Cybercriminals Next Targets: Short Term Dangers (part 1 of 2)

Image for post
Image for post

Where Cybercriminals Will Go

Knowing what cybercriminals are targeting today is easy. Their attacks are loud, impactful, and have the elegance of a herd of bulls crashing through a glassware shop. The tougher challenge is figuring out where they will take aim tomorrow. Knowing where cyber threats will attack in the future, gives the necessary insights to be one step ahead of their mayhem.

In the Short Term

With the holiday approaching, the next focus will be the lucrative ecommerce online shopping, email ransomware, phishing for credentials, and infection by holiday-lurking malware. It is also a time for dark-markets to thrive, selling unmentionables to those looking for illegal items for the holiday celebrations.

Image for post
Image for post

Businesses Beware

Businesses must worry about the increased amount of ecommerce fraud, ransomware that extorts money to unlock important files, and the ever present risk of data breaches. Healthcare, retail, and financial sectors will be targeted the most, but all businesses are in jeopardy. Social media will be targeted as a springboard to reach more potential victims and influence them to download or visit sites containing malware. For some larger companies, who rely on heavy web traffic, there will be Distributed Denial of Service (DDoS) extortion attempts. Pay or be unavailable to your customers, will be the threat. As always, cash is king and credit is queen. More ATM attacks are in our future. Europe will be the hotbed, given its machine density and proximity to current thieving bands who are becoming more proficient at these attacks. The U.S. will suffer from more credit card and debit card fraud, some in-store, but more shifting towards online sites as the chip-on-card initiative forces thieves to adapt.

Exploiting IoT Devices

Hacking home Internet-of-Things (IoT) devices, the ones always connected to the Internet, is easy for botnet herders looking to amass an army to conduct DDoS attacks. But there is little money in attacking. Some will adjust to provide ‘protection’ extortion schemes. Others will move into using those simple devices to create social media accounts which can ‘follow’ or ‘like’ in mass for a fee. Early signs are already present as buying followers/likes is lucrative business in the ego-markets of social media.

Written by

Cybersecurity Strategist and CISO specializing in the evolution of threats, opportunities, and risks in pursuit of optimal security

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store