Kaspersky’s Global Research and Analysis Team (GReAT) has provided insights and predictions on the growth of targeted attacks (APTs) in 2024 in the Kaspersky Security Bulletin report.
Kaspersky predicts that APT hackers will exploit many new vulnerabilities to penetrate mobile devices, wearables, and smart devices. Use (through) them to form botnets, refine supply chain attack methods, and use artificial intelligence (AI) to make phishing attacks more effective. These improvements will lead to an increase in politically motivated attacks and cybercrime in the future.
Additionally, emerging AI tools easily compose phishing messages, even allowing for imitating specific individuals. Attackers can devise creative automation methods by collecting online data and feeding it to a large language model (LLM) to generate familiar-like message content for the victim.
“Operation Triangulation” marks an alarming year in mobile exploits and will likely inspire more research into APT attacks on mobile and wearable devices. and smart devices. We will likely see threat actors expand their surveillance efforts, targeting various consumer devices through security vulnerabilities and “silent” exploit distribution methods. , including zero-click attacks via messengers, one-click attacks via SMS or messaging apps, and traffic interception networks. Therefore, protecting personal and business devices is more important than ever.
Besides, users should be wary of exploiting vulnerabilities in commonly used software and devices. However, the discovery of high-severity vulnerabilities often limits research and delays repairs, which opens the way for new large-scale and stealthy botnets to attack intentionally.
Other advanced threats also predicted in 2024 include:
- 2024 could see new developments in supply chain-related dark web access market activity, facilitating more efficient and large-scale attacks.
- Hacking-for-hire groups are on the rise, offering data-stealing services to clients ranging from private investigators to business rivals. This trend is expected to grow next year.
- Windows kernel attacks are on the rise, enabled by abuse of the Well Head Control Panel (WHCP), underground markets for EV certificates, and code signing. Theft is also gradually developing. In addition, threat actors are increasingly leveraging the Bring Your Own Vulnerable Driver (BYOVD) malicious tool in their tactics.