Threat chain targeting cloud services’


(MENAFN– Al-Bayan)

As the year 2022 draws to a close, Netscope, a secure access services company, revealed its predictions of the top threats targeting cloud services, along with trends in the behavior of threat actors in 2023.

First, there is “ransomware as a service” where attackers focus on both encryption and theft of sensitive data. On the other side, we have the extortion and material exploitation groups, such as the “Lapsos” and “Ransom House” groups.

It hacks companies with the sole aim of obtaining sensitive data without encrypting any files. We expect that the year 2023 will be full of attacks originating from “ransomware as a service” and extortion and physical exploitation groups, with the possibility of intensifying “extortion as a service” attacks.

Software supply security

In the past years, we have seen a significant increase in “software supply chain” attacks, due to the discovery of more vulnerabilities in application code, especially within open source software, and we expect that these attacks will continue to grow in the next year and beyond. This calls for attention to the need for organizations to enhance their security measures and strategies to ensure the integrity of “software supply chains”.

“Industrial Metaverse”

These attitudes will begin to shift in 2023 from being something of an esoteric to a broader recognition that key components such as the digital store floor, supply chain automation, and optimization through AI/ML models are real and relevant. The accompanying emergence of new cyber security challenges and a new attitude towards the industrial field with the opportunity to bring regarding a deep technological transformation as an initiative to change the business.

Phishing

Phishing is a social engineering technique that needs to find a person and convince them that the attacker is legitimate and convince them to give them their password or access to their personal accounts. MFA has long been touted as the “solution” to the phishing problem.

But what it really does is force threat actors to change their behavior and tactics while carrying out this type of attack.

While there are alternative methods and tools that can bypass MFA such as using reverse proxy phishing tools or even techniques to abuse workflows and secure direct access to cloud applications, we expect to see significant developments in phishing attacks that bypass MFA.

MENAFN30122022000110011019ID1105369551


Legal disclaimer: The Middle East and North Africa Financial Services Network provides information “as is” without any representations or warranties…whether express or implied. As this is a disclaimer of our responsibility for the privacy practices or the content of the sites attached within our network, including images and videos. For any inquiries regarding the use and reuse of this information resource please contact the above mentioned article provider.

Leave a Replay