Published On : 2024-07-22
CRYSTAL BALL SERIES
What cyber-related areas will evolve over 2024?
What new challenges will we face?
IN THIS INSTALMENT WE EXPLORE
ARTIFICAL INTELLIGENCE
GENERATIVE AI FOR DISINFORMATION

AI-POWERED CYBERSECURITY THREATS

Al ADVANCEMENT IS PAVING THE WAY FOR DIGITAL ADVERSARIES

Al-powered adversaries’ infiltration of societal, political, and cultural spheres through tailored deceitful content signifies the rise of threat actors with capabilities to undermine trust and deepen societal rifts.
What we see in the future for LLMs

The cybersecurity market is valued at $250 billion. Adding up costs of lost revenue, reputational damage, etc. estimates predict cost of cybercrime to reach up to $1 trillion
CRYSTAL BALL SERIES
IN THIS INSTALMENT WE EXPLORE
PROTECTIONIST ECONOMIC POLICIES



Impact of Cybercrime Incidents
Damage & destruction of data | Financial Loss | Decreased productivity | Theft of intellectual property Personal & financial data | Embezzlement | Fraud | Operational Interruption
SURGE IN STATE-SPONSORED CYBER ATTACKS AMID PROTECTIONIST ECONOMIC POLICIES


CRYSTAL BALL SERIES
IN THIS INSTALMENT WE EXPLORE
Deceptive Manipulation: The rise of DEEPFAKES
This technology, powered by Al, is fictitious media compiled of known sounds (i.e. voices) and images (facial expressions and movements) with malicious
Global increase in deepfake fraud cases

% Increase in deepfake usage between 2022-2023

- North America- approx. 1700% increase.
- APAC Region- approx. 1500% increase.
- MEA Region- approx. 450% increase.
- Latin America- approx. 400% increase.

Implications of Deepfakes
- Identity Theft
- Risks of Reputational Damage
- Increase in Cyber Crime
- Disinformation
Deepfakes will become influential social engineering tools

More than 1600% increase
Global Deepfake Al Market rise from approx. $7B (2023) to $120B (2033)


Cybercriminals are actively seeking creators capable of producing flawless videos with perfect sound and seamless integration. This trend indicates a forthcoming increase in incidents.
CRYSTAL BALL SERIES
IN THIS INSTALMENT WE EXPLORE
RANSOMWARE ATTACK TRENDS
OPERATIONAL DWELL TIMES

TOP INITIAL ACCESS VECTORS

FILE DETECTIONS BY BUSINESS SEGMENT IN Q1 2024

MOST ACTIVE RANSOMWARE LANGUAGES

Ransomware Attacks Will Embrace Speed Over Stealth
Asset Type |
Targeted Technologies |
Interested RaaS groups |
Network Devices |
Cisco | Citrix | Fortinet | F5 |
Lockbit, Akira, Medusa |
File Transfer Software |
GoAnywhere MovelT |
clOp |
Pinters |
PaperCut |
Lockbit |
Remote Access and Services |
Screenconnect Microsoft (RDP) Microsoft (Netlogon) |
Lockbit, Akira, Blackbasta |
Email Gateways |
Microsoft (Exchange) |
Play, Bianlian |
ENCRYPTION ALGORITHMS OF PROMINENT GROUPS
- RSA-AES hybrid crypto system
- ChaCha20-Poly 1305
- AES-RSA
- ChaCha20 and RSA
- AES 256
- Salsa20

CRYSTAL BALL SERIES
IN THIS INSTALMENT WE EXPLORE
2024:THE YEAR OF ELECTIONS



Election year will give rise to misinformation, and disinformation tradecraft
Digital publishing and Al enabled malicious actors will push their agendas widely and inexpensively.

The Future of Disinformation


CRYSTAL BALL SERIES
IN THIS INSTALMENT WE EXPLORE
SUPPLY CHAIN DEPENDENCIES : AN ESCALATING CYBERSECURITY CONCERN
Impact of Supply Chain Attacks
- Data Loss
- Disruption of Critical Operations
- Financial losses
- Reputational Damage


Prominent Supply Chain Attacks.

THREAT ACTORS WILL CONTINUE TO CAPITALIZE ON THIRD PARTIES AND SUPPLY CHAINS
Global Supply Chain Attacks to Spike in 2024 and Beyond

Surge in Threats

CRYSTAL BALL SERIES
IN THIS INSTALMENT WE EXPLORE
THE GROWING THREAT OF CYBERCRIME IN THE ELECTRIC VEHICLE INDUSTRY
Strong security measures and regulations are critical to protect EVs from cyber threats.
EV Cybersecurity Incidents


China: 45% of all cars sold
Europe: 25% of all cars sold
United States: 11% of all cars sold
Reported EV charging vulnerabilities are expected to double by 2024

Dark Web Observations
EV company customer information currently on sale for $4000
- User IDs
- Names
- Emails
- CPFs
- Phone numbers
- Additional personal details
PERCENTAGE OF ATTACKS

RISING VULNERABILITIES IN ELECTRIC VEHICLES
Surge in cyber incidents targeting electric vehicle components.


Global automotive cybersecurity market


CRYSTAL BALL SERIES
IN THIS INSTALMENT WE EXPLORE
CLOUD, IOT, AND IIOT

IOT MALWARE ATTACKS IN 2023
Information on loT Malware Attacks
- loT infrastructure
- Backdoors : 66% of malware facilitating botnet creation
MOST MALWARES USED

The Role of Cloud, IOT, and IloT as New Intermediaries for Adversaries
End-user spending on public cloud services

Global Industrial Internet of things (lol)

Cloud Security Main challenges in 2024

loT industry main challenges in 2024

CRYSTAL BALL SERIES
IN THIS INSTALMENT WE EXPLORE
DDOS HACKTIVISM TO RDDOS TRAJECTORY
Geopolitical conflicts are the main reason for the increase in DDoS attacks

NATO and Pro NATO countries are most attacked by DDoS attackers
Top 10 Victim Countries of DDoS Attacks


Critical Infrastructure organizations are the most targeted by DDoS attackers
Most Targeted Industries

BE READY FOR A NEW CYBERCRIME ARMORY WITH NEXT-GEN RDDOS
A growing number of RDDoS campaigners will emerge with origins in DDoS hacktivism

Increased Risk in 2024 and Beyond
RDDoS Top Targeted Industries

The DDos threat actors space will be dominated by Russian threat actors against NATO and Anti-Russian countries

CRYSTAL BALL SERIES
IN THIS INSTALMENT WE EXPLORE
BEHAVIORAL DATA


2023 saw an increase in threat intelligence sharing that integrated behavioral attributes
Distribution of social engineering attacks on individuals this time last year

BEHAVIORAL DATA WILL BECOME MORE VALUABLE

