New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Cybersecurity

The rising threat of cyber criminals targeting cloud infrastructure in 2022

New York Tech Editorial Team by New York Tech Editorial Team
January 13, 2022
in Cybersecurity
0
How will the cybersecurity industry evolve in 2022?
Share on FacebookShare on Twitter

In the world of cybersecurity, combating threats is like playing endless, hyper-advanced, multidimensional Whack-A-Mole: new threats are always emerging, often from unexpected sources, and trying to keep up can feel impossible.

threats 2022

The threats are constantly shifting, subject to trends in cryptocurrency use, geopolitics, the pandemic, and many other things; for this reason, a clear sense of the landscape is essential. Below, you’ll find a quick guide to some of the most pressing threats of the coming year.

Linux and cloud infrastructure will continue to be a target

For threat actors, there is a simple calculus at play – namely, what method of attack is a) easiest and b) most likely to yield the biggest return? And the answer, at this moment, is Linux-based cloud infrastructure, which makes up 80%+ of the total cloud infrastructure. With cloud adoption increasing because of the pandemic, this has the potential to be a massive problem.

In just the last few months, ransomware gangs like BlackMatter, HelloKitty, and REvil have been observed targeting Linux via ESXi servers with ELF encryptors. And we have recently seen the PYSA ransomware gang adding Linux support. Meanwhile, experts are identifying new and increasing complex Linux malware families, which adds to the already-mounting list of concerns. Working pre-emptively against these threats is more essential than ever.

The next target of nation-state attackers? The security community

Over the last year, we’ve started to see nation-state hackers target vulnerability researchers, attempting to acquire their zero-days. These attacks were, thankfully, unsuccessful, but that is little cause for celebration. These attacks will undoubtedly continue into 2022 and potential targets parties must remain vigilant. Information, tools, and threat intel belonging to private sector security companies is of ever-increasing interest to cybercriminals. Accordingly, increased value will be placed on offensive research products, which will in turn become a bigger target for attackers.

Initial access brokerage and cryptojacking techniques will continue to be leveraged

Information is a crucial target, but the fact remains that many cloud attacks are purely financially motivated. As we enter 2022, we can expect a continuation of the two primary methods of monetization on the part of cybercriminals: cryptomining and initial access brokerage (IAB).

Each method comes with its own advantages and disadvantages. With cryptojacking and cryptomining, profit can be realised in real time – if an attacker can remain undetected in the cloud environment. On the IAB side, it may take longer for an attacker to achieve their desired profit. At the same time, IAB is a more risk-averse approach: it doesn’t matter how long their customer persists in the cloud environment. As long as cryptomining remains lucrative, crypto attacks will persist, as will the initial access brokers who can enable these activities.

Insider threats are poised to increase

The last year has seen a drastic uptick in hackers targeting individual employees. Often, these hackers will attempt to recruit these employees for insider efforts. Given the record number of resignations in the technology sector in 2021, which indicates high levels of employee dissatisfaction, internal defection is now more than ever a serious, increasing risk.

Hackers will continue to target software supply chains

Supply chain attacks are not as frequent as the ones outlined above, but they have the potential to cause more harm (look no further than the 2020 SolarWinds hack for proof). The “one-to-many” opportunity that a successful supply chain compromise affords makes it an attractive option, one more than worthy of attackers’ time and resources. For this reason, we believe 2022 will see more software supply chain attacks perpetrated by both criminal and nation-state actors.

No one can predict with perfect accuracy what disasters might loom on the horizon, but by studying the recent past we can prepare ourselves to defend against what’s most likely coming. 2022, in that sense, will be like any other year: cybercriminals will attempt to break through, while their would-be victims, deploying advanced technology and the best threat-analysis available, will attempt to stop them. Here’s to hoping the good guys win.

Credit: Source link

Previous Post

Autonomous Mobile Robots Market to Register Magnificent CAGR 23.7% by 2028; Omron Automation Americas Extends AMR Transport Solutions: Fortune Business Insights™

Next Post

China’s Startups Are Awash With Money as Beijing Shifts Focus to ‘Hard Tech’

New York Tech Editorial Team

New York Tech Editorial Team

New York Tech Media is a leading news publication that aims to provide the latest tech news, fintech, AI & robotics, cybersecurity, startups & leaders, venture capital, and much more!

Next Post
China’s Startups Are Awash With Money as Beijing Shifts Focus to ‘Hard Tech’

China’s Startups Are Awash With Money as Beijing Shifts Focus to ‘Hard Tech’

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
10 Raunchy Movies on Netflix You Won’t Regret Watching

10 Raunchy Movies on Netflix You Won’t Regret Watching

May 20, 2024
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
people talking to each other

New York Founders Are Underestimating the Compliance Debt of Their Low‑Tax Moves

March 15, 2026
PointFive

How Enterprises Can Cut Cloud Waste Across Snowflake, Databricks, and BigQuery With PointFive

March 11, 2026
Automat-it Vanta partnership

Automat-it And Vanta Partner To Transform Compliance Into A Growth Engine For AWS Startups

March 5, 2026
PointFive DeepWaste

DeepWaste AI Expands Cost Optimization to GPU Waste, Misconfigurations, and Provisioning Leakage

March 5, 2026
Reclaim Security team

Reclaim Security Raises $26M to Close the Remediation Gap With AI-Driven Automation

March 4, 2026
woman in green top posing beside a mirror wall

Inside the AI Shift: How Dolica Gopisetty Helps Enterprises Turn Hype into Real Transformation

February 25, 2026

Recommended

people talking to each other

New York Founders Are Underestimating the Compliance Debt of Their Low‑Tax Moves

March 15, 2026
PointFive

How Enterprises Can Cut Cloud Waste Across Snowflake, Databricks, and BigQuery With PointFive

March 11, 2026
Automat-it Vanta partnership

Automat-it And Vanta Partner To Transform Compliance Into A Growth Engine For AWS Startups

March 5, 2026
PointFive DeepWaste

DeepWaste AI Expands Cost Optimization to GPU Waste, Misconfigurations, and Provisioning Leakage

March 5, 2026

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

AI AI QSRs Allseated AWS B2B marketing Business CISO CISO Whisperer coding Collaborations Companies To Watch cryptocurrency Cybersecurity Entrepreneur Fetcherr Finance FINQ Fintech hi-tech Hi Auto Investing Investors investorsummit Israel israelitech Leaders LinkedIn Leaders Metaverse Mindset Minnesota omri hurwitz OurCrowd PointFive PR QSR Real Estate start- up startupnation Startups Startups On Demand startuptech Tech Tech leaders Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media