According to the Trend Micro’s latest prediction report, attacks will broaden and differentiate, meaning 2017 will face new threats.
The report, “The Next Tier – 8 Security Predictions for 2017”, showed that the number of ransomware families is predicted to plateau, but will branch out into IoT devices and non-desktop computing terminals, such as ATMs.
A large increase in Apple vulnerabilities were seen this year with 50 disclosed, along with 135 Adobe bugs and 76 affecting Microsoft.Trend Micro foresees new vulnerabilities will continue to be discovered in Apple and Adobe, which will then be added to exploit kits.
Furthermore, the report reveals that vendors will not secure IoT and IIoT devices in time to prevent attacks and that cyber-propaganda will continue with the continued political appointments. Plus the increasing use of mobile devices to monitor control systems in manufacturing and industrial environments will be combined with the significant number of vulnerabilities which will pose as threats.
Raimund Genes, chief technology officer for Trend Micro, said:
“Next year will take the cybersecurity industry into new territory after 2016’s threat landscape opened doors for cybercriminals to explore a wider range of attacks and attack surfaces.
“We foresee the General Data Protection Regulation (GDPR) causing extensive data management changes for companies around the world, new attack methods threatening corporations, expanding ransomware tactics impacting more devices and cyber-propaganda swaying public opinion.”
The report also states new targeted attack methods will focus on evading modern detection techniques to let threat actors to target different organisations.
“We continue to see cybercriminals evolving to the changing technology landscape,” said Ed Cabrera, chief cybersecurity officer for Trend Micro. “While new ransomware saw an exponential increase in 2016, that growth is no longer sustainable, so attackers will find new ways to use existing malware families. Similarly, changes in IoT open new doors to go after additional attack surfaces, and software changes push criminals toward finding different types of flaws.”