![]() The botnet can act as a network of proxies, but also as intermediate command and control servers. The second reason is to mask the attackers’ infrastructure. In that case, defenders might find it more challenging to attribute the attack to a threat actor and might believe they face a generic widespread attack. Attacks leveraging botnets might “obscure the targeted nature of the attack behind seemingly widespread assaults,” according to the researchers. The first reason is to bring more confusion for the defense. New botnets will emergeīotnets are typically more prevalent in cybercrime activities compared to APT, yet Kaspersky expects the latter to start using them more. This is also a concern because more people work from home nowadays, and their companies could be targeted via weak points in the home worker devices. This is particularly interesting for attackers because those devices are often uncontrolled, not updated or patched and subject to misconfigurations. Its features do not confine to the expected ones, such as how long to record for it includes sophisticated functions like stopping recording when the device screen activates or stopping recording when system logs are captured.”Īccording to Kaspersky, APT attackers might expand their surveillance efforts to include more smart home technology devices, such as smart home cameras and connected car systems. A recent example is the microphone-recording module in Operation Triangulation. Igor Kuznetsov, director, Global Research and Analysis Team at Kaspersky, told TechRepublic in a written interview: “Malware can indeed be used for eavesdropping. Must-read security coverageĪtlas VPN Review (2023): Features, Pricing, AlternativesĪustralia, New Zealand Enterprises Spend Big on Security - But Will It Be Enough?Ī remarkable characteristic of those exploits is that they did not just target Apple smartphones, but also tablets, laptops, wearable devices, Apple TV and Apple Watch devices and might be used for eavesdropping. Operation Triangulation, as exposed in the past year, revealed a very sophisticated cyberespionage campaign mostly operated by targeting iOS devices and leveraging five vulnerabilities - including four zero-day vulnerabilities. More exploitation of mobile devices and smart home tech More groups in the hack-for-hire business.More kernel-level code will be deployed.More exploitation of mobile devices and smart home tech.New botnets and rootkits will also likely appear, and hacker-for-hire services might increase, as will supply chain attacks, which might be provided as a service on cybercriminals’ underground forums. Existing APT techniques will keep being used, and new ones will likely emerge, such as the increase in AI usage, hacktivism and targeting of smart home tech. ![]() ![]() Kaspersky’s new report provides the company’s view on the advanced persistent threats landscape for 2024. ![]() New botnets, more AI in spearphishing and increases in hack-for-hire business are some of Kaspersky's security predictions. This list is for informational purposes only and shall not be interpreted or construed in any way to create any warranties of any kind, either expressed or implied.Kaspersky’s Advanced Persistent Threats Predictions for 2024 Kaspersky is in no way sponsored, endorsed by, or otherwise affiliated with any of the owners of these applications. Please also check GDPR compliance and privacy policies of the applications before using them. The interfaces of applications may also be unavailable in your preferred language. Some of these applications may not work in your region due to local legislation or due to vendor restrictions. We have tested only the listed applications for compatibility with My Kaspersky, and these applications were free to use at that time. This will allow you to sign in to your account and use the Anti-Theft features if your mobile phone is ever lost or stolen. Set up two-step verification with an authenticator app on a device other than your mobile phone. One-time security codes are generated locally on your device with no need of the Internet or mobile network. You can use special authenticator apps for two-step verification when you sign in. About two-step verification via an authenticator app
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |