Malware, IoT botnets, and supply chain attacks loom large as future threats

Kaspersky predicts established cyber criminals will act underground, while new actors will be more brash

Graphic representing security in either data protection or cyber security contexts

Cyber criminals will become more targeted in the coming years as threat actors develop the tools to specifically target victims at their core, according to Kaspersky.

The security firm said that supply chain attacks will continue to grow in strength, hoping to take down core network infrastructure. Although it's a relatively new target, Kaspersky thinks the number of attacks will increase fairly rapidly. 

Advertisement - Article continues below

Mobile malware is another type of threat that will grow in intensity. Kaspersky thinks that threat actors not already making use of mobile malware will start adding it to their campaigns and this will lead to continuous threats.

Internet of Things (IoT) botnets will grow stronger and spear phishing attacks will make use of vast swathes of data stolen from the likes of Facebook and Instagram, the firm predicted, suggesting using this data will make criminals' campaigns more effective.

"In 2018, threat actors have led to new paradigms. Public awareness has grown and expert investigations have highlighted big cyber-operations, making the topic front page news across the world," said Vicente Diaz, security researcher at Kaspersky Lab.

"This will lead to a change in the cyber-landscape, as sophisticated threat actors seek silence and obscurity for their attacks in order to increase the likelihood of success. This shift makes the finding of new, large-scale, sophisticated operations very unlikely, and will definitely take the art of detection and attribution to the next level."

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Kaspersky Lab's Targeted Threat Predictions for 2019 explained that there will be two types of cyber criminals coming to the surface in 2019: those seasoned hackers that are developing sophisticated attacks focused on causing damage while staying under the radar and newcomers from South East Asia and the Middle East that will be much more visible, leading more energetic and visible attacks.

Featured Resources

Navigating the new normal: A fast guide to remote working

A smooth transition will support operations for years to come

Download now

Putting a spotlight on cyber security

An examination of the current cyber security landscape

Download now

The economics of infrastructure scalability

Find the most cost-effective and least risky way to scale

Download now

IT operations overload hinders digital transformation

Clearing the path towards a modernised system of agreement

Download now
Advertisement

Recommended

Visit/security/ransomware/356292/university-of-california-gets-fleeced-by-hackers-for-114-million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Visit/security/cyber-security/356289/australia-announces-135b-investment-in-cybersecurity
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
Visit/cloud/cloud-security/356288/csa-and-issa-form-cybersecurity-partnership
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020
Visit/business/policy-legislation/356215/senators-propose-a-bill-aimed-at-ending-warrant-proof-encryption
Policy & legislation

Senators propose a bill aimed at ending warrant-proof encryption

24 Jun 2020

Most Popular

Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/policy-legislation/data-protection/356344/eu-institutions-warned-against-purchasing-any-further
data protection

EU institutions told to avoid Microsoft software after licence spat

3 Jul 2020
Visit/security/vulnerability/356295/microsoft-patches-high-risk-flaws-that-can-be-exploited-with-a
vulnerability

Microsoft releases urgent patch for high-risk Windows 10 flaws

1 Jul 2020