Check Point Software Technologies has released its cybersecurity predictions for 2023, detailing the key security challenges that organizations will face over the next year.
Cyberattacks across all industry sectors increased by 28% in the third quarter of 2022 compared to 2021, and Check Point predicts a continued sharp rise worldwide, driven by increases in ransomware exploits and in state-mobilized hacktivism driven by international conflicts. At the same time, organizations’ security teams will face growing pressure as the global cyber workforce gap of 3.4 million employees widens further, and Governments are expected to introduce new cyber-regulations to protect citizens against breaches.
In 2022 cyber criminals and state-linked threat actors continued to exploit organizations’ hybrid working practices, and the increase in these attacks is showing no signs of slowing as the Russia – Ukraine conflict continues to have a profound impact globally. Organizations need to consolidate and automate their security infrastructure to enable them to better monitor and manage their attack surfaces and prevent all types of threat with less complexity and less demand on staff resources.
Check Point’s cybersecurity predictions for 2023 fall into four categories: malware and phishing; hacktivism; emerging Government regulations; and security consolidation.
Hikes in malware and hacking exploits
- No respite from ransomware: this was the leading threat to organizations in the first half of 2022, and the ransomware ecosystem will continue to evolve and grow with smaller, more agile criminal groups forming to evade law enforcement.
- Compromising collaboration tools: while phishing attempts against business and personal email accounts are an everyday threat, in 2023 criminals will widen their aim to target business collaboration tools such as Slack, Teams, OneDrive and Google Drive with phishing exploits. These are a rich source of sensitive data given most organizations’ employees continue to often work remotely.
Hacktivism and deepfakes evolve
- State-mobilized hacktivism: in the past year, hacktivism has evolved from social groups with fluid agendas (such as Anonymous) to state-backed groups that are more organized, structured and sophisticated. Such groups have attacked targets in the US, Germany, Italy, Norway, Finland, Poland and Japan recently, and these ideological attacks will continue to grow in 2023.
- Weaponizing deepfakes: in October 2022, a deepfake of U.S. President Joe Biden singing ‘Baby Shark’ instead of the national anthem was circulated widely. Was this a joke, or an attempt to influence the important U.S. mid-term elections? Deepfakes technology will be increasingly used to target and manipulate opinions, or to trick employees into giving up access credentials.
Governments step up measures to protect citizens
- New laws around data breaches: the breach at Australian telco Optus has driven the country’s Government to introduce new data breach regulations that other telcos must follow, to protect customers against subsequent fraud. We will see other national Governments following this example in 2023, in addition to existing measures such as GDPR.
- New national cybercrime task forces: more Governments will follow Singapore’s example of setting up inter-agency task forces to counter ransomware and cybercrime, bringing businesses, state departments and law enforcement together to combat the growing threat to commerce and consumers. These efforts are partially a result of questions over whether the cyber-insurance sector can be relied upon as a safety net for cyber incidents.
- Mandating security and privacy by design: the automotive industry has already moved to introduce measures to protect the data of vehicle owners. This example will be followed in other areas of consumer goods that store and process data, holding manufacturers accountable for vulnerabilities in their products.
- Cutting complexity to reduce risks: the global cyber-skills gap grew by over 25% in 2022. Yet organizations have more complex, distributed networks and cloud deployments than ever before because of the pandemic. Security teams need to consolidate their IT and security infrastructures to improve their defences and reduce their workload, to help them stay ahead of threats. Over two-thirds of CISOs stated that working with fewer vendors’ solutions would increase their company’s security.
Predictions From Check Point Executives:
Mark Ostrowski, Office of the CTO, Check Point Software
“Deepfakes will go mainstream with hacktivists and cybercriminals leveraging video and voicemails for successful phishing and ransomware attacks.”
Maya Horowitz, VP of Research, Check Point Software
“We’re entering a new era of hacktivism, with increasing attacks motivated by political and social causes. Threat actors are becoming increasingly shameless and will turn their attention to critical infrastructure.”
Micki Boland, Office of the CTO, Check Point Software
“We will see a nation-state lead a sustained and lengthy attack against the USA’s power grid, leading to power disruptions impacting critical business and societal functions.”
Deryck Mitchelson, EMEA CISO, Check Point
“Cloud transformation will slow due to cost and complexity, with many firms considering bringing workloads back in-house or to private data centres to reduce their overall threat surface.”
Dan Wiley, Head of Threat Management, Check Point Software
“The cyber insurance industry is undergoing major tectonic shifts. Companies will most likely not be able to rely on insurance as a safety net for cyber incidents. Like we’ve seen with the auto industry, policymakers will act to protect their constituents with legislation holding makers accountable for software defects that create cyber vulnerabilities. In turn, this will put the onus on software vendors to build in security validations.”
Sundar Balasubramanian, Managing Director, India & SAARC, Check Point Software
“With the commercial availability of 5G we expect to see the number, scale and sophistication of these cyberattacks within the telco space increase overtime where the weekly impacted organisations by malware types was 4.8% via mobile (versus global average of 1.7%l). While there is an increased level of preparedness and awareness from a policy and strategy perspective in the country, the skills shortage within the cyber security industry could also pose a significant challenge to the country leaving gaps within the security posture of organisations.”
Jeremy Fuchs, Research Analyst, Avanan, a Check Point company
“While email and phishing go hand-in-hand and will still be dangerous and proliferate, in 2023 cyber criminals will also turn to business collaboration compromise, with phishing attacks used to access Slack, Teams, OneDrive, Google Drive, etc. Employees are often loose with sharing data and personal information while using these business apps, making them a lucrative source of data for hackers.”
Jony Fischbein, CISO, Check Point Software
“In our multi-hybrid environment, many CISOs struggle to build a comprehensive security program with multiple vendors. In 2023, CISOs will decrease the number of security solutions deployed in favor of a comprehensive, single solution to reduce complexity.” W
Oded Vanunu, Head of Products Vulnerability Research, Check Point Software
“Dramatic increase of digital scams, due to a global economic slowdown and inflation. Cyber criminals will increasingly turn to social media campaigns via Telegram, WhatsApp and other popular messaging apps. There will also be more cyber-attacks on Web3 blockchain platforms, mainly to overtake platforms and their users’ crypto assets.”