.
Macros and exploits still cause trouble
The attacks with harmful scripts that cybercriminals particularly like to hide in Office files, will probably continue to accompany us in 2018. They tend to communicate consistently with compromised websites from different devices. For example, the attackers use PowerShell to perform command-and-control activities to achieve the desired effect that way. In particular, our security lab gives warning of attacks that use exploits. Unlike macros, these require less or even no user interaction to infect the system. This method often exploits vulnerabilities in popular software shortly after they are released. If the victims’ systems have not been updated yet, then the hackers will have an easy job.The “Internet of Things” is much loved – also among cybercriminals
The “Internet of Things” has by now been on everyone’s lips. The interconnection of objects is not only popular among technophiliacs. Increasingly, cybercriminals also take their pleasure in it. This is simply due to the fact that many of the wireless connected devices are not quite up to date in terms of safety.Conclusion: Taking the right precautions saves a lot of trouble
As threatening as the new developments may seem: Companies that already use a sophisticated and proven IT security concept have only little to fear. By contrast, the mere use of antivirus software does not ensure a safe IT infrastructure. On the contrary, the use of traditional anti-virus programs can even have a negative impact on a company’s IT security, as we have previously reported. In fact, considerably more things matter: Efficient IT security concepts are based in particular on prevention and the use of effective IT security solutions. Cloud-based IT security solutions, such as the services provided by Hornetsecurity, play an increasing role in this. They safeguard you against even the most sophisticated cyberattacks, so that not even ransomware and others can throw your business off track.Additional information:
- Hornetsecurity ATP
- Hornetsecurity Spam Filter Service
- Do you already know the Hornetsecurity Knowledge Base? Click here for more information.