STOCK TITAN

Deepfakes, Cryptocurrency and Mobile Wallets: Cybercriminals Find New Opportunities in 2022

Rhea-AI Impact
(Neutral)
Rhea-AI Sentiment
(Neutral)
Tags
Rhea-AI Summary

Check Point Software Technologies (NASDAQ: CHKP) released its 2022 Cyber-security Predictions, forecasting significant challenges ahead. Key highlights include increasing supply chain attacks, weaponized deepfake technology, and larger-scale data breaches that will cost organizations more to recover. Cyber criminals will also exploit cryptocurrency and mobile payment platforms. The report emphasizes the need for organizations to be proactive in securing their networks against these evolving threats.

Positive
  • None.
Negative
  • Anticipation of increased supply chain attacks, posing risks to businesses.
  • Projected rise in the scale and cost of data breaches, threatening financial stability.
  • Weaponization of deepfake technology could lead to serious social and economic disruptions.

Check Point Software 2022 Cyber-security Predictions also anticipates an increase in supply chain attacks in the new year

SAN CARLOS, Calif., Oct. 26, 2021 (GLOBE NEWSWIRE) -- Check Point® Software Technologies (NASDAQ: CHKP), a leading provider of cyber-security solutions globally, released its cyber-security predictions for 2022 detailing the key security challenges that organizations will face over the next year. While cybercriminals continue to leverage the impact of the COVID-19 pandemic, they will also find new opportunities for attack with deepfakes, cryptocurrency, mobile wallets and more.

Key highlights from the 2022 Global cyber-security predictions report include:

  • Fake news and misinformation campaigns return: Throughout 2021, misinformation was spread about the COVID-19 pandemic and vaccination information. In 2022, cyber groups will continue to leverage fake news campaigns to execute various phishing attacks and scams.
  • Supply chain cyber-attacks continue to increase: Supply chain attacks will become more common and governments will begin to establish regulations to address these attacks and protect networks, as well as collaborate with the private sectors and other countries to identify and target more threat groups globally.
  • The cyber ‘cold war’ intensifies: Improved infrastructure and technological capabilities will enable terrorists groups and political activists to further their agendas and carry out more sophisticated, wide spread attacks. Cyber-attacks will increasingly be used as proxy conflicts to destabilize activities globally.
  • Data breaches are larger scale and more costly: Data breaches will happen more frequently at a larger scale and cost organizations and governments more to recover. In May 2021, US insurance giant paid $40 million in ransom to hackers. This was a record, and we can expect ransom demanded by attackers to increase in 2022.
  • Cryptocurrency gains popularity with attackers: When money becomes purely software, the cyber security needed to protect against hackers stealing and manipulating bitcoins and altcoins is sure to change in unexpected ways.
  • Attackers target mobile: As mobile wallets and mobile payment platforms are used more frequently, cybercriminals will evolve and adapt their techniques to exploit the growing reliance on mobile devices.
  • Attackers will leverage microservices’ vulnerabilities: With microservices architecture being embraced by Cloud Service Providers (CSPs), attackers are using vulnerabilities found in them, to launch large-scale attacks on CSPs.
  • Deepfake technology is weaponized for attacks: Techniques for fake video or audio are now advanced enough to be weaponized and used to create targeted content to manipulate opinions, stock prices or worse. Threat actors will use deepfake social engineering attacks to gain permissions and access sensitive data.
  • Penetration tools continue to grow:  Globally in 2021, 1 out of every 61 organizations was being impacted by ransomware each week. Threat actors will continue to target companies that can afford paying ransom, and ransomware attacks will become more sophisticated in 2022. Hackers will increasingly use penetration tools to customize attacks in real time and to live and work within victim networks.

“In 2021, cyber criminals adapted their attack strategy to exploit vaccination mandates, elections and the shift to hybrid working, to target organizations’ supply chains and networks to achieve maximum disruption,” said Maya Horowitz, VP Research at Check Point Software. “The sophistication and scale of cyber-attacks will continue to break records and we can expect a huge increase in the number of ransomware and mobile attacks. Looking ahead, organizations should remain aware of the risks and ensure that they have the appropriate solutions in place to prevent, without disrupting the normal business flow, the majority of attacks including the most advanced ones. To stay ahead of threats, organizations must be proactive and leave no part of their attack surface unprotected or unmonitored, or they risk becoming the next victim of sophisticated, targeted attacks.”

For the full list of predictions, visit Check Point Software’s 2022 Cyber-security Predictions

Follow Check Point via:
Twitter: http://www.twitter.com/checkpointsw
Facebook: https://www.facebook.com/checkpointsoftware
Blog: http://blog.checkpoint.com
YouTube: http://www.youtube.com/user/CPGlobal
LinkedIn: https://www.linkedin.com/company/check-point-software-technologies

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally.  Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network and mobile device held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

MEDIA CONTACT:INVESTOR CONTACT:
Jacinta PaulKip E. Meintzer
Check Point Software TechnologiesCheck Point Software Technologies
press@us.checkpoint.comir@us.checkpoint.com

FAQ

What are the key predictions for Check Point Software in 2022?

Key predictions include increases in supply chain attacks, larger data breaches, and the utilization of deepfakes for cyber attacks.

How might supply chain attacks affect Check Point Software in 2022?

Increased supply chain attacks could lead to more cyber threats against organizations, impacting Check Point's cybersecurity offerings.

What role does deepfake technology play in Check Point's 2022 predictions?

Deepfake technology is expected to be weaponized for social engineering attacks, posing significant risks to data security.

Which threats are expected to rise in the cybersecurity landscape according to CHKP's report?

The report anticipates heightened threats from ransomware, mobile attacks, and the exploitation of cryptocurrency.

Check Point Software Technologies Ltd

NASDAQ:CHKP

CHKP Rankings

CHKP Latest News

CHKP Stock Data

19.15B
85.08M
22.64%
72.24%
2.58%
Software - Infrastructure
Technology
Link
United States of America
Tel Aviv