Cybercrime Trends 2024
Cybercrime Trends 2024
Cybercrime Trends 2024
Trends 2024
The latest threats and security best practices
Cybercrime Trends 2024 2
Contents
Introduction 3
The year 2023 was a turning point in our global narrative. Since OpenAI
announced the launch of ChatGPT-3 in November 2022, there has
been a surge of AI-driven innovation and a profound shift in how
we interact with technology. This evolution is particularly evident
in information security, where AI has emerged as a pivotal force, not
only strengthening cyber security defenses but also elevating the
sophistication of cyberattacks.
1
Statista (2023). Artificial Intelligence Worldwide.
2
News abp Live (2023). Deepfakes To Disinformation: Year 2023 Brought A New Era Of Digital Deception, Driven By AI.
3
McAfee (2023). Artificial Imposters—Cybercriminals Turn to AI Voice Cloning for a New Breed of Scam.
4
Fox 13 Seattle (2023). Everett Police warn of AI voice-cloning phone scam after case reported in Snohomish County.
5
CNN (2023). ‘Mom, these bad men have me’: She believes scammers cloned her daughter’s voice in a fake kidnapping.
6
The Wall Street Journal (2023). I Cloned Myself With AI. She Fooled My Bank and My Family.
AI’s growing role in cyberattacks: A storm on the horizon 5
But this is far from the only use cybercriminals are Recently, OpenAI introduced the ability to very easily
putting AI to. Advances in generative AI over the create a GPT – a chatbot that you can train to assist
past year have brought many new capabilities to you with a specific task in an even more accessible
key tools. Some of these, such as ChatGPT’s recent way than its dark web counterparts – without any
ability to read images, can be used maliciously. This coding or technical knowledge needed. While
includes the possibility of prompt injection, which personalized GPTs can be a valuable asset for many,
means that the tool will follow the instructions helping them with daily work tasks, we can also
or prompts contained in an image instead of the expect that in 2024, attackers will take advantage
instructions the user gave the tool when submitting of their capabilities and create personal hacking
the image.7 While this may seem harmless at first, assistants10 that specialize in creating highly
the possibilities for manipulating users through this convincing smishing texts, spear phishing emails,
tactic are endless. and polymorphic malware.11
7
Windows Central (2023). CGPT-4 Vision: A breakthrough in
image deciphering unveils potential for ‘prompt injection
attacks’.
8
Digital Trends (2023). Bing Chat just beat a security check to
stop hackers and spammers.
9
ZDNet (2023). WormGPT: What to know about ChatGPT’s
malicious cousin.
10
BBC (2023). ChatGPT tool could be abused by scammers and
hackers.
11
HYAS (2023). Blackmamba: Using AI to generate polymorphic
malware.
AI’s growing role in cyberattacks: A storm on the horizon 6
12
GitHub Blog (2023). Survey reveals AI’s impact on the
developer experience.
13
The Register (2023). Perhaps AI is going to take away coding
jobs – of those who trust this tech too much.
14
Nord Security (2023). ChatGPT and secure coding: The good,
the bad, and the dangerous.
15
Infosecurity Magazine (2023). New ChatGPT Attack
Technique Spreads Malicious Packages.
AI’s growing role in cyberattacks: A storm on the horizon 7
Even if it’s the innovation of the century, cybercrim And now, the same fate awaits emerging tech
inals aren’t just focusing on artificial intelligence. nologies like quantum computing. A critical
They’re broadening their horizons to exploit a range concept is “harvest now, decrypt later” (HNDL),
of emerging technologies. The goal is to widen where cybercriminals accumulate encrypted data
the attack surface and reach as much as possible. today with the expectation that future advances
That’s why each new technology becomes both a in quantum computing will allow them to decrypt
tool and a target for sophisticated cyber threats. it, potentially leading to unprecedented privacy
breaches, intellectual property theft, and exposure
However, this trend isn’t entirely new, as we’ve seen of national security secrets.3
a similar pattern in the past with other emerging
technologies like cloud technology. In recent years,
companies have shifted billions of dollars to cloud
storage and away from traditional data solutions.
And, of course, this transition hasn’t gone unnoticed
by cybercriminals. According to the CrowdStrike
Global Threat Report, attacks targeting cloud sys
tems nearly doubled in 2022, and the number of
hacking groups capable of launching such attacks
has tripled.1
1
CrowdStrike (2023). Global Threat Report.
2
Infosecurity Magazine (2023). Ransomware attack wipes out
Sri Lankan government data.
3
Tech Monitor (2023). Are harvest now, decrypt later
cyberattacks actually happening?
Beyond AI: All new technologies are being exploited by cybercriminals 9
Recognizing this issue, the UK’s National Cyber complex network design and local 5G deployments;
Security Centre wrote a white paper as early as supply chain threats from malicious hardware
2020 with advice on how to transition to quantum- and software; inherited weaknesses from legacy
resistant algorithms and the importance of starting infrastructure and untrusted components; limited
this process early to ensure security against market competition leading to reliance on potentially
potential quantum computing threats. However, the
4
insecure proprietary solutions; and an expanded
uncertainty surrounding the timeline for quantum attack surface introducing new vulnerabilities and
computing breakthroughs creates a complex risk increased risk of data breaches.5
landscape where organizations are balancing the
cost of adopting quantum-resistant measures early All these advances underscore a critical point:
against the risk of being unprepared for a sudden As these and other new technologies continue
advance in quantum computing capabilities. to evolve, so do the methods and targets of
cybercriminals. It’s a constant race, with each new
5G technology is another example of how new tech technological development providing a new op
nologies can be a double-edged sword, promising portunity for exploitation. As a result, cyber security
unprecedented connectivity and speed but also strategies must be agile and adaptive, evolving with
opening up new avenues for cybercriminals to these technological advances to mitigate the risks
exploit. The U.S. Cybersecurity and Infrastructure posed by these threats.
Security Agency (CISA) identifies the following risks
associated with 5G: increased vulnerabilities due to
4
National Cyber Security Centre (2020). Preparing for quantum-safe cryptography.
5
CISA (2023). 5G Security and Resilience.
Beyond AI: All new technologies are being exploited by cybercriminals 10
1
Black Kite (2023). Ransomware threat landscape report.
2
Gulf Business (2023). Cybersecurity 2023: Threats
proliferate but best practice still works.
3
Mashable (2023). An entire state’s population just had its
data stolen by a ransomware group.
4
TechCrunch (2023). MGM Resorts confirms hackers stole
customers’ personal data during cyberattack.
Cybercrime will transform into an even more highly professionalized and profitable business 12
“
On average, it takes about 23 days
to resume basic operations after
a devastating ransomware attack.
Restoring the entire system to full
The professionalization of cybercrime extends
beyond RaaS to emerging technologies like voice
cloning. Voice-cloning-as-a-service (VCaaS) has
become a significant threat, as we saw with the AI
trend, allowing even low-skilled cybercriminals to
engage in sophisticated impersonation schemes.7
With platforms like ElevenLabs allowing users to
functionality can take months. create custom voice samples, the barrier to entry in
cybercrime continues to drop.
5
TechCrunch (2023). Why extortion is the new ransomware threat.
6
Bloomberg (2021). Apple targeted in $50 million ransomware hack of supplier Quanta.
7
Recorded Future (2023). I have no mouth, and I must do crime.
8
The Register (2023). Airbus suffers data leak turbulence to cybercrooks’ delight.
Cybercrime will transform into an even more highly professionalized and profitable business 13
INTERVIEW
Ralf
Schneider
Allianz Senior Fellow and Head of Cyber Security
and NextGenIT Think Tank
Ralf Schneider’s impressive career in IT and cyber security spans more than
two decades, marked by his long tenure at Allianz, where he served as Group
CIO for 13 years. He has also served as a board member for Allianz Managed
Operations & Services and recently took on the role of Allianz Senior Fellow
and Head of Cybersecurity and NextGenIT Think Tank. He holds a PhD in
computer science from the Ludwig Maximilian University in Munich.
“
Criminals need ever fewer skills and organizational
power to launch a highly effective attack, and that
is going to be a huge problem for us.
What brought you to the field of information to be secure. There was no question that cyber
security? security would become a major topic for us.
I started out in this field when I was appointed When the Snowden disclosures came out in 2013
Group CIO of Allianz in January 2011. With 3,000 and Mrs. Merkel’s cell phone was hacked, we saw
offices and 63 business units around the world, I that cyber security was increasingly becoming a
quickly learned that we needed a communication hot-button issue. In addition to the infrastructure
infrastructure that included video conferences. network, data center, and virtualized workspace,
We had to build our IT such that we could access IT we established the Cyber Security Infrastructure,
resources with any device worldwide. To do this, Global Identity and Access Management, Global
you need a network infrastructure, a consolidated Privilege Access Management, and the Allianz
data center so that the applications work globally, Cyber Defense Center on a global scale in 2013.
and a virtualized end workspace – all of which have
Interview: Ralf Schneider, Allianz SE 15
How do you assess the current threat for the worst-case scenario. Right now, we’re
landscape, and how will it develop in the benefiting from the fact that this big scaling hasn’t
coming years? happened yet. With each attack – successful or
otherwise – we learn and are able to improve our
Since the war in Ukraine began, it became clear to
line of defense. But the risk isn’t just in the quantity
us that we’re in the midst of a cyber war. In cyber
but also in the concurrence that AI allows. Such
security, we’re facing state, military, and highly
simultaneous scaling attacks will become the
sophisticated criminal actors. Cybercriminals are
challenge in the future.
constantly honing their skills and becoming more
organized. On top of that, they’re turning the
industrialization of cyberattacks into criminal big
How do you feel we can keep pace with the
business.
rapid developments in the threat landscape?
Then there’s a third component. Cyber security
In short, proper cyber hygiene and keeping an eye
tends to go through cycles. DDoS was a core issue
on the latest threats. Cyber hygiene has to be
in 2013 before disappearing, and now it’s back
established from the ground up, which is a major
again. We need to expect the focus to return to
challenge. I don’t think there’s a way around multi-
activists and hacking kits, including those powered
factor authentication. Before you drive off in your
by AI. Criminals need ever fewer skills and organi
car, you have to buckle up. Before you start surfing
zational power to launch a highly effective attack,
the web, you have to undergo multi-factor authen
and that is going to be a huge problem for us.
tication. At Allianz, we implemented multi-factor
Instead of focusing on just a few groups, we’re
authentication during the coronavirus pandemic
looking at hundreds, if not thousands.
because of the prevalence of remote work.
The fact that the gap between rich and poor is
And the most important way to keep up with the
growing makes the situation even more grave. You
speed at which threats are developing is working
don’t have to be a professional athlete to earn a lot
well and comprehensively from the very start and
of money these days. You can also become a hacker.
then staying on the market. We’re currently renew
The good thing is that we’re always getting better
ing our Cyber Defense Platform and augment it
at defending ourselves.
with AI. Now, the big task is integrating it and using
it in the wild, but that’s where we’re investing.
Ultimately, it all comes down to the human factor –
You mentioned the spike in generative AI. Do
finding the right people and giving them the op
you think that technology like deep fakes
portunity to learn independently. If you don’t have
and voice cloning will turn into a mass
any capabilities or awareness in your company, all
problem?
“
the technology in the world will only take you so far.
Voice cloning and similar methods are very big
right now, but I think there’s another risk to them
as well. It’s no longer about finding a security flaw
or identifying an individual as a weak point. It’s Ultimately, it all comes down to the
about the response, meaning the disabling and
human factor. Finding the right people
circumvention of detection tools. That’s where
there will be a big increase in the use of AI.
and giving them the opportunity to
learn independently. If you don’t have
Besides AI augmented sophisticated attacks, I
any capabilities or awareness in your
don’t see any major dangers of automatic AI based
attacks right now because AI still makes too many
company, all the technology in the
mistakes, and it has to be used properly. But we’re world will only take you so far.
still in the early stages, and we should be preparing
Interview: Ralf Schneider, Allianz SE 16
Another cybercrime trend is digitalization, IT systems are built and operated by people, so
and everything is becoming more you have to know the people and their awareness
“
interconnected. What risks do you see of secure IT.
here regarding cyber security?
IT teams are under all sorts of pressure Attacks – that we grade with a color system of red,
regarding both defense and security orange, yellow, light green, and green so that we
awareness training. What do you think could can visibly evaluate the success of our measures.
be potential measures for taking some of Just like blood pressure, pulse, and cholesterol
the onus off of IT teams? levels, our eight health indicators have to fall within
a certain range.
We have to ask where the problems truly lie –
conducting crisis drills at every level, up to top-level Two of these indicators have proven particularly
management and the board. We’ve been regularly effective. One is our zero tolerance against toxic
doing that at Allianz for years. Various psychological components, where security patches are not avail
factors play a role here, starting with the fact that able anymore. This led to us tracking down all our
people don’t like to show that they are unable to outdated, insufficiently protected applications. We
do something. Secondly, the benefits of the time also started automating, analyzing all obsolete
they have invested have to be clear from the start databases and operating systems, identifying toxic
and manifest quickly. After all, awareness training components, and systematically renewing our
costs money and resources. entire IT system. The zero-tolerance component
was implemented for security reasons, but it goes
One of the core challenges lies in making the
far beyond that. The second effective indicator is
urgency of cyber security palpable and tangible for
our Awareness Score, which we use to measure
top-level management in all business units. When
global phishing campaigns. We log click rates and
it comes to business goals, IT has to be functional
how many people report a harmful email.
and secure at the same time. Unless something
gravely serious happens, it’s hard to tell whether
the measures you’ve implemented have made you
In a past interview, you said that hierarchical
more secure than before. Proving the efficacy and
structures in companies can impair cyber
removing distrust is very difficult because you
security. What do you mean by that?
can’t prove that you’re more secure than before –
a very convincing way is attack simulations that External attacks conducted with tools can only be
have to show that you are getting faster, more prevented with experts who have the tools to
efficient, and more effective at defending your match. Security experts have to decide what needs
organization. to be done. The executive level has to have an eye
on everything and provide resources, initiatives
and support at the right time. Yet this is done “on
Do you think there are KPIs that might be site,” so autonomy is required as well. Management
more convincing for top-level management? lays the groundwork, provides the resources for
effective cyber defense, and brings security experts
At Allianz, we have six cyber security health indica
together with internal and external partners.
tors based on the NIST standard – Govern, Identify,
Prevent, Detect, Response, Recover against Cyber
“
Security experts have to decide what needs to be
done. The executive level has to have an eye on
everything and provide resources, initiatives and
support at the right time.
Cybercrime Trends 2024 18
The intricate threat landscape extends beyond example of this is the attack by the Ukrainian group
individuals pursuing financial or personal gain. Cyber.Anarchy.Squad against Infotel JSC, a critical
Escalating political and social tensions are fueling Russian telecom provider that is integral to the
the rise of another significant faction in the digital functioning of major Russian banks and financial
sphere: hacktivists. Motivated by a desire to express institutions.3 This attack had a significant impact,
dissent or support for causes like armed conflicts or disrupting many Russian banking systems and
social injustices, these individuals exploit vulner preventing them from processing online payments
abilities and security loopholes to make their for several hours.
statements – a situation that is intensifying with
each passing month. The more recent conflict between Israel and Gaza
also highlights the escalation and further implica
According to the latest Motorola report, hacktivism tions of this threat. Shortly after the conflict
increased 27% in the third quarter of 2023. A stark1
started, Anonymous Sudan carried out their first
example of this trend is the pro-Russian hacktivist cyberattack, targeting Israel’s emergency warning
initiative DDoSia. They are known for orchestrating systems and claiming to disable alert applications
attacks against Western entities, which experienced that notify civilians of incoming rockets.4
a dramatic surge in participation in 2023, with its
membership skyrocketing by 2,400% and amassing
45,000 subscribers on their main Telegram channel.2
1
Motorola Solutions (2023). New Report Outlines Q3 2023
Cyber Threats to Public Safety.
2
Bleeping Computer (2023). Pro-Russia DDoSia hacktivist
project sees 2,400% membership increase.
3
Bleeping Computer (2023). Ukrainian hackers take down
service provider for Russian banks.
4
Security Week (2023). Hackers Join In on Israel-Hamas War
With Disruptive Cyberattacks.
Digital dissent and deception: The dual faces of hacktivism and cybercrime in a fragmented world 19
5
CSO (2023). Israel-Hamas conflict extends to cyberspace.
6
Bleeping Computer (2023). Scandinavian Airlines says cyberattack caused passenger data leak.
7
The Cyber Express (2023). Cyber Attack on French National Police: VulzSec Hacking Group Claims to Leak Sensitive Data.
8
Motorola Solutions (2023). New Report Outlines Q3 2023 Cyber Threats to Public Safety.
9
InfoSecurity Magazine (2023). Cyber-Criminals Exploit Gaza Crisis With Fake Charity.
10
Cyberscoop (2023). Shadowy hacking group targeting Israel shows outsized capabilities.
Digital dissent and deception: The dual faces of hacktivism and cybercrime in a fragmented world 20
5 Disinformation-as-a-service:
An extremely potent tool in the
arsenal of hackers
1
The New York Times (2021). Disinformation for Hire, a Shadow Industry, Is Quietly Booming.
2
The Guardian (2023). Disinformation reimagined: how AI could erode democracy in the 2024 US elections.
3
Wired (2023). Slovakia’s Election Deepfakes Show AI Is a Danger to Democracy.
Disinformation-as-a-service: An extremely potent tool in the arsenal of hackers 23
In this context, disinformation-as-a-service (DaaS) reputation of a corporation. This was evident in the
represents a significant shift in the scale and case of Wayfair, where conspiracy theorists linked
sophistication of misinformation efforts. This new to QAnon exploited the chaos of the pandemic to
model of information warfare enables individuals tarnish the retailer’s reputation.7 Using platforms
and organizations to purchase and disseminate fake like Twitter, Instagram, and Reddit, they spread
news and misinformation campaigns with unprece false claims that Wayfair was involved in child
dented ease. Powered by the rapid advancement of sex trafficking. Despite the company’s efforts to
generative AI and a network of professional trolls, refute these allegations, the lies persisted online,
bots, and sophisticated online manipulation tools , 4
demonstrating the significant reputational risks
DaaS has democratized the ability to conduct that companies face from such disinformation.
misinformation campaigns in the same way that
RaaS has done with ransomware attacks – a CEOs are also prime targets for deepfakes because
revolution that cybercriminals and hacktivists will maintaining a public profile is part of their job.
undoubtedly exploit. Since they regularly speak on earnings calls, at
shareholder meetings, and in television interviews,
This means that 2024 will experience a surge in both it’s not hard for cybercriminals to obtain audio and
politically and financially motivated disinformation video clips of them. And, we’ve already seen in the AI
campaigns that will likely target a wide range of trend what they can do with this material.
sectors, including healthcare, finance, technology,
education, and media. On the one hand, hacktivists With the escalation of disinformation campaigns
and state-sponsored cybercriminals will continue to threatening the global information landscape, orga
destabilize governments and political organizations nizations are becoming increasingly aware of the
with misinformation to influence public opinion and risks they pose, including significant financial losses
gain more support for their causes. An example of and long-term reputational damage. Therefore,
this happened in 2023 with the spread of a deepfake as these tactics become more sophisticated and
image showing Atlético de Madrid supporters ubiquitous, organizations will need to develop
displaying a Palestinian flag, a misleading narrative robust countermeasures to protect their integrity
that gained significant traction online. Some of 5
and maintain public trust.
these attacks will have even wider economic impli
cations to the extent of even influencing the stock
market. This already happened in May 2023, when a
fake image of an explosion near the Pentagon was
widely shared on social media and disseminated by
various media outlets, including the Russian state
news agency RT, causing a brief market sell-off as
fear spread.6
1
IBM (2023). Cost of a Data Breach 2023.
2
Microsoft (2022). Digital Defense Report 2022.
3
IBM (2023). Cost of a Data Breach 2023.
4
BBC (2023). Schools hit by cyber attack and documents leaked.
5
The Record (2023). Aix-Marseille, France’s largest university, hit by cyberattack.
6
The Record (2023). Cyberattack on German university takes ‘entire IT infrastructure’ offline.
7
The Record (2023). Cyberattack disrupts Greek national high school exams.
2024: A year of security challenges for the public sector 26
and critical infrastructure
8
BBC (2023). Kenya cyber-attack: Why is eCitizen down?
9
ENISA (2023). ENISA Threat Landscape: Health Sector.
10
AP News (2023). Cyberattack hits major hospital in Spanish
city of Barcelona.
2024: A year of security challenges for the public sector and critical infrastructure 27
These attacks on healthcare organizations have outdated technology, and understaffed teams.
been on the rise across Europe this past year. Public organizations often do not have the resources
In December 2023, the German hospital network to implement sufficient preventative security mea
Katholische Hospitalvereinigung Ostwestfalen (KHO) sures. For example, according to the ENISA report’s
was hit by ransomware, causing disruptions at three findings, only 27% of healthcare organizations have
hospitals. Earlier in the year, a hospital in Brussels
11
a dedicated ransomware defense program, and 40%
was hit by a cyberattack that forced it to divert do not have a security awareness program for non-
ambulances to other hospitals. In this case, the
12
IT staff.13 To address this, it is essential to implement
hospital’s IT operations were fully functional one day preventative measures – such as security audits
after the attack, thanks to the emergency plan the and a Zero Trust Architecture – and build a security
hospital had put in place before the attack. This shows culture through personalized awareness training
the importance of prevention and rapid response that meets the needs of each organization. This
to these scenarios. is critical not only for their protection but for the
security of everyone because these organizations
Unfortunately, recovering quickly from cyberat serve and belong to the public.
tacks is not common but a challenge for public
sector entities, largely due to insufficient budgets,
11
Security Affairs (2023). Lockbit ransomware attack interrupted medical emergencies gang at a German hospital network.
12
The Record (2023). Hospital in Brussels latest victim in spate of European healthcare cyberattacks.
13
ENISA (2023). ENISA Threat Landscape: Health Sector.
2024: A year of security challenges for the public sector and critical infrastructure 28
INTERVIEW
John
Noble
Non-executive director and chair of the
Cyber Security Committee of NHS in England
John Noble was the Director of Incident Management at the National Cyber
Security Centre (NCSC) in the UK from 2016 to 2018, where he led responses
to nearly 800 significant cyber incidents, contributing to the objective of
making the UK the safest place for online business. He is currently a non-
executive director at NHS Digital (National Health Service), where he chairs
the Information Assurance and Cyber Security Committee.
“
By sharing information between governments
and fostering collaboration between the private
sector and the government, we can better
understand emerging threats.
What is the National Cyber Security Center Why did you decide to make NCSC part of
(NCSC) and what is its main goal? the GCHQ intelligence agency?
The decision to create the NCSC stemmed from a The decision to make NCSC part of the Government
political judgment by then-Prime Minister Gordon Communications Headquarters (GCHQ) intelligence
Brown. Recognizing the nation’s move towards a agency was strategic. GCHQ’s expertise in network
digital society built on the inherently insecure inter defense and established cyber security agency
net, the government saw the need for an agency to made it the ideal host for the NCSC.
provide advice and assistance.
Interview: John Noble, NHS England 30
Why is it important to have collaboration What are some key themes you’ve observed
between the public and private sectors in in the threat landscape over the past
cyber security efforts? decades?
Both the government and the private sector hold The threat landscape, particularly cybercrime, has
unique strengths in cyber security, so NCSC significantly changed over the past decades. One
analyzes how the government can provide means prominent aspect is the explosive growth of
for collaboration between the two. This led to the ransomware, turning it into a sophisticated and
creation of two initiatives: the Cyber Information specialized ecosystem. Cybercriminal groups like
Sharing Partnership (CISP), which allows companies Conti now exhibit business-like structures and
to exchange cyber threat information anonymously hierarchies with distinct departments and job
in real-time, and the Cyber 100, an initiative through titles. Authorities may stop some of these
which experts from the private sector are brought organizations, but they learn the lesson, reform,
in to share their knowledge with NCSC. and adapt.
There’s skepticism by organizations to share There has been an increasing trend where
their vulnerabilities with public entities cybercriminals infiltrate systems and do
because they fear that this information will nothing. How can we explain this?
be used against them. How can we convey
When a vulnerability is exposed, bad actors infiltrate
the message of the government wanting to
and put down an implant across many different
support and not damage organizations?
companies. They do this just so they can return later.
Here, the concept of trust and openness is crucial. This is the case with critical infrastructure, where it
If an intelligence agency finds a vulnerability in a is important to patch vulnerabilities quickly.
piece of software and does not disclose it, cyber
criminals can take advantage of it. Agencies like
NCSC need to build trust with companies to be able Addressing vulnerabilities can be especially
to share evidence of these vulnerabilities. This can challenging in the public sector because
result in some very profitable and important organizations run 24-hour operations. Can
relationships with companies. you share insights into the NHS’s approach
to addressing this issue?
I also think there has been a mind shift in govern
ment towards putting the protection of our digital The NHS has learned significant lessons from
economy – and digital companies – as the top incidents like WannaCry, which exploited a known
priority. People need to understand that protecting vulnerability many hospital trusts had not ad
our digital economy must mean sharing information dressed. This incident impacted hospitals not only
with governments. financially but also affected patient care.
Interview: John Noble, NHS England 31
In response to vulnerabilities in healthcare systems, cause, carrying out DDoS attacks and being very
two key strategies have been implemented. The explicit that they want to attack the countries that
first one is to clearly identify critical vulnerabilities are supporting Ukraine.
“
that are actively being exploited and require urgent
patching. The second one is to set clear mandatory
standards that organizations need to commit to.
You mentioned other nations when we What steps can be taken to mitigate cyber
talked about Russia. What are other key threats, particularly those posed by
players in the cyber threat landscape? advanced persistent threats (APT)?
When we look at some of the really important By sharing information at an international level
strategic issues, we need to talk about China’s between governments and fostering collaboration
growing influence, the tensions in the South China between the private sector and the government,
Sea, and its attitude towards Taiwan and its other we can create a more comprehensive under
neighbors like the Philippines. China’s cyber capa standing of emerging threats. By sharing indicators
bilities have witnessed significant growth, marked of compromise (IOCs) and building a trust
by increased sophistication and the utilization of relationship between both sectors, we can over
new zero-day attacks. They have reformed their come commercial sensitivities. We can establish a
intelligence organizations to avoid conflict, and united front to detect and respond to emerging
they have become much more professional. The threats efficiently.
Chinese have also widened their areas of interest.
They always take a long-term view where they build
up capabilities over time.
Listen here
Cybercrime Trends 2024 33
Sophisticated social engineering methods like pre details that help them create highly convincing and
texting – where hackers impersonate someone tailored stories that the victim will trust.
the victim trusts and use a fake story to make them
fall for the scam – are increasingly being used by However, the channels through which cyber
cybercriminals to exploit and manipulate victims for criminals find this data are not only sources of
financial gain or sensitive data theft. In fact, according information but also attack vectors. According
to a 2023 report by Verizon, pretexting attacks to our Human Risk Review 2023, email phishing
account for more than 50% of all social engineering continues to dominate, with a significant 61% of
incidents, showing how attackers continue to rely organizations targeted. However, the cyber threat
heavily on deception and manipulation, always capi landscape is expanding, with 34% of attacks now
talizing on human emotions.1 using social media.3 For example, with so many small
businesses relying on social media as their primary
In the most sophisticated form of pretexting, cyber source of customers, hackers are seizing the
criminals research the victim through multiple opportunity to take over their accounts and bring
channels, such as social media, blogs, or websites, businesses to their knees. This is what happened
to gain insight into very specific data about the victim to a small business that sold granola through
that they can later use in their fabricated story to Instagram.4 Attackers contacted the owner through
make it more believable and increase their success Instagram, impersonating another business the
rate.2 This can include information about their victim trusted, and asked her to click on a link to vote
workplace, social life, pets, partners, or other personal for the business in a contest. The bad actors then
took over her Instagram account and demanded
$10,000, which she paid in order to regain control of
her business. But this is just one use. Cybercriminals
can use social media to target organizations in many
ways, including taking over employee accounts to
talk to colleagues and solicit sensitive information
or making them download malicious attachments
disguised as legitimate business documents.
1
Verizon (2023). Data Breach Investigation Report.
2
The Wall Street Journal (2021). What Hackers Can Learn
About You From Your Social-Media Profile.
3
SoSafe (2023). Human Risk Review.
4
CNBC (2023). Phishing scams targeting small business on
social media including Meta are a ‘gold mine’ for criminals.
Cyberattacks are becoming more realistic and dangerous due to pretexting and multichannel tactics 34
Messaging apps like WhatsApp and Microsoft by attackers who sent her an SMS asking if she had
Teams are also some of hackers’ favorite channels, authorized a $7,500 transfer.7 Shortly thereafter, the
both in our private and professional lives. Recently, attacker took advantage of her fear and called her,
the Kolkata Police in India warned of a series of posing as a fraud investigator, asking her to change
WhatsApp attacks where hackers used the pretext her credentials to prevent a scammer from stealing
of the World Yoga Day to send out messages her money. The attacker ended up stealing $15,000
offering yoga classes and asking people to click on from both of her bank accounts.
a link and then share a six-digit OTP code, which
inadvertently gave the attackers access to the These multichannel attacks become even more
victim’s WhatsApp account.5 After taking over their convincing and effective when they use AI
account, they sent messages to their contacts, technology. A stark example of this happened to an
creating a sense of urgency and asking for money. In employee of Retool.8 First, the attackers sent a text
another attack using the professional app Microsoft message to the victim pretending to be the IT team
Teams, attackers sent messages to their victims solving a payroll issue. The employee then introduced
pretending to be part of the HR team and saying that their credentials on a fake landing page. Since the
their vacation schedule had changed. The attacker
6
employee had enabled MFA, the cybercriminals had
urged the victim to download a file containing the to call the victim using an AI-generated cloned voice
vacation schedule, which instead loaded a malware from an IT team member and ask for the OTP token
called DarkGate. to bypass it. From there, the attackers were able to
take over the accounts of 27 customers and steal
But cybercriminals haven’t stopped there. They thousands of dollars worth of cryptocurrency.
are constantly evolving their tactics to make
their attacks more convincing. And they are now With cybercriminals stepping up their game with
also orchestrating highly sophisticated attacks highly sophisticated and professional tactics, we
where they contact their victim through multiple must be extra cautious and make sure that secure
channels, such as SMS, email, or phone calls. For behavior is ingrained in our DNA.
example, in one case where attackers combined
SMS and voice phishing, a woman was scammed
5
The Times of India (2023). Police warns netizens about WhatsApp hacking, here’s how fraudsters hack accounts.
6
Decipher (2023). Threat actors deliver DarkGate malware via Skype, Teams Chats.
7
The Guardian (2023). Gone in seconds: rising text message scams are draining US bank accounts.
8
The Hackers News (2023). Retool Falls Victim to SMS-Based Phishing Attack Affecting 27 Cloud Clients.
Cyberattacks are becoming more realistic and dangerous due to pretexting and multichannel tactics 35
We addressed the issue of security team burnout threats and significantly increasing the risk of
last year, but the recent global tensions and security breaches in their organizations. This risk
continued professionalization of cybercrime, now is compounded by the fact that cybercriminals are
fueled by AI-powered tools, are not only making constantly evolving their techniques and becoming
attacks more complex and difficult to detect but more sophisticated in their attacks, as we have
also putting unprecedented pressure on security already seen in the past sections.
professionals. In this relentless wave of challenges,
our teams’ resilience and adaptability are being
Have you ever been prescribed medication
tested like never before.
by a doctor for mental health?
1
ISC2 (2023). How the Economy, Skills Gap and Artificial Intelligence are Challenging the Global Cybersecurity Workforce.
2
ISACA (2023). New ISACA Research: 59 Percent of Cybersecurity Teams are Understaffed.
3
Tines (2022). State of Mental Health in Cybersecurity.
37
“
The number one challenge in
the cyber security industry right
now is burnout: There’s too much
data, too many cases, and not
enough time.
Stéphane Duguin
CEO of the CyberPeace Institute
4
The Hacker News (2022). Hackers Planted Secret Backdoor in
Dozens of WordPress Plugins and Themes.
5
SoSafe (2023). Human Risk Review.
Rising burnout rates challenge cyber security teams like never before 38
All of this year’s trends have made one thing clear: Our cyber security
measures will remain incomplete until we focus on people – just as
hackers do. They know that their greatest chance of success lies in
playing on human emotions, and that’s why social engineering is at the
core of their practices, as we’ve seen repeatedly in this report.
The Allianz Risk Barometer 2024 also estimates that cyber incidents
will be the top global business risk in 2024, leaving security leaders no
room to ignore the human element in their security strategies.3 The
good news is that there’s a powerful countermeasure to this risk: cyber
security awareness and training. By bringing cyber security to where
people are and making secure behavior second nature, we can turn
the tide against cyber threats. Remember, it’s not just systems but
people who are the targets and bear the brunt of cyberattacks. It’s also
people who have the power to stop these attacks. Building a culture
of security isn’t just a corporate responsibility – it’s a personal one,
too. Together, we can beat back the looming shadow of sophisticated
cybercrime and safeguard our future.
1
Verizon (2023). Data Breach Investigations Report.
2
Forrester (2024). Predictions 2024: Exploration Generates Progress.
3
Allianz (2024). Allianz Risk Barometer 2024.
About SoSafe 40
Human Firewall
Conference
HuFiCon is a European cyber security event designed to help
security professionals transform their teams into cyber heroes.
Join us for expert talks, hands-on workshops, and a community
committed to putting people at the heart of cyber security.
Contact
For further questions regarding this report,
please reach out to:
Laura Hartmann
Head of Corporate Communications
[email protected]
Disclaimer:
Every effort has been made to ensure that the contents of this document are correct.
However, we do not accept any liability for the content’s accuracy, completeness and cur-
rency. SoSafe in particular does not assume any liability for any damages or consequences
resulting from direct or indirect use.
Copyright:
SoSafe grants everyone the free, spatially and temporally unlimited, non-exclusive right to
use, reproduce and distribute the work or parts thereof, both for private and for commercial
purposes. Changes or modifications to the work are not permitted unless they are techni-
cally necessary to enable the aforementioned uses. This right is subject to the condition
that SoSafe GmbH authorship and, especially where extracts are used, this work is indicted
as the source under its title. Where possible and practical, the URL at which SoSafe provides
access to the work should also be given.
44