Remote and hybrid work models may expose new vulnerabilities and more surfaces to cyber attacks in 2023, industry experts have warned.
Driven by quick returns and encrypted nature of the business, cyber criminals will continue to exploit users’ weak and poorly managed home networks and devices to breach corporate networks, they said.
The majority of the attacks will be persuasive, more personal in nature targeting specific employees of the company and hitting commonly used business communication services and apps, such as Slack, Teams, ClickUp and ProofHub.
As 5G’s regional adoption accelerates, faster data transfer on mobile devices will make them as attractive to threat actors as to consumers
Paul Baird,
chief technical security officer at Qualys
“We see attackers steering away from targeting official work emails to ensnare their victims … they are finding more success by sending targeted social engineering campaigns to personal accounts of employees through text messages and third-party messaging apps such as WhatsApp,” Sundaram Lakshmanan, chief technology officer at California-based security company Lookout, told The National.
An increasing awareness of cyber threats has led to a rising investment in cyber security infrastructure worldwide.
“In 2023, we expect to see weaponised phishing attacks spreading their wings across commonly used business communication services and apps … [they] have traditionally been managed by anti-phishing toolbars and email security protections, but in near future phishing may scale beyond email and messages, spreading across communication channels in a much stealthier way,” said Jaspreet Singh, senior research scientist at security company Trellix, also based in California.
“While 'Zoombombing' and similar methods have been observed, we expect the use of business collaboration apps to grow as threat vectors.”
Zoombombing is the hijacking of video-conference calls by hackers.
Phishing, typically, comes in the form of fraudulent emails that aim to obtain personal information of victims, such as credit card details and sensitive data like usernames and passwords.
In January, US cyber security companies McAfee Enterprise and FireEye officially merged to form Trellix, to thwart cyber attacks and fight sophisticated criminals.
Driven by an increasing awareness of data risks and threats, the global cyber security market is poised for robust growth over the next few years.
The global cyber security market revenue is forecast to jump to $262.3 billion by 2027, a jump of more than 67 per cent from $156.35 billion this year, according to Statista.
The US, world’s biggest economy, will generate more than $63.24 billion in cyber security revenue this year — more than 40 per cent of total sales.
“Attackers will lean more on their powers of persuasion than on their malware kits as they step up social engineering attacks in the cloud … a single fake social media profile, leveraged in the right way, can allow a threat actor to impersonate a trusted vendor,” said Morey Haber, chief security officer at Atlanta-based security firm BeyondTrust.
“The threat actor will persuade victim after victim to divulge secrets or act in other ways contrary to their interest or that of their employer. The Lapsus$ [ransomware] group used social media to become an employee and then spoof access by calling a support helpdesk.”
In March, the UK police arrested seven people, including a teenage boy, following a series of online attacks by the Lapsus$ hacking group that hit major technology companies, including Okta and Microsoft.
Lapsus$ has publicly taunted its victims, leaking their source codes and internal documents. It has reportedly gone as far as to join the Zoom calls of companies they’ve breached, during which they have taunted employees and consultants trying to manage the hack.
The group has claimed to breach companies such as Samsung, Vodafone and Ubisoft.
Global cyber crime costs are also expected to surge by nearly 300 per cent to $23.84 trillion by 2027, from almost $6 trillion last year, according to data compiled by Statista and global bodies such as the Federal Bureau of Investigation and the International Monetary Fund.
Cyber crime costs include stealing and destruction of data, stolen money, lost productivity, theft of intellectual property, theft of personal and financial data, fraud, post-attack interruption to the normal course of business, investigation cost, retrieval and deletion of compromised data and systems. This is in addition to the reputational harm caused to the enterprises.
The global adoption of fifth-generation wireless network connectivity — or 5G — will also attract bad actors, industry experts cautioned.
In 2023, we expect to see weaponised phishing attacks spreading their wings across commonly used business communication services and apps
Jaspreet Sign,
senior research scientist at Trellix
“As 5G’s regional adoption accelerates, faster data transfer on mobile devices will make them as attractive to threat actors as to consumers. And private 5G deployments for IoT [Internet of Things] and other use cases will introduce weak endpoints into otherwise secure ecosystems,” said Paul Baird, chief technical security officer at California-based cloud security firm Qualys.
In 2023, attackers will continue to target supply chains that have been disrupted by the Covid-19 pandemic.
However, instead of targeting key suppliers, they will look beyond the usual suspects to gain access into core networks. For example, this could include legal or accounting firms, Christian Borst, chief technology officer for Europe, Middle East and Africa at San Jose-based artificial intelligence threat detection and response company Vectra AI, said.
“A holistic approach may help turn the tables on the matter … supply chain means partnership … partnership means collaboration and supporting each other.
“Only as a mesh interconnected structure with consistent resiliency can companies thrive in the digital economy. This includes ensuring that they review the security policies of all those in the chain,” Mr Borst said.
A mesh network is a group of connectivity devices, such as different Wi-Fi routers. It includes multiple sources of connectivity instead of just a single router.
The specs
- Engine: 3.9-litre twin-turbo V8
- Power: 640hp
- Torque: 760nm
- On sale: 2026
- Price: Not announced yet
MATCH INFO
Barcelona 5 (Lenglet 2', Vidal 29', Messi 34', 75', Suarez 77')
Valladolid 1 (Kiko 15')
UAE currency: the story behind the money in your pockets
Zakat definitions
Zakat: an Arabic word meaning ‘to cleanse’ or ‘purification’.
Nisab: the minimum amount that a Muslim must have before being obliged to pay zakat. Traditionally, the nisab threshold was 87.48 grams of gold, or 612.36 grams of silver. The monetary value of the nisab therefore varies by current prices and currencies.
Zakat Al Mal: the ‘cleansing’ of wealth, as one of the five pillars of Islam; a spiritual duty for all Muslims meeting the ‘nisab’ wealth criteria in a lunar year, to pay 2.5 per cent of their wealth in alms to the deserving and needy.
Zakat Al Fitr: a donation to charity given during Ramadan, before Eid Al Fitr, in the form of food. Every adult Muslim who possesses food in excess of the needs of themselves and their family must pay two qadahs (an old measure just over 2 kilograms) of flour, wheat, barley or rice from each person in a household, as a minimum.
KEY%20DATES%20IN%20AMAZON'S%20HISTORY
%3Cp%3E%3Cstrong%3EJuly%205%2C%201994%3A%3C%2Fstrong%3E%20Jeff%20Bezos%20founds%20Cadabra%20Inc%2C%20which%20would%20later%20be%20renamed%20to%20Amazon.com%2C%20because%20his%20lawyer%20misheard%20the%20name%20as%20'cadaver'.%20In%20its%20earliest%20days%2C%20the%20bookstore%20operated%20out%20of%20a%20rented%20garage%20in%20Bellevue%2C%20Washington%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EJuly%2016%2C%201995%3A%3C%2Fstrong%3E%20Amazon%20formally%20opens%20as%20an%20online%20bookseller.%20%3Cem%3EFluid%20Concepts%20and%20Creative%20Analogies%3A%20Computer%20Models%20of%20the%20Fundamental%20Mechanisms%20of%20Thought%3C%2Fem%3E%20becomes%20the%20first%20item%20sold%20on%20Amazon%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E1997%3A%3C%2Fstrong%3E%20Amazon%20goes%20public%20at%20%2418%20a%20share%2C%20which%20has%20grown%20about%201%2C000%20per%20cent%20at%20present.%20Its%20highest%20closing%20price%20was%20%24197.85%20on%20June%2027%2C%202024%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E1998%3A%3C%2Fstrong%3E%20Amazon%20acquires%20IMDb%2C%20its%20first%20major%20acquisition.%20It%20also%20starts%20selling%20CDs%20and%20DVDs%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E2000%3A%3C%2Fstrong%3E%20Amazon%20Marketplace%20opens%2C%20allowing%20people%20to%20sell%20items%20on%20the%20website%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E2002%3A%3C%2Fstrong%3E%20Amazon%20forms%20what%20would%20become%20Amazon%20Web%20Services%2C%20opening%20the%20Amazon.com%20platform%20to%20all%20developers.%20The%20cloud%20unit%20would%20follow%20in%202006%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E2003%3A%3C%2Fstrong%3E%20Amazon%20turns%20in%20an%20annual%20profit%20of%20%2475%20million%2C%20the%20first%20time%20it%20ended%20a%20year%20in%20the%20black%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E2005%3A%3C%2Fstrong%3E%20Amazon%20Prime%20is%20introduced%2C%20its%20first-ever%20subscription%20service%20that%20offered%20US%20customers%20free%20two-day%20shipping%20for%20%2479%20a%20year%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E2006%3A%3C%2Fstrong%3E%20Amazon%20Unbox%20is%20unveiled%2C%20the%20company's%20video%20service%20that%20would%20later%20morph%20into%20Amazon%20Instant%20Video%20and%2C%20ultimately%2C%20Amazon%20Video%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E2007%3A%3C%2Fstrong%3E%20Amazon's%20first%20hardware%20product%2C%20the%20Kindle%20e-reader%2C%20is%20introduced%3B%20the%20Fire%20TV%20and%20Fire%20Phone%20would%20come%20in%202014.%20Grocery%20service%20Amazon%20Fresh%20is%20also%20started%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E2009%3A%3C%2Fstrong%3E%20Amazon%20introduces%20Amazon%20Basics%2C%20its%20in-house%20label%20for%20a%20variety%20of%20products%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E2010%3A%3C%2Fstrong%3E%20The%20foundations%20for%20Amazon%20Studios%20were%20laid.%20Its%20first%20original%20streaming%20content%20debuted%20in%202013%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E2011%3A%3C%2Fstrong%3E%20The%20Amazon%20Appstore%20for%20Google's%20Android%20is%20launched.%20It%20is%20still%20unavailable%20on%20Apple's%20iOS%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E2014%3A%3C%2Fstrong%3E%20The%20Amazon%20Echo%20is%20launched%2C%20a%20speaker%20that%20acts%20as%20a%20personal%20digital%20assistant%20powered%20by%20Alexa%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E2017%3A%3C%2Fstrong%3E%20Amazon%20acquires%20Whole%20Foods%20for%20%2413.7%20billion%2C%20its%20biggest%20acquisition%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E2018%3A%3C%2Fstrong%3E%20Amazon's%20market%20cap%20briefly%20crosses%20the%20%241%20trillion%20mark%2C%20making%20it%2C%20at%20the%20time%2C%20only%20the%20third%20company%20to%20achieve%20that%20milestone%3C%2Fp%3E%0A
Name: Brendalle Belaza
From: Crossing Rubber, Philippines
Arrived in the UAE: 2007
Favourite place in Abu Dhabi: NYUAD campus
Favourite photography style: Street photography
Favourite book: Harry Potter
BIGGEST CYBER SECURITY INCIDENTS IN RECENT TIMES
SolarWinds supply chain attack: Came to light in December 2020 but had taken root for several months, compromising major tech companies, governments and its entities
Microsoft Exchange server exploitation: March 2021; attackers used a vulnerability to steal emails
Kaseya attack: July 2021; ransomware hit perpetrated REvil, resulting in severe downtime for more than 1,000 companies
Log4j breach: December 2021; attackers exploited the Java-written code to inflitrate businesses and governments
Visit Abu Dhabi culinary team's top Emirati restaurants in Abu Dhabi
Yadoo’s House Restaurant & Cafe
For the karak and Yoodo's house platter with includes eggs, balaleet, khamir and chebab bread.
Golden Dallah
For the cappuccino, luqaimat and aseeda.
Al Mrzab Restaurant
For the shrimp murabian and Kuwaiti options including Kuwaiti machboos with kebab and spicy sauce.
Al Derwaza
For the fish hubul, regag bread, biryani and special seafood soup.
Desert Warrior
Starring: Anthony Mackie, Aiysha Hart, Ben Kingsley
Director: Rupert Wyatt
Rating: 3/5
Who's who in Yemen conflict
Houthis: Iran-backed rebels who occupy Sanaa and run unrecognised government
Yemeni government: Exiled government in Aden led by eight-member Presidential Leadership Council
Southern Transitional Council: Faction in Yemeni government that seeks autonomy for the south
Habrish 'rebels': Tribal-backed forces feuding with STC over control of oil in government territory
THE BIO
BIO:
Born in RAK on December 9, 1983
Lives in Abu Dhabi with her family
She graduated from Emirates University in 2007 with a BA in architectural engineering
Her motto in life is her grandmother’s saying “That who created you will not have you get lost”
Her ambition is to spread UAE’s culture of love and acceptance through serving coffee, the country’s traditional coffee in particular.
The specs
Engine: 2.0-litre 4-cyl, 48V hybrid
Transmission: eight-speed automatic
Power: 325bhp
Torque: 450Nm
Price: Dh359,000
On sale: now
Yahya Al Ghassani's bio
Date of birth: April 18, 1998
Playing position: Winger
Clubs: 2015-2017 – Al Ahli Dubai; March-June 2018 – Paris FC; August – Al Wahda
Apple%20Mac%20through%20the%20years
%3Cp%3E1984%20-%20Apple%20unveiled%20the%20Macintosh%20on%20January%2024%3Cbr%3E1985%20-%20Steve%20Jobs%20departed%20from%20Apple%20and%20established%20NeXT%3Cbr%3E1986%20-%20Apple%20introduced%20the%20Macintosh%20Plus%2C%20featuring%20enhanced%20memory%3Cbr%3E1987%20-%20Apple%20launched%20the%20Macintosh%20II%2C%20equipped%20with%20colour%20capabilities%3Cbr%3E1989%20-%20The%20widely%20acclaimed%20Macintosh%20SE%2F30%20made%20its%20debut%3Cbr%3E1994%20-%20Apple%20presented%20the%20Power%20Macintosh%3Cbr%3E1996%20-%20The%20Macintosh%20System%20Software%20OS%20underwent%20a%20rebranding%20as%20Mac%20OS%3Cbr%3E2001%20-%20Apple%20introduced%20Mac%20OS%20X%2C%20marrying%20Unix%20stability%20with%20a%20user-friendly%20interface%3Cbr%3E2006%20-%20Apple%20adopted%20Intel%20processors%20in%20MacBook%20Pro%20laptops%3Cbr%3E2008%20-%20Apple%20introduced%20the%20MacBook%20Air%2C%20a%20lightweight%20laptop%3Cbr%3E2012%20-%20Apple%20launched%20the%20MacBook%20Pro%20with%20a%20retina%20display%3Cbr%3E2016%20-%20The%20Mac%20operating%20system%20underwent%20rebranding%20as%20macOS%3Cbr%3E2020%20-%20Apple%20introduced%20the%20M1%20chip%20for%20Macs%2C%20combining%20high%20performance%20and%20energy%20efficiency%3Cbr%3E2022%20-%20The%20M2%20chip%20was%20announced%3Cbr%3E2023%20-The%20M3%20line-up%20of%20chip%20was%20announced%20to%20improve%20performance%20and%20add%20new%20capabilities%20for%20Mac.%3C%2Fp%3E%0A