Deepfakes, Cryptocurrency, and Mobile Wallets: Cybercriminals Find New Opportunities in 2022

0

Check Point Software Technologies, a provider of cybersecurity solutions releases its cyber-security predictions for 2022 detailing the key security challenges that organizations will face over the next year. The report states, “while cybercriminals continue to leverage the impact of the COVID-19 pandemic and they will also find new opportunities for attack with deepfakes, cryptocurrency, mobile wallets.”

Following are some of the key highlights included in the cybersecurity prediction report:

  • Fake news and misinformation campaigns about the COVID-19 return. Cyber groups will continue to leverage fake news campaigns to execute various phishing attacks and scams
  • Supply chain attacks will become more common and governments will begin to establish regulations to address these attacks and protect networks
  • Data breaches will happen more frequently at a larger scale and cost organizations and governments more to recover
  • Cryptocurrency gains popularity with attackers. When money becomes purely software, the cyber security needed to protect against hackers stealing and manipulating bitcoins and altcoins is sure to change in unexpected ways
  • As mobile wallets and mobile payment platforms are used more frequently and that will continue
  • With microservices architecture being embraced by Cloud Service Providers (CSPs), attackers are using vulnerabilities found in them, to launch large-scale attacks on CSPs
  • Threat actors will use deepfake social engineering attacks to gain permissions and access sensitive data
  • Threat actors will continue to target companies that can afford to pay the ransom, and ransomware attacks will become more sophisticated in 2022

Maya Horowitz, VP Research at Check Point says, “The sophistication and scale of cyber-attacks will continue to break records and we can expect a huge increase in the number of ransomware and mobile attacks. Looking ahead, organizations should remain aware of the risks and ensure that they have the appropriate solutions in place to prevent, without disrupting the normal business flow, the majority of attacks including the most advanced ones.”


Leave A Reply