The global cyber security market is forecast to grow to $345.4 billion by 2026, according to Statista. EPA
The global cyber security market is forecast to grow to $345.4 billion by 2026, according to Statista. EPA
The global cyber security market is forecast to grow to $345.4 billion by 2026, according to Statista. EPA
The global cyber security market is forecast to grow to $345.4 billion by 2026, according to Statista. EPA

Top 12 cyber crime trends to watch for in 2023


Alkesh Sharma
  • English
  • Arabic

The global cyber security market's size is expected to expand at a compound annual growth rate of 12 per cent from 2022 to 2030, from $184.93 billion last year, according to the US company Grand View Research.

The growing number of cyber attacks and the fast proliferation of online shopping platforms, increased adoption of cloud solutions and rapid expansion of smart machines and connected devices are some of the factors driving the market growth.

As the industry evolves at a prolific pace, The National looks at the top 12 cyber security threats and trends of the year ahead.

Digital DNA theft

If you have ever seen the sci-fi movie “The 6th Day”, we are on the same path for having replicas of our digital selves.

In 2023, deep fakes will become so authentic that not only will we see our digital identities being stolen, but also digital versions of our DNAs will be at risk, according to industry experts. Exposing our digital DNA on the internet will enable deep fakes to replicate and create digital humans.

Illustrations of video avatars created by Synthesia, an AI video platform that creates digital humans. Reuters
Illustrations of video avatars created by Synthesia, an AI video platform that creates digital humans. Reuters

A deep fake is a human impersonation created with advanced technologies, including artificial intelligence and machine learning.

Humans sync their physical lives on social media with constant uploads of photos, videos, audio and personal preferences with enough data points and some enhanced algorithms, said Joseph Carson, chief security scientist at California-based security firm Delinea.

“It is only a matter of time before attackers can create lifelike digital avatars of anyone, and it will be incredibly difficult to identify the difference without sophisticated technology to analyse the source data,” Mr Carson said.

Cyber attacks transferring between smart devices

Smart home and Internet of Thing (IoT) devices are increasingly being targeted by cyber criminals as the most vulnerable entry points to any home or business security network.

The typical cyber attack moves from hacker to device, but 2023 may bring cyber offensives that jump between smart devices, including wearable devices, voice-controlled assistants, smartphones and temperature-control equipment at home, experts said.

Humans sync their physical lives on social media with constant uploads of photos, videos, audio and personal preferences. AP
Humans sync their physical lives on social media with constant uploads of photos, videos, audio and personal preferences. AP

Factors such as extensive connectivity, widespread sharing of data among devices and reliance on weak security networks will rapidly orchestrate such attacks.

Strategies to thwart supply chain threats

The scope of threats related to supply chains has never been higher.

Attackers now have more resources and tools at their disposal to disrupt supply chains that are crucial to maintain adequate supply of goods and services, especially during the pandemics such as Covid-19.

The standard diligence and security assessments that chief security officers have performed on third parties are no longer adequate given the escalating frequency and impact of supply chain attacks, experts said.

Regulations, such as the EU Network and Information Security Directive 2.0, are forcing companies to conduct more frequent and dynamic assessments of their supply chain risk and to better control the access third parties have to their networks.

Camera-based malware is here

Don’t let your camera’s viewfinder deceive you.

The camera on the mobile devices is a powerful tool for documenting memories and daily lives. These cameras have been augmented with software algorithms to recognise AI tools to enhance the quality of pictures and videos.

“In 2023, [we] expect to see the first of many exploits that challenge smart cameras and the technology embedded within to leverage vulnerabilities,” said Brian Chappell, chief security strategist at cyber security firm BeyondTrust for Europe, Middle East, Africa and Asia Pacific.

Smartphone camera technology can itself become exploitable for malware execution, experts said. Bloomberg
Smartphone camera technology can itself become exploitable for malware execution, experts said. Bloomberg

“The technology may itself become exploitable for malware execution. This malicious behaviour … can obfuscate sensitive information, provide misinformation, embed malware or perform some other form of misdirection based on the content.”

QR code threat getting real

A QR code is a machine-readable code used for storing information for reading by a smart device. It is just like a digital business card that usually has various details such as phone number, email and home address.

When you scan a compromised QR code, it could send your location coordinates to a geolocation-enabled application and can also automatically redirect you to a malicious website.

Organisations at risk of becoming cyber insurable

With more organisations aiming to buy cyber insurance as a financial safety net to protect their businesses from serious financial exposure resulting from data breaches and ransomware attacks, the need to get a solid cyber strategy in place will be mandated to get insurance.

“The days of cheap and easy are over,” said Mr Carson.

As of the second quarter of 2022, the US cyber-insurance prices increased 79 per cent over the prior year, according to Marsh global insurance market index.

“The truth is, it is becoming downright difficult to obtain quality cyber insurance at a reasonable rate. In 2023, more businesses will face the stark realisation that they are not cyber insurable,” said Mr Chappell.

Death of personal password

The growth of non-password-based primary authentication could finally spell the end of the personal password in 2023 and in the years to come, experts said.

More applications, not just the operating system itself, will start using advanced non-password technologies, such as biometrics, either to authenticate directly or leverage biometric technology, like Microsoft Hello, Apple FaceID or TouchID, to authorise access.

More applications will start using advanced non-password technologies, such as biometrics, experts said. EPA
More applications will start using advanced non-password technologies, such as biometrics, experts said. EPA

“Personal accounts are still commonly backed by passwords as the ultimate fallback, but the need to remember, retrieve and type passwords is going to dwindle rapidly as the technology to reliably recognise us improves,” Mr Chappell said.

Jump of ransomware

The use of ransomware has picked up pace and became more dangerous in 2022. It will continue its rapid rise next year and its variations will increase with the frequency of attacks.

A recent report by security firm Cybereason found that 73 per cent of organisations suffered at least one ransomware attack in 2022, compared with just 55 per cent in 2021.

“With ransomware continuing to adapt with different enhancements, we must always be flexible to change,” Mr Carson said.

Taking EVs and autonomous technology off-road

As electric vehicles and autonomous technology aim to become mainstream, they also carry the threat of increased cyber attacks.

Threat actors could disable vehicle’s display screens, entertainment, navigation, climate controls, and even the ability to call for help using the car’s system. This could be more dangerous when autonomous driving truly goes mainstream.

“Expect to see everything from custom displays to malware using car resources for crypto mining. In the next decade, this will be a risk surface and viable commercial market no one should ignore,” said Morey J Haber, chief security officer at BeyondTrust for Europe, Middle East, Africa and Asia-Pacific.

Causing more blackouts

An increase in the number of cyber attacks on energy production and distribution networks will lead to power outages, fuel shortages and heating or cooling resource depletion.

While a fault in any energy source can drive prices higher, the threat of an intentional disruption could leave people out in the cold or completely disrupt electronic transaction processing, said Mr Haber.

“Threat actors recognise this weakness, and we should expect nation-states and opportunistic cyber-organised crime syndicates to refine their methods to target energy sectors.”

Multi-factor authentication invincibility fails

In 2022, threat actors, such as Lapsus$, exposed the shortcomings of multi-factor authentication. The terms MFA bombing, MFA bypass, and MFA fatigue all leapt into the cyber security lexicon.

In 2023, experts expect a new round of attack vectors that target and successfully bypass MFA strategies.

Lapsus$ bypasses MFA framework using techniques such as spamming original account holders. This year, some of its victims included Microsoft, T-Mobile and Nvidia.

Weaponising operational technology environments

Cyber criminals could weaponise operational technology environments to harm or kill humans, the Connecticut-based technology research and consulting company Gartner has said.

The use of ransomware has picked up pace and became more dangerous in 2022. Reuters
The use of ransomware has picked up pace and became more dangerous in 2022. Reuters

The OT is a type of computing and communication system – including both hardware and software – that controls industrial operations, mainly focusing on the physical devices and processes they use. It is used to gather and analyse data in real time, which is further used to monitor a manufacturing unit or to control equipment.

Various industries, such as telecoms and oil and gas, use OTs to ensure different devices work in co-ordination.

"OT that once had a single function and purpose is now becoming smarter, leveraging commercial operating systems and applications to perform expanded missions. As these devices expand in scope, their design is susceptible to vulnerabilities and exploitation," Mr Chappell said.

Company%20profile%20
%3Cp%3E%3Cstrong%3EName%3A%20%3C%2Fstrong%3EYodawy%3Cbr%3E%3Cstrong%3EBased%3A%3C%2Fstrong%3E%20Egypt%3Cbr%3E%3Cstrong%3EFounders%3A%20%3C%2Fstrong%3EKarim%20Khashaba%2C%20Sherief%20El-Feky%20and%20Yasser%20AbdelGawad%3Cstrong%3E%3Cbr%3ESector%3A%20%3C%2Fstrong%3EHealthTech%3Cbr%3E%3Cstrong%3ETotal%20funding%3A%20%3C%2Fstrong%3E%2424.5%20million%3Cbr%3E%3Cstrong%3EInvestors%3A%20%3C%2Fstrong%3EAlgebra%20Ventures%2C%20Global%20Ventures%2C%20MEVP%20and%20Delivery%20Hero%20Ventures%2C%20among%20others%3Cstrong%3E%3Cbr%3ENumber%20of%20employees%3A%3C%2Fstrong%3E%20500%3Cbr%3E%3C%2Fp%3E%0A
Sole survivors
  • Cecelia Crocker was on board Northwest Airlines Flight 255 in 1987 when it crashed in Detroit, killing 154 people, including her parents and brother. The plane had hit a light pole on take off
  • George Lamson Jr, from Minnesota, was on a Galaxy Airlines flight that crashed in Reno in 1985, killing 68 people. His entire seat was launched out of the plane
  • Bahia Bakari, then 12, survived when a Yemenia Airways flight crashed near the Comoros in 2009, killing 152. She was found clinging to wreckage after floating in the ocean for 13 hours.
  • Jim Polehinke was the co-pilot and sole survivor of a 2006 Comair flight that crashed in Lexington, Kentucky, killing 49.

White hydrogen: Naturally occurring hydrogenChromite: Hard, metallic mineral containing iron oxide and chromium oxideUltramafic rocks: Dark-coloured rocks rich in magnesium or iron with very low silica contentOphiolite: A section of the earth’s crust, which is oceanic in nature that has since been uplifted and exposed on landOlivine: A commonly occurring magnesium iron silicate mineral that derives its name for its olive-green yellow-green colour

Match info

Newcastle United 1
Joselu (11')

Tottenham Hotspur 2
Vertonghen (8'), Alli (18')

Other acts on the Jazz Garden bill

Sharrie Williams
The American singer is hugely respected in blues circles due to her passionate vocals and songwriting. Born and raised in Michigan, Williams began recording and touring as a teenage gospel singer. Her career took off with the blues band The Wiseguys. Such was the acclaim of their live shows that they toured throughout Europe and in Africa. As a solo artist, Williams has also collaborated with the likes of the late Dizzy Gillespie, Van Morrison and Mavis Staples.
Lin Rountree
An accomplished smooth jazz artist who blends his chilled approach with R‘n’B. Trained at the Duke Ellington School of the Arts in Washington, DC, Rountree formed his own band in 2004. He has also recorded with the likes of Kem, Dwele and Conya Doss. He comes to Dubai on the back of his new single Pass The Groove, from his forthcoming 2018 album Stronger Still, which may follow his five previous solo albums in cracking the top 10 of the US jazz charts.
Anita Williams
Dubai-based singer Anita Williams will open the night with a set of covers and swing, jazz and blues standards that made her an in-demand singer across the emirate. The Irish singer has been performing in Dubai since 2008 at venues such as MusicHall and Voda Bar. Her Jazz Garden appearance is career highlight as she will use the event to perform the original song Big Blue Eyes, the single from her debut solo album, due for release soon.

The Greatest Royal Rumble card as it stands

The Greatest Royal Rumble card as it stands

50-man Royal Rumble - names entered so far include Braun Strowman, Daniel Bryan, Kurt Angle, Big Show, Kane, Chris Jericho, The New Day and Elias

Universal Championship Brock Lesnar (champion) v Roman Reigns in a steel cage match

WWE World Heavyweight ChampionshipAJ Styles (champion) v Shinsuke Nakamura

Intercontinental Championship Seth Rollins (champion) v The Miz v Finn Balor v Samoa Joe

United States Championship Jeff Hardy (champion) v Jinder Mahal

SmackDown Tag Team Championship The Bludgeon Brothers (champions) v The Usos

Raw Tag Team Championship (currently vacant) Cesaro and Sheamus v Matt Hardy and Bray Wyatt

Casket match The Undertaker v Chris Jericho

Singles match John Cena v Triple H

Cruiserweight Championship Cedric Alexander v tba

First Person
Richard Flanagan
Chatto & Windus 

 

 

Desert Warrior

Starring: Anthony Mackie, Aiysha Hart, Ben Kingsley

Director: Rupert Wyatt

Rating: 3/5

Company profile

Name: Oulo.com

Founder: Kamal Nazha

Based: Dubai

Founded: 2020

Number of employees: 5

Sector: Technology

Funding: $450,000

Tree of Hell

Starring: Raed Zeno, Hadi Awada, Dr Mohammad Abdalla

Director: Raed Zeno

Rating: 4/5

Updated: December 30, 2022, 4:30 AM