Report says cybercrime rings a signature trend in supply chain landscape
Share
Share
The results of OpenText’s 2024 Threat Hunter Perspective found that the collaboration and coordination taking place between nation-states and cybercrime rings to target global supply chains and further geopolitical motives has become a signature trend in the threat landscape.
For chief information security officers (CISOs), the question isn’t whether attacks will happen, but what form they’ll take and how enterprises can prepare. According to Cybersecurity Ventures, the cost of cybercrime is projected to reach $9.5 trillion in 2024 and is expected to increase to $10.5 trillion by 2025. To understand the current threat landscape, OpenText said CISOs need to know not just the types of threats but also who is behind them, when they might occur, why they’re happening and how they’re executed. Connecting these dots helps threat hunters gain a clearer picture of the risks organizations face, enabling more effective preparation and response.
“Our threat intelligence and experienced threat hunting team have found that nation-states are not slowing down and, as notable events like the U.S. presidential election get closer, every organization in the global supply chain needs to be on high alert for advanced and multiple cyberattacks,” said Muhi Majzoub, executive vice-president and chief product officer, OpenText. “Based on the report’s findings, enterprises need to be prepared for large-scale attacks, making adversarial signals, threat intelligence and defense capabilities more important than ever.”
Highlights from this year’s report, which explores comprehensive findings from OpenText threat intelligence and hunters on the front lines of cybersecurity, include:
Organized crime rings are supporting attacks by nation-states—possibly through direct collaboration or coordination—by attacking the same targets at the same time:
Attackers are keyed in on specific events, especially major holidays, military aid to Ukraine, turning the upcoming U.S. presidential election into a time of imminent peril. Nation-states also target specific days of the week for cyberattacks:
Evasion, misdirection and masquerading are helping adversaries get around defenses designed for direct attacks. Many attacks are taking advantage of weak security fundamentals, with victims increasing their vulnerability by not taking basic countermeasures:
Visit here for the full report.
Leave a Reply