<img alt="" src="https://secure.intuition-agile-7.com/792057.png" style="display:none;">
Posted by Onyx IT ● Dec 6, 2022 10:57:05 AM

The new year is coming, and it is a time of renewal as we prepare for the possibilities of 2023. It is also a time to plan your resilience in the face of pervasive cyber-attacks.

Sixty-eight per cent of business leaders surveyed believe that cyber security risks are increasing. They have a good reason for this. Attacks are becoming more sophisticated. They are also often perpetrated by large criminal organizations. These criminal groups treat these attacks like a business

In 2021, the average number of cyber attacks worldwide will increase by 15.1%.

To protect your business in the coming year, it is important to monitor attack trends. What new methods are hackers using? What types of attacks are increasing in scope? Knowing these things is important. So you can better update your IT security to reduce the risk of a data breach or malware infection.

We have pulled out the security crystal ball for the year ahead. And we have researched what cybersecurity experts expect to see. Here are the attack trends you should watch out for.


Attacks on 5G Devices

The world has been talking about 5G for a few years now. It's finally starting to deliver on the promise of lightning-fast internet. As providers build out the infrastructure, you can expect this to be an area of many attacks.

Hackers are targeting the 5G hardware used for routers, mobile devices and PCs. Any new technology like this is bound to have some code vulnerabilities. And that's what hackers want to exploit.

You can prepare yourself by being aware of the firmware security of the devices you buy. This is especially true for devices that are ready for 5G. Some manufacturers build better firmware security into their designs than others. Be sure to ask about this when buying new devices.


One-time Password (OTP) Circumvention

This alarming new trend aims to bypass one of the best forms of account security. Multi-factor authentication (MFA) is known to be very effective at preventing fraudulent login attempts. It can prevent an account from being taken over even if the criminal has the user's password.

There are several ways hackers try to bypass MFA. These include:

  • Reusing a token: accessing a current user's OTP and attempting to reuse it.
  • Sharing unused tokens: The hacker uses his own account to obtain an OTP. Then he tries to use this OTP for another account.
  • Leaked token: Using an OTP token that has been leaked via a web application.
  • Password reset function: A hacker uses phishing to get the user to reset a password. They then get him to submit his OTP via text or email.

Attacks Around World Events

During the pandemic, the volume of cyber attacks increased by about 600%. Large criminal hacker groups have realised that world events and disasters are lucrative.

They launch phishing campaigns for world events. The attacks range from the latest hurricane or typhoon to the war in Ukraine. Unsuspecting people often fall for these scams. This is because they are often distracted by the crisis.

You should be especially alert during such events. They often use social engineering tactics, such as sad photos, to play on emotions


Smishing & Attacks on Mobile Device 

Nowadays, we carry our mobile devices with us almost everywhere. This direct connection to a potential victim has not escaped the cybercriminals. Look out for more attacks on mobile devices, including SMS-based phishing ("smishing").

Many people do not expect to receive fake messages to their personal numbers. But mobile phone numbers are not as private as they once were. Hackers can buy lists of these numbers online. Then they create convincing fake texts that look like shipping notices or receipts. One wrong click is all it takes to crack an account or breach data.

Mobile malware is also on the rise. In the first few months of 2022, the number of malicious programmes targeting mobile devices increased by 500%. It is important that you have good protection against mobile malware. As well as other protection measures on your devices, such as a DNS philtre.


Advanced Phishing With AI & Machine Learning

These days, phishing emails are not as easy to spot. In the past, they almost always had spelling errors or grainy images. Some still do, but most no longer do.

Criminal groups are improving today's phishing using AI and machine learning. Not only do they look exactly like a real brand's emails, but they are personalized. Hackers use these tactics to catch more victims. They also allow hackers to send more targeted phishing messages in less time than in years past.


Schedule a Cybersecurity Check-Up Today

Is your business prepared for the cyber threats of 2023? Do not wait to find out the hard way! Call Onyx IT today to schedule a cybersecurity check-up to stay one step ahead of the digital criminals.

Let's Talk

Article used with permission from The Technology Press.