eCommerce News New Zealand logo
The latest digital commerce news for Kiwi businesses
Story image

High profile attacks, ransomware gangs and weaponisation part of cybersecurity predictions for 2022

By Shannon Williams
Mon 22 Nov 2021

More high profile attacks, ransomware gangs and weaponisation are just some the cybersecurity trends predicted for 2022, according to HP.

From ransomware pile-ons to increasingly commoditised supply chain TTPs, weaponised firmware exploits and targeted attacks on hybrid workers – the threat landscape is set to evolve at a worrying pace in the year ahead.

As 2021 draws to a close, HP security experts and advisors have been reflecting on what the year ahead has in store. 

Increasing commoditisation of software supply chain attacks could result in more high-profile victims targeted

Michael Heywood, supply chain security lead, says upply chain attacks are likely to continue to present new opportunities for threat actors in 2022. 

“We’ll see supply chain attacks continue to rise over the next year as threat actors search for weak links in software supply chains, targeting software being used widely and globally, or used by a specific company," he says.

CISO Joanna Burkey says this approach could create economies of scale for threat actors.

“With the Kaseya breach – which impacted over 1,500 companies – we saw that supply chain attacks can be financially rewarding. This could lead to the continued commoditisation of the tactics, techniques, and procedures (TTPs) used to conduct such attacks," she says.

"This only adds fuel to the fire, giving threat actors more than enough motivation to exploit software supply chains in the next year.”

Dr. Ian Pratt, global head of security for personal systems, says both SMBs and high-profile victims may be targeted.

"Kaseya demonstrated a pathway to monetisation for independent software vendor (ISV) breaches," he says.

"This should be a wakeup call to all ISVs that even if their customer base doesn’t consist of enterprise and government customers, they can still be caught in the crosshairs of attackers looking to exploit their customers. 

"Now that this blueprint is in place, we could see these types of attack become more widespread in the year ahead, targeting both SMBs and high-profile names.”

Some verticals are more likely to be targets of supply chain attacks than others. 

HP security advisory board member and partner at Deloitte, Robert Masse, says, “Healthcare firms, as well as those in Energy and Resources (E&R), that use lots of different hardware and software from various vendors will be interesting targets for software supply chain attacks. 

"Supply chain integrity will be vital in 2022, as attackers begin launching attacks quicker than organisations can invest in secure software development cycles," he says.

Patrick Schlpfer, malware analyst, says organisations should also be aware of the threat posed by vulnerabilities in open source software.

“We’ll see an increase in open source software packages containing malicious code," he says.

"Attackers will proactively inject new threats into open source libraries that feed into software supply chains. This could lead to more companies being compromised, regardless of whether they have a secure perimeter or good overall posture.”

Ransomware gangs could put lives at risk and engage in ‘pile-ons’

Burkey says ransomware will continue to be a major risk into 2022, with victims potentially being hit more than once.

“What we’ll see will be akin to ‘social media pile-ons’, with ransomware victims repeatedly targeted by threat actors. Once an organisation has been shown to be ‘soft’, others will pile-on to get their share of the action," she explains.

"In some instances, threat actors will hit a company multiple times in double or even triple dip extortion rackets.”

Alex Holland, senior malware analyst, says extortion methods could also extend beyond the victim as ransomware gangs apply the pressure.

“Ransomware operators will almost certainly intensify the ways they pressure victims into paying their demands. Beyond data leak websites, attackers are using increasingly varied extortion methods, such as cold calling, and contacting customers and business associates of victim organisations.” 

Heywood highlights that ransomware gangs won’t just encrypt data, they will steal it too, turning the screws on victims: 

“As we have seen this year, threat actors will continue stealing data before encrypting devices, putting pressure on victims to pay ransoms to unencrypt systems, and prevent the release of data," he says.

Masse adds that treat actors could also focus on specific verticals and use cases.

“Attackers have noticed that hitting certain industries will produce a higher likelihood of payment. We could see more attacks on healthcare and E&R organisations," he says.

"Threat actors may well target high risk devices, such as critical medical support systems and their supporting infrastructure, where the risk of significant harm will be highest and therefore a payout will come quickly," Masse explains.

"This has already started to happen in regions such as Canada, with surgeries being delayed due to ransomware attacks.”

 According to Pratt, the trend of cooperation between threat actors will continue in the year ahead too.

“We’ve seen time and time again that threat actors are willing to cooperate on attacks. There is a vibrant cybercrime marketplace, empowering a criminal supply chain that enables even unsophisticated threat actors to obtain the tools and services needed to launch successful campaigns," he says.

"Vendors may specialise in stealing credentials, creating exploits, writing email lures, or hosting backend services. The bottom line is that the availability of tools and expertise is enabling the sophistication of criminal attacks to rise.”

Weaponisation of firmware attacks will lower the bar for entry
 
Pratt says we could also start to see the trickle down of Nation State developed firmware attacks, which will show the way for cybercriminal gangs to weaponise threats.

“Firmware provides a fertile opportunity for attackers looking to gain long-term persistence or perform destructive attacks. The security of firmware is frequently neglected by organisations, with much lower levels of patching observed. 

"In the last year we’ve also seen attackers performing reconnaissance of firmware configurations, likely as a prelude to exploiting them in future attacks. Previously these types of attacks were only used by Nation State actors," he says.

"But in the next 12-months the TTPs for targeting PC firmware could trickle down, opening the door for sophisticated cybercrime groups to weaponise threats and create a blueprint to monetise attacks.”

Masse believes a lack of visibility and control over firmware security will exacerbate the issue.

“Certain industries where these attacks could be more probable should start thinking about the risks posed by the weaponisation of hardware-level malware and exploits. 

"They are very difficult to detect even in the best-case scenario. Rogue processes and memory mapping bypasses will be hot topics in 2022, and we can also expect to see threat actors targeting CPUs, the BIOS and microcode as part of a revised kill-chain for ransomware attacks.”

Julia Voo, global lead cybersecurity and tech policy, says policy makers should take note of this trend and enforce change.

"The weaponisation of hardware-level exploits means that policy makers must step in to develop standards that can help to improve firmware security," she says. 

"By working with industry through a bottom-up approach, policy makers can drive meaningful change in an area that has largely been overlooked.”

Hybrid work and sporting events will create more opportunities to attack users
 
The distribution of teams within hybrid working models means identity management will continue to play a key role, according to Burkey.

“Identity must be solid, verified and robust. Organisations need to make sure that every activity coming from an endpoint is authentic," she says.

"Is it really the user conducting these activities? Are they who they say they are? Too many organisations think being behind a firewall is enough to keep an endpoint safe, but this isn’t true. In the era of hybrid work, identity management will never be more important.”

Michael Howard, head of security and analytics practice, says the shift to hybrid work will also continue to create problems for organisational security.

“Every single employee remains a target for attackers, with the volume of unmanaged and unsecure devices creating a huge attack surface to defend," he says. 

Masse believes this could make it easier for attackers to go after high-profile staff.

“Threat actors could start to target the homes and personal networks of top executives, even government officials, as these networks are easier to compromise than traditional enterprise environments.”

According to Pratt, phishing will remain an ever-present threat in the era of hybrid work.

“Employees have been using personal devices for work or corporate devices for personal tasks, like checking emails. This will continue, and it’s likely there will be an increase in phishing attacks targeting both corporate and personal email accounts. 

"This essentially doubles attackers’ chances of launching a successful attack, so organisations need to educate the workforce on the risks of their behaviour and enforce technical controls to prevent compromise.”

High-profile sporting events will also present new opportunities for attackers to target users, according to Schlpfer.

“The Winter Olympics in Beijing and FIFA World Cup in Qatar give threat actors plenty of scope for exploitation. Such large events attract opportunistic attackers, be it a direct attack on organisers, sponsors, participants and fans, or as phishing lures for malware and ransomware campaigns targeted at users. Organisations and individuals alike need to be aware of the risks.”

A new approach to security is needed

“The rise of hybrid working and continued innovation from threat actors means 2022 has plenty of nasty surprises in store for enterprise security,” says Pratt. 

“As a result, we need to go about securing the future of work in an entirely different way. Organisations should embrace a new architectural approach to security that helps to mitigate risk and enable resilience. 

"By applying the principles of Zero Trust – least privilege access, isolation, mandatory access control and strong identity management – organisations can drastically reduce the attack surface and secure the future of work.”

Related stories
Top stories
Story image
ROI
How to increase the success rate of business data projects
Amid changing economic conditions and uncertainties about supply chains and staff availability, it's never been more important for New Zealand organisations to be innovative.
Story image
InternetNZ
How well do rangatahi understand cyber safety in Aotearoa?
Do rangatahi in Aotearoa understand the importance of being safe online, or has lifelong exposure to the internet resulted in widespread complacency?
Story image
Firewall
Why printing security plays a vital part in keeping Aotearoa safe
While internet printing, mobile printing and other similar technologies have no doubt made things easier to manage, it has also brought a whole new set of problems to the table.
Story image
Google Cloud
Google Cloud to open first cloud region in NZ - among others
Google Cloud has announced plans to bring three new cloud regions, one each in New Zealand, Malaysia and Thailand.
Story image
Sustainability
NZ program recovers and recycles more than 177 tonnes of e-waste
The TechCollect NZ pilot program says its milestone of recovering and recycling more than 177 tonnes of ICT e-waste recognises the efforts of many.
Story image
Customer
OfficeMax NZ sees significant growth through Seismic partnership
OfficeMax New Zealand has announced it has seen a significant increase in customer and sales confidence as a result of Seismic’s digital enablement software.
Story image
Sales
BNZ launches first tap-on-phone point of sale app in NZ
Bank of New Zealand has launched BNZ Pay, an innovative mobile app for retailers that transforms an Android device into a contactless payment terminal. 
Story image
Apps
Freshworks integrates with Google's Business Messages
"The integration with Freshworks makes it fast and easy for businesses to have conversations with their customers within the Google apps."
Story image
eCommerce
Marketplacer and Intelligent Reach to help retailers sell online
Intelligent Reach can now support Marketplacer marketplaces that want to sell their products through other places, such as Google and Facebook, eBay and Amazon.
Story image
Wireless
Hands-on review: Jabra Engage 55 wireless headset
We get our hands on a German design professional headset that many knowledge workers could benefit from.
Story image
Artificial Intelligence
Oracle unveils AI-powered application to automate sales
Oracle has unveiled the next generation of Fusion Sales, an application that automates sales and identifies the opportunities worth pursuing.
Story image
SaaS
OpenText launches new solutions on Salesforce AppExchange
Included in this latest launch is OpenText Core Content, a Content Services platform that customers can leverage to effectively manage their content.
Story image
Revenue
Cisco NZ revenue declines by over $18.5 million - report
Cisco NZ has released its latest financial report, showing the company's total revenue has declined by more than $18.5 million year-over-year.
Story image
CRM
Forrester names Pega a Leader in CRM Solutions 2022 report
Forrester Research has named Pega a Leader among 11 competitors in The Forrester Wave: Core CRM Solutions, Q3 2022 report.
Story image
ShopBack
Forter and ShopBack enhance partnership to further prevent fraud
Forter and ShopBack have enhanced their partnership with the addition of better eCommerce security solutions for customers.
Story image
Forrester
SAS is a leader in anti-money laundering - Forrester
The latest Forrester report revealed that SAS received the highest score in the anti-money laundering category of 15 vendors.
Story image
Enterprise Resource Planning / ERP
Why the right ERP (and partner) is crucial to an innovative and successful business
Enterprise Resource Planning (ERP) is a foundational step to ensuring a robust business model; here's why choosing the right one could be vital to ensuring long-term success and innovative results.
Story image
Social Media
ActiveCampaign reveals consumers seek trusthworthy content
Consumers will engage with new brands across all channels, including online, in-store and social media, as long as the content is relevant and trustworthy.
Story image
Cloud
Sitecore caters to modern marketing teams with CMS cloud launch
"Sitecore's move towards a composable SaaS offering for creating and delivering digital experiences is in line with what marketing teams are looking for.”
Story image
Phishing
Akamai research finds PayPal security measures utilised in new phishing scam
New research from Akamai has found that a new threat actor is parasitising benign WordPress sites to execute an extensive PayPal phishing scam.
Story image
Revenue
IBM NZ sees significant revenue increase in latest report
IBM NZ has posted revenue of $172,449,000 for the financial year, according to its latest report, a year-over-year increase of over $47.5 million compared to $124,904,000 in 2020.
Story image
Financial results
Facebook NZ financial report reveals notable revenue increase
Revenue from contracts with customers increased by $NZD 1,089,292 compared to 2020's figures.
Story image
Planning
Digital key for smart investment in public infrastructure for NZ cities
Major public infrastructure projects can better manage risks of cost overruns and delays if they deploy data and digital tools at the earliest planning stages.
Story image
Manufacturing
How manufacturers can respond to rapid change with technology
Disruption, innovation, and continual refinement of shop floor processes are driving factors in today’s complex market landscape. 
Story image
Facial recognition
Māori data specialists not consulted on facial recognition technology - data sovereignty expert
Māori data specialists are accusing the government of ignoring them while going ahead and expanding the reach of facial recognition technology.
Story image
Customer
Airwallex launches an online payments app on Shopify
Airwallex has launched an online payments app on Shopify, allowing merchants to integrate a gateway plugin on their online store to accept payments from their global customers.
Story image
Microsoft
Infobip’s SMS and WhatsApp services are now available through Microsoft
Infobip has integrated its WhatsApp and SMS channels through Microsoft Dynamics 365 Sales and Microsoft Dynamics 365 Marketing.
Story image
Internet
InternetNZ appoints new chief executive. Will take over in October
InternetNZ has announced the appointment of its new chief executive, with Vivien Maidaborn taking over the role from interim chief Andrew Cushen in October.
Story image
Customer experience
BillingPlatform introduces new enhancements to revenue management services
Some of the new developments include hosted payment pages, and new and updated connectors to Salesforce, NetSuite, OneSource, Avalara and other enterprise systems.
Story image
Cybersecurity
eCommerce fraud increasing pressure on businesses margins
It is vital for businesses to maximise the value of every dollar by turning away as many fraudulent actors as possible without blocking good customers."
Story image
Remote Working
Mantel Group continues NZ expansion with Auckland office
"Our desire is to offer real understanding to our New Zealand clients, and help provide solutions that better their business.” 
Story image
Artificial Intelligence
Cyara rolls out comprehensive, automated chatbot feature
Cyara has unveiled new chatbot testing features with the latest release of Cyara Botium, creating a solution for comprehensive, automated chatbot testing and assurance.
Story image
Sustainability
Visa launches Eco Benefits solutions in Australia and NZ
Eco Benefits is a suite of sustainability-focused solutions that will help Visa cardholders better understand the environmental impact of their payments.
Story image
Payments
Tranxactor Group to build customer loyalty with Oracle
Tranxactor has chosen Oracle Cloud Infrastructure (OCI) with Enterprise Database Service to allow it to provide brands with immersive customer engagement and loyalty programs.
Story image
Ebay
FedEx and eBay team up to boost APAC eCommerce options
FedEx Express' new alliance with eBay enables eBay sellers in APAC to sign up for a FedEx account and access the full spectrum of FedEx e-commerce delivery service options at competitive rates.
Story image
Printers
Comedy legend Jimeoin fronts Epson advertising campaign in NZ and Australia
According to Epson the company’s EcoTank models now account for 74% of all printers sold in the category in New Zealand, alone.
Story image
KICKS CREW
KICKS CREW selects Forter to help scale global eCommerce operations
KICKS CREW has selected Forter to help scale its global digital commerce operations.
Story image
Digital Journey
NICE unveils new CXone capabilities with latest release
NICE has announced the Summer 2022 release of CXone, which adds new capabilities that enhance journey orchestration and complete performance.
Story image
Cloud
Microsoft and Auckland Transport announce new cloud agreement
Auckland Transport (AT) and Microsoft have announced a new cloud agreement aimed at promoting innovation, reducing costs and improving sustainability in transport services.
Story image
Commerce Commission
The NZ TCF endorses move by ComCom to promote TDR dispute scheme
The New Zealand Telecommunications Forum has welcomed the move by the Commerce Commission to further promote customers' access to the Telecommunications Dispute Resolution Scheme (TDR).
Story image
New Zealand
Research finds Kiwis prefer real backdrops in video calls
New research from Natural Paint Co. has found that 74% of Kiwis prefer seeing a natural background behind people during video meetings.