IT security trends 2022: AI, Windows 11, ransomware

IT security trends 2022: AI, Windows 11, ransomware
Advertising

Share post

G DATA IT security trends 2022: Artificial intelligence makes cyber attacks more dangerous, multi-ransomware attacks use AI and Windows 11 offers another attack surface with integrated Android apps. 

Cyber ​​crime will continue to rise in 2022. Attackers consistently exploit every weak point. In order to achieve their goals, they rely on multi-ransomware attacks and use artificial intelligence with which they create better malicious code. The possible integration of Android apps in Windows 11 also offers criminals a new target.

Advertising

Cybercrime will continue to rise in 2022

The trend of increasing cyber crime will continue in 2022. Attackers target companies in particular in order to achieve maximum profit. They work in a division of labor and refine their methods. A trend in the coming years: the attackers are abusing legal tools for their own purposes, such as malware programming via Codex. An artificial intelligence that converts language into various programming languages ​​such as Python, JavaScript or PHP. Codex makes programming easier and faster and reduces errors in code. Malware authors, who can write malware faster and better in this way, now also benefit from this. At the same time, the attackers use new languages ​​for malware, such as Kotlin or Swift. New principles and features make cybercriminals' work easier.

"Criminals have to adapt their strategies because it is no longer enough to hide malicious code with packers from security software," says Karsten Hahn, malware analyst at G DATA CyberDefense. “Malicious code in new programming languages ​​is sometimes more difficult to analyze because there is no support from special analysis tools at the beginning. But it's only a matter of time. The well-known cat-and-mouse game between criminal hackers and defenders continues. "

Advertising

Subscribe to our newsletter now

Read the best news from B2B CYBER SECURITY once a month



By clicking on "Register" I agree to the processing and use of my data in accordance with the declaration of consent (please open for details). I can find more information in our Privacy Policy. After registering, you will first receive a confirmation email so that no other person can order something you don't want.
Expand for details on your consent
It goes without saying that we handle your personal data responsibly. If we collect personal data from you, we process it in compliance with the applicable data protection regulations. Detailed information can be found in our Privacy Policy. You can unsubscribe from the newsletter at any time. You will find a corresponding link in the newsletter. After you have unsubscribed, your data will be deleted as soon as possible. Recovery is not possible. If you would like to receive the newsletter again, simply order it again. Do the same if you want to use a different email address for your newsletter. If you would like to receive the newsletter offered on the website, we need an e-mail address from you as well as information that allows us to verify that you are the owner of the e-mail address provided and that you agree to receive the newsletter. Further data is not collected or only collected on a voluntary basis. We use newsletter service providers, which are described below, to process the newsletter.

CleverReach

This website uses CleverReach to send newsletters. The provider is CleverReach GmbH & Co. KG, Schafjückenweg 2, 26180 Rastede, Germany (hereinafter “CleverReach”). CleverReach is a service that can be used to organize and analyze the sending of newsletters. The data you enter for the purpose of subscribing to the newsletter (e.g. email address) will be stored on the CleverReach servers in Germany or Ireland. Our newsletters sent with CleverReach enable us to analyze the behavior of the newsletter recipients. This can include It is analyzed how many recipients have opened the newsletter message and how often which link in the newsletter was clicked. With the help of so-called conversion tracking, it can also be analyzed whether a previously defined action (e.g. purchase of a product on this website) took place after clicking on the link in the newsletter. Further information on data analysis by CleverReach newsletter is available at: https://www.cleverreach.com/de/funktionen/reporting-und-tracking/. The data processing takes place on the basis of your consent (Art. 6 Para. 1 lit. a DSGVO). You can revoke this consent at any time by unsubscribing from the newsletter. The legality of the data processing operations that have already taken place remains unaffected by the revocation. If you do not want an analysis by CleverReach, you must unsubscribe from the newsletter. For this purpose, we provide a corresponding link in every newsletter message. The data you have stored with us for the purpose of subscribing to the newsletter will be stored by us or the newsletter service provider until you unsubscribe from the newsletter and deleted from the newsletter distribution list after you have canceled the newsletter. Data stored by us for other purposes remain unaffected. After you have been removed from the newsletter distribution list, your e-mail address may be stored by us or the newsletter service provider in a blacklist if this is necessary to prevent future mailings. The data from the blacklist is only used for this purpose and is not merged with other data. This serves both your interest and our interest in complying with the legal requirements when sending newsletters (legitimate interest within the meaning of Art. 6 Para. 1 lit. f GDPR). Storage in the blacklist is not limited in time. You may object to the storage if your interests outweigh our legitimate interest. For more information, see the privacy policy of CleverReach at: https://www.cleverreach.com/de/datenschutz/.

Data processing

We have concluded a data processing agreement (DPA) for the use of the above-mentioned service. This is a contract mandated by data privacy laws that guarantees that they process personal data of our website visitors only based on our instructions and in compliance with the GDPR.

Ransomware on steroids

But it is not only new attack possibilities that threaten the networks in companies, organizations and municipalities, but also the further development of existing and profitable attack vectors. Therefore, more multi-ransomware attacks can be expected. The criminals combine several attack vectors: They derive data from the company, encrypt the data in the network and carry out a DDoS attack on the company's website.

They then blackmail not only the company, but also the customers and, if they fail to pay, threaten to publish personal data. In addition, attackers adjust their targets to increase the pressure on their victims. Therefore, in the future, they will no longer exclusively attack the infrastructure of a company, but also products that are networked with one another - from vehicles and game consoles to kitchen appliances or networked industrial systems. Another trend: Operators of critical infrastructures in particular are increasingly being targeted because they have a large and valuable treasure trove of data.

“The IT security level in companies is directly related to the entire IT level,” says Tim Berghoff, Security Evangelist at G DATA CyberDefense. “The more professional a company is, the higher the security here. Small and medium-sized companies have a lot of catching up to do. To do this, they have to free up their budget and either employ skilled staff or work with external service providers. "

Windows 11: Access through the Android back door

Windows 11 Pro for Business will also allow Android apps (Image: Microsoft).

With the possible integration of Android apps in Windows 11, Microsoft is not only opening up new possibilities for users, for example to play games on a large monitor instead of the smartphone screen in the future. There are also new ways for cybercriminals to attack Windows 11 computers and smuggle malicious code into systems.

Companies and IT administrators are also challenged here if a bring-your-own-device policy allows business-related use of private Android devices. At present, mobile malware developers still grapple with a number of practical problems, such as approval processes in app stores. However, mobile malware can be disguised as an update for a popular software package and infects smartphones because many people are careless and do not pay attention to warning messages. This in turn can make attacks on Windows 11 easier.

Medium-sized companies in the crosshairs

2021 has already shown that cyber criminals are increasingly attacking supply chains in order to infiltrate companies. This trend will not only continue but also intensify. Small and medium-sized companies in particular are coming into focus because they still do not pay the necessary attention to IT security. They are often the weakest link in the chain and offer attackers the gateway to infiltrate larger organizations.

More at GData.de

 


About G Data

With comprehensive cyber defense services, the inventor of the anti-virus enables companies to defend themselves against cybercrime. Over 500 employees ensure the digital security of companies and users. Made in Germany: With over 30 years of expertise in malware analysis, G DATA conducts research and software development exclusively in Germany. The highest standards of data protection are paramount. In 2011, G DATA issued a “no backdoor” guarantee with the “IT Security Made in Germany” seal of trust from TeleTrust eV. G DATA offers a portfolio from anti-virus and endpoint protection to penetration tests and incident response to forensic analyzes, security status checks and cyber awareness training to defend companies effectively. New technologies such as DeepRay use artificial intelligence to protect against malware. Service and support are part of the G DATA campus in Bochum. G DATA solutions are available in 90 countries and have received numerous awards.


 

Matching articles on the topic

Over 130.000 data breaches in Europe in 2024

In the 15 European nations, there were over 2024 data breaches every day in 365, according to the results of a recent analysis. In Germany ➡ Read more

DDoS attacks: the most important means of cyber warfare

In the second half of 2024, there were at least 8.911.312 DDoS attacks worldwide, according to the results of a recent DDoS Threat Intelligence Report. ➡ Read more

Cybercrime: Russian-speaking underground is leading

A new research report provides a comprehensive insight into the Russian-speaking cyber underground, an ecosystem that has fueled global cybercrime in recent ➡ Read more

IT resilience: cybersecurity at the storage level

More data security features for greater IT resilience at the storage level: Cyber ​​security managers can pursue a proactive data security approach at the storage level with highly secure NetApp storage and thus ➡ Read more

Oettinger Brewery attacked by ransomware

The APT group Ransomhouse claims to have successfully attacked the German brewery Oettinger with ransomware. On the APT group's leak page ➡ Read more

Cyber ​​Resilience Act: Companies should act now

The Cyber ​​Resilience Act (CRA) is coming in leaps and bounds. This means that manufacturers will soon no longer be able to ➡ Read more

Use of AI/ML tools increased by 3000 percent

AI/ML tools are popular, according to the findings of a recent threat report. However, their increased use also brings with it security risks. Cybercriminals ➡ Read more

Vishing: Criminals rely on voice phishing attacks

Using AI-generated deepfakes, cybercriminals imitate trusted voices. Vishing exploded in the second half of 2024, according to the results of a ➡ Read more