Global cybercrime costs are expected to surge by nearly 300 per cent to $23.84 trillion by 2027, up from nearly $6 trillion last year. Getty Images
Global cybercrime costs are expected to surge by nearly 300 per cent to $23.84 trillion by 2027, up from nearly $6 trillion last year. Getty Images
Global cybercrime costs are expected to surge by nearly 300 per cent to $23.84 trillion by 2027, up from nearly $6 trillion last year. Getty Images
Global cybercrime costs are expected to surge by nearly 300 per cent to $23.84 trillion by 2027, up from nearly $6 trillion last year. Getty Images

Why remote and hybrid work could fuel cyber attacks in 2023


Alkesh Sharma
  • English
  • Arabic

Remote and hybrid work models may expose new vulnerabilities and more surfaces to cyber attacks in 2023, industry experts have warned.

Driven by quick returns and encrypted nature of the business, cyber criminals will continue to exploit users’ weak and poorly managed home networks and devices to breach corporate networks, they said.

The majority of the attacks will be persuasive, more personal in nature targeting specific employees of the company and hitting commonly used business communication services and apps, such as Slack, Teams, ClickUp and ProofHub.

As 5G’s regional adoption accelerates, faster data transfer on mobile devices will make them as attractive to threat actors as to consumers
Paul Baird,
chief technical security officer at Qualys

“We see attackers steering away from targeting official work emails to ensnare their victims … they are finding more success by sending targeted social engineering campaigns to personal accounts of employees through text messages and third-party messaging apps such as WhatsApp,” Sundaram Lakshmanan, chief technology officer at California-based security company Lookout, told The National.

An increasing awareness of cyber threats has led to a rising investment in cyber security infrastructure worldwide.

“In 2023, we expect to see weaponised phishing attacks spreading their wings across commonly used business communication services and apps … [they] have traditionally been managed by anti-phishing toolbars and email security protections, but in near future phishing may scale beyond email and messages, spreading across communication channels in a much stealthier way,” said Jaspreet Singh, senior research scientist at security company Trellix, also based in California.

“While 'Zoombombing' and similar methods have been observed, we expect the use of business collaboration apps to grow as threat vectors.”

Zoombombing is the hijacking of video-conference calls by hackers.

Phishing, typically, comes in the form of fraudulent emails that aim to obtain personal information of victims, such as credit card details and sensitive data like usernames and passwords.

In January, US cyber security companies McAfee Enterprise and FireEye officially merged to form Trellix, to thwart cyber attacks and fight sophisticated criminals.

The US is expected to generate more than $63.24 billion in cybersecurity revenue this year – more than 40 per cent of the global sales. Reuters
The US is expected to generate more than $63.24 billion in cybersecurity revenue this year – more than 40 per cent of the global sales. Reuters

Driven by an increasing awareness of data risks and threats, the global cyber security market is poised for robust growth over the next few years.

The global cyber security market revenue is forecast to jump to $262.3 billion by 2027, a jump of more than 67 per cent from $156.35 billion this year, according to Statista.

The US, world’s biggest economy, will generate more than $63.24 billion in cyber security revenue this year — more than 40 per cent of total sales.

“Attackers will lean more on their powers of persuasion than on their malware kits as they step up social engineering attacks in the cloud … a single fake social media profile, leveraged in the right way, can allow a threat actor to impersonate a trusted vendor,” said Morey Haber, chief security officer at Atlanta-based security firm BeyondTrust.

“The threat actor will persuade victim after victim to divulge secrets or act in other ways contrary to their interest or that of their employer. The Lapsus$ [ransomware] group used social media to become an employee and then spoof access by calling a support helpdesk.”

In March, the UK police arrested seven people, including a teenage boy, following a series of online attacks by the Lapsus$ hacking group that hit major technology companies, including Okta and Microsoft.

Lapsus$ has publicly taunted its victims, leaking their source codes and internal documents. It has reportedly gone as far as to join the Zoom calls of companies they’ve breached, during which they have taunted employees and consultants trying to manage the hack.

The group has claimed to breach companies such as Samsung, Vodafone and Ubisoft.

Global cyber crime costs are also expected to surge by nearly 300 per cent to $23.84 trillion by 2027, from almost $6 trillion last year, according to data compiled by Statista and global bodies such as the Federal Bureau of Investigation and the International Monetary Fund.

Cyber crime costs include stealing and destruction of data, stolen money, lost productivity, theft of intellectual property, theft of personal and financial data, fraud, post-attack interruption to the normal course of business, investigation cost, retrieval and deletion of compromised data and systems. This is in addition to the reputational harm caused to the enterprises.

The global adoption of fifth-generation wireless network connectivity — or 5G — will also attract bad actors, industry experts cautioned.

In 2023, we expect to see weaponised phishing attacks spreading their wings across commonly used business communication services and apps
Jaspreet Sign,
senior research scientist at Trellix

“As 5G’s regional adoption accelerates, faster data transfer on mobile devices will make them as attractive to threat actors as to consumers. And private 5G deployments for IoT [Internet of Things] and other use cases will introduce weak endpoints into otherwise secure ecosystems,” said Paul Baird, chief technical security officer at California-based cloud security firm Qualys.

In 2023, attackers will continue to target supply chains that have been disrupted by the Covid-19 pandemic.

However, instead of targeting key suppliers, they will look beyond the usual suspects to gain access into core networks. For example, this could include legal or accounting firms, Christian Borst, chief technology officer for Europe, Middle East and Africa at San Jose-based artificial intelligence threat detection and response company Vectra AI, said.

“A holistic approach may help turn the tables on the matter … supply chain means partnership … partnership means collaboration and supporting each other.

“Only as a mesh interconnected structure with consistent resiliency can companies thrive in the digital economy. This includes ensuring that they review the security policies of all those in the chain,” Mr Borst said.

A mesh network is a group of connectivity devices, such as different Wi-Fi routers. It includes multiple sources of connectivity instead of just a single router.

The specs
  • Engine: 3.9-litre twin-turbo V8
  • Power: 640hp
  • Torque: 760nm
  • On sale: 2026
  • Price: Not announced yet
MATCH INFO

Barcelona 5 (Lenglet 2', Vidal 29', Messi 34', 75', Suarez 77')

Valladolid 1 (Kiko 15')

UAE currency: the story behind the money in your pockets
Zakat definitions

Zakat: an Arabic word meaning ‘to cleanse’ or ‘purification’.

Nisab: the minimum amount that a Muslim must have before being obliged to pay zakat. Traditionally, the nisab threshold was 87.48 grams of gold, or 612.36 grams of silver. The monetary value of the nisab therefore varies by current prices and currencies.

Zakat Al Mal: the ‘cleansing’ of wealth, as one of the five pillars of Islam; a spiritual duty for all Muslims meeting the ‘nisab’ wealth criteria in a lunar year, to pay 2.5 per cent of their wealth in alms to the deserving and needy.

Zakat Al Fitr: a donation to charity given during Ramadan, before Eid Al Fitr, in the form of food. Every adult Muslim who possesses food in excess of the needs of themselves and their family must pay two qadahs (an old measure just over 2 kilograms) of flour, wheat, barley or rice from each person in a household, as a minimum.

KEY%20DATES%20IN%20AMAZON'S%20HISTORY
%3Cp%3E%3Cstrong%3EJuly%205%2C%201994%3A%3C%2Fstrong%3E%20Jeff%20Bezos%20founds%20Cadabra%20Inc%2C%20which%20would%20later%20be%20renamed%20to%20Amazon.com%2C%20because%20his%20lawyer%20misheard%20the%20name%20as%20'cadaver'.%20In%20its%20earliest%20days%2C%20the%20bookstore%20operated%20out%20of%20a%20rented%20garage%20in%20Bellevue%2C%20Washington%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EJuly%2016%2C%201995%3A%3C%2Fstrong%3E%20Amazon%20formally%20opens%20as%20an%20online%20bookseller.%20%3Cem%3EFluid%20Concepts%20and%20Creative%20Analogies%3A%20Computer%20Models%20of%20the%20Fundamental%20Mechanisms%20of%20Thought%3C%2Fem%3E%20becomes%20the%20first%20item%20sold%20on%20Amazon%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E1997%3A%3C%2Fstrong%3E%20Amazon%20goes%20public%20at%20%2418%20a%20share%2C%20which%20has%20grown%20about%201%2C000%20per%20cent%20at%20present.%20Its%20highest%20closing%20price%20was%20%24197.85%20on%20June%2027%2C%202024%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E1998%3A%3C%2Fstrong%3E%20Amazon%20acquires%20IMDb%2C%20its%20first%20major%20acquisition.%20It%20also%20starts%20selling%20CDs%20and%20DVDs%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E2000%3A%3C%2Fstrong%3E%20Amazon%20Marketplace%20opens%2C%20allowing%20people%20to%20sell%20items%20on%20the%20website%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E2002%3A%3C%2Fstrong%3E%20Amazon%20forms%20what%20would%20become%20Amazon%20Web%20Services%2C%20opening%20the%20Amazon.com%20platform%20to%20all%20developers.%20The%20cloud%20unit%20would%20follow%20in%202006%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E2003%3A%3C%2Fstrong%3E%20Amazon%20turns%20in%20an%20annual%20profit%20of%20%2475%20million%2C%20the%20first%20time%20it%20ended%20a%20year%20in%20the%20black%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E2005%3A%3C%2Fstrong%3E%20Amazon%20Prime%20is%20introduced%2C%20its%20first-ever%20subscription%20service%20that%20offered%20US%20customers%20free%20two-day%20shipping%20for%20%2479%20a%20year%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E2006%3A%3C%2Fstrong%3E%20Amazon%20Unbox%20is%20unveiled%2C%20the%20company's%20video%20service%20that%20would%20later%20morph%20into%20Amazon%20Instant%20Video%20and%2C%20ultimately%2C%20Amazon%20Video%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E2007%3A%3C%2Fstrong%3E%20Amazon's%20first%20hardware%20product%2C%20the%20Kindle%20e-reader%2C%20is%20introduced%3B%20the%20Fire%20TV%20and%20Fire%20Phone%20would%20come%20in%202014.%20Grocery%20service%20Amazon%20Fresh%20is%20also%20started%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E2009%3A%3C%2Fstrong%3E%20Amazon%20introduces%20Amazon%20Basics%2C%20its%20in-house%20label%20for%20a%20variety%20of%20products%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E2010%3A%3C%2Fstrong%3E%20The%20foundations%20for%20Amazon%20Studios%20were%20laid.%20Its%20first%20original%20streaming%20content%20debuted%20in%202013%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E2011%3A%3C%2Fstrong%3E%20The%20Amazon%20Appstore%20for%20Google's%20Android%20is%20launched.%20It%20is%20still%20unavailable%20on%20Apple's%20iOS%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E2014%3A%3C%2Fstrong%3E%20The%20Amazon%20Echo%20is%20launched%2C%20a%20speaker%20that%20acts%20as%20a%20personal%20digital%20assistant%20powered%20by%20Alexa%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E2017%3A%3C%2Fstrong%3E%20Amazon%20acquires%20Whole%20Foods%20for%20%2413.7%20billion%2C%20its%20biggest%20acquisition%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3E2018%3A%3C%2Fstrong%3E%20Amazon's%20market%20cap%20briefly%20crosses%20the%20%241%20trillion%20mark%2C%20making%20it%2C%20at%20the%20time%2C%20only%20the%20third%20company%20to%20achieve%20that%20milestone%3C%2Fp%3E%0A

Name: Brendalle Belaza

From: Crossing Rubber, Philippines

Arrived in the UAE: 2007

Favourite place in Abu Dhabi: NYUAD campus

Favourite photography style: Street photography

Favourite book: Harry Potter

BIGGEST CYBER SECURITY INCIDENTS IN RECENT TIMES

SolarWinds supply chain attack: Came to light in December 2020 but had taken root for several months, compromising major tech companies, governments and its entities

Microsoft Exchange server exploitation: March 2021; attackers used a vulnerability to steal emails

Kaseya attack: July 2021; ransomware hit perpetrated REvil, resulting in severe downtime for more than 1,000 companies

Log4j breach: December 2021; attackers exploited the Java-written code to inflitrate businesses and governments

Visit Abu Dhabi culinary team's top Emirati restaurants in Abu Dhabi

Yadoo’s House Restaurant & Cafe

For the karak and Yoodo's house platter with includes eggs, balaleet, khamir and chebab bread.

Golden Dallah

For the cappuccino, luqaimat and aseeda.

Al Mrzab Restaurant

For the shrimp murabian and Kuwaiti options including Kuwaiti machboos with kebab and spicy sauce.

Al Derwaza

For the fish hubul, regag bread, biryani and special seafood soup. 

Desert Warrior

Starring: Anthony Mackie, Aiysha Hart, Ben Kingsley

Director: Rupert Wyatt

Rating: 3/5

Who's who in Yemen conflict

Houthis: Iran-backed rebels who occupy Sanaa and run unrecognised government

Yemeni government: Exiled government in Aden led by eight-member Presidential Leadership Council

Southern Transitional Council: Faction in Yemeni government that seeks autonomy for the south

Habrish 'rebels': Tribal-backed forces feuding with STC over control of oil in government territory

THE BIO

BIO:
Born in RAK on December 9, 1983
Lives in Abu Dhabi with her family
She graduated from Emirates University in 2007 with a BA in architectural engineering
Her motto in life is her grandmother’s saying “That who created you will not have you get lost”
Her ambition is to spread UAE’s culture of love and acceptance through serving coffee, the country’s traditional coffee in particular.

The specs

Engine: 2.0-litre 4-cyl, 48V hybrid

Transmission: eight-speed automatic

Power: 325bhp

Torque: 450Nm

Price: Dh359,000

On sale: now 

Yahya Al Ghassani's bio

Date of birth: April 18, 1998

Playing position: Winger

Clubs: 2015-2017 – Al Ahli Dubai; March-June 2018 – Paris FC; August – Al Wahda

Apple%20Mac%20through%20the%20years
%3Cp%3E1984%20-%20Apple%20unveiled%20the%20Macintosh%20on%20January%2024%3Cbr%3E1985%20-%20Steve%20Jobs%20departed%20from%20Apple%20and%20established%20NeXT%3Cbr%3E1986%20-%20Apple%20introduced%20the%20Macintosh%20Plus%2C%20featuring%20enhanced%20memory%3Cbr%3E1987%20-%20Apple%20launched%20the%20Macintosh%20II%2C%20equipped%20with%20colour%20capabilities%3Cbr%3E1989%20-%20The%20widely%20acclaimed%20Macintosh%20SE%2F30%20made%20its%20debut%3Cbr%3E1994%20-%20Apple%20presented%20the%20Power%20Macintosh%3Cbr%3E1996%20-%20The%20Macintosh%20System%20Software%20OS%20underwent%20a%20rebranding%20as%20Mac%20OS%3Cbr%3E2001%20-%20Apple%20introduced%20Mac%20OS%20X%2C%20marrying%20Unix%20stability%20with%20a%20user-friendly%20interface%3Cbr%3E2006%20-%20Apple%20adopted%20Intel%20processors%20in%20MacBook%20Pro%20laptops%3Cbr%3E2008%20-%20Apple%20introduced%20the%20MacBook%20Air%2C%20a%20lightweight%20laptop%3Cbr%3E2012%20-%20Apple%20launched%20the%20MacBook%20Pro%20with%20a%20retina%20display%3Cbr%3E2016%20-%20The%20Mac%20operating%20system%20underwent%20rebranding%20as%20macOS%3Cbr%3E2020%20-%20Apple%20introduced%20the%20M1%20chip%20for%20Macs%2C%20combining%20high%20performance%20and%20energy%20efficiency%3Cbr%3E2022%20-%20The%20M2%20chip%20was%20announced%3Cbr%3E2023%20-The%20M3%20line-up%20of%20chip%20was%20announced%20to%20improve%20performance%20and%20add%20new%20capabilities%20for%20Mac.%3C%2Fp%3E%0A
Updated: January 12, 2023, 10:22 AM