{"id":5821,"date":"2017-01-04T07:22:42","date_gmt":"2017-01-04T12:22:42","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=5821"},"modified":"2017-09-24T18:36:15","modified_gmt":"2017-09-24T14:36:15","slug":"kaspersky-predictions-2017","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/kaspersky-predictions-2017\/5821\/","title":{"rendered":"2016 results, 2017 predictions"},"content":{"rendered":"<p>As a tradition, at the end of the year our GReAT cybersecurity experts publish their predictions for the upcoming year. Let\u2019s see which of\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-predictions-2016\/\" target=\"_blank\" rel=\"noopener nofollow\">last year\u2019s predictions<\/a>\u00a0came true and then try to look into the future and see what awaits us in 2017.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5822\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2017\/01\/05112116\/predictions-2017-featured-1.jpg\" alt=\"\" width=\"1280\" height=\"840\"><\/p>\n<h2>Predictions that came true<\/h2>\n<h3>User security<\/h3>\n<p>As predicted by GReAT last year,\u00a0<b>ransomware<\/b>\u00a0of all kinds proliferated throughout the year. For example, 2016 was the year when notorious threats like\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/petya-ransomware\/\" target=\"_blank\" rel=\"noopener nofollow\">Petya<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/cryptxxx-v3-ransomware\/\" target=\"_blank\" rel=\"noopener nofollow\">CryptXXX<\/a>\u00a0first saw the light of day. Also fulfilling the forecast, an\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/mac-malware-again\/\" target=\"_blank\" rel=\"noopener nofollow\">cryptor for mac OS<\/a>\u00a0appeared back in the spring.<\/p>\n<p>All in all, the number of ransomware samples and attacks grew significantly. However, we did a better job fighting them: In 2016, the\u00a0<a href=\"https:\/\/www.nomoreransom.org\/\" target=\"_blank\" rel=\"noopener nofollow\">No More Ransom<\/a>\u00a0project was born. It collected a lot of free decryptors under one roof and united a number security vendors and governments under its banners.<\/p>\n<p>We predicted blackmail on greater scale, as well. In fact, the instances were not many, yet the number of\u00a0<b>exposed user credentials<\/b>\u00a0was higher than ever before.\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/dropbox-hack\/\" target=\"_blank\" rel=\"noopener nofollow\">Dropbox<\/a>,\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/millions-twitter-accounts-leak\/\" target=\"_blank\" rel=\"noopener nofollow\">Twitter<\/a>,\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/possible-yahoo-password-leak\/\" target=\"_blank\" rel=\"noopener nofollow\">Yahoo<\/a>\u00a0and many other services were compromised. In many cases, they had actually been compromised years before, yet the breaches became apparent only last year. 2016 can be legitimately considered the Year of the Breach.<\/p>\n<p><b>Smart car hacks<\/b>, as predicted, slowly gained speed in 2016. That unfortunate\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/daily-ru\/jeep-hacked-again\/\" target=\"_blank\" rel=\"noopener nofollow\">Jeep was hacked again<\/a>, and so was the\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/tesla-remote-hack\/\" target=\"_blank\" rel=\"noopener nofollow\">Tesla Model S<\/a>, the smartest of smart cars.<\/p>\n<h3>Corporate security<\/h3>\n<p>Fewer specialized and customized malware programs were used for targeted campaigns, as we predicted. But adversaries increasingly use legitimate software as part of a malware campaign and resort to a malware-as-a-service approach.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">What's in store for IT security in 2017? <a href=\"https:\/\/twitter.com\/Securelist?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@Securelist<\/a> take a look inside their crystal ball <a href=\"https:\/\/t.co\/QlPDvIM8wY\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/QlPDvIM8wY<\/a> <a href=\"https:\/\/t.co\/Tdamq8hFpK\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/Tdamq8hFpK<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/801851713753858049?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">November 24, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>\u00a0<\/p>\n<p>More attacks on banks and financial services came as well. Moreover, last year, criminals started using SWIFT to carry out attacks and siphoned huge sums of money. The most significant incident happened to the Central Bank of Bangladesh: the attempted theft of a whopping $1 billion dollars from the government. The thieves got away with $81 million; the suspicious activity was spotted thanks to a typo in the bank details, and subsequent rogue transactions were declined.<\/p>\n<h2>What awaits us in 2017?<\/h2>\n<p>At the\u00a0<a href=\"https:\/\/twitter.com\/search?q=%23kldetective&amp;src=typd\" target=\"_blank\" rel=\"noopener nofollow\">#KLDetective<\/a>\u00a0event, GReAT experts Alex Gostev and Sergey Golovanov named six key cybersecurity trends to look for in 2017.<\/p>\n<p><b>1. APT attacks will be hushed up.<\/b>\u00a0Kaspersky Lab\u2019s experts think that advanced persistent threats (APTs) will be less publicized because they have become \u201ctoo political\u201d lately. A hacker from Country A attacking services in Country B is one thing \u2014 but what if the hacker was working for the government? That would be a de facto act of cyberwar. And a real-life war could follow.<\/p>\n<p><b>2. Data leaks will be publicized to manipulate public opinion.<\/b>\u00a0In 2016, hacktivists took to publishing leaked data on the likes of\u00a0<a href=\"http:\/\/wikileaks.org\/\" target=\"_blank\" rel=\"noopener nofollow\">wikileaks.org<\/a>\u00a0and providing the stolen data to the media. Such leaks provoke huge scandals and lively discussion. In 2017, such scandals are likely to be just as numerous: France and Germany are holding elections this year.<\/p>\n<p><b>3. Heated discussions about privacy issues will continue.<\/b>\u00a0Our data is being collected by everyone able to collect it. This year\u2019s massive breaches made both users and governments realize how insecure user data is. It\u2019s hard to say now who will take action and what that action might be, but something has to change.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/IT?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#IT<\/a> and <a href=\"https:\/\/twitter.com\/hashtag\/infosec?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#infosec<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/stats?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#stats<\/a> and figures for 2016 <a href=\"https:\/\/t.co\/UkXNy3Yz4f\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/UkXNy3Yz4f<\/a> <a href=\"https:\/\/t.co\/zAGprgFuBT\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/zAGprgFuBT<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/814604475008745473?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">December 29, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><b>4. Cryptocurrency will gain traction.<\/b>\u00a0Not long ago, there was only one cryptocurrency, bitcoin, but now as many as 50 of them exist. Even governments and banks have to accept cryptocurrencies, and banks are even considering developing their own financial blockchain-based services. But with new technologies come new threats and vulnerabilities. Cryptocurrencies will get much more attention in 2017 than they did in 2016.<\/p>\n<p><b>5. Hackers will opt for short-term attacks.<\/b>\u00a0APT attacks are changing, and may lose the \u201cP\u201d: In 2017, cybercriminals are likely to choose types of attacks that do not presuppose persistence of malware in compromised systems.<\/p>\n<p>Malware authors are already using Microsoft PowerShell, a completely legitimate piece of software that helps to create small programs that reside in system memory and are deleted on reboot. What good does that do a criminal? Of course, it allows them to steal data from an infected system without leaving a trace.<\/p>\n<p><b>6. Attacks on financial services.<\/b>\u00a0As we said, last year cybercriminals learned how successful attacks on SWIFT banking networks could be. But the list of targeted financial services is not limited to SWIFT: there are stock exchanges or investment funds out there. Experts predict in 2017 the attack vector will shift more toward other types of financial companies.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As a tradition, at the end of the year our GReAT cybersecurity experts publish their predictions for the upcoming year. Let\u2019s see which of\u00a0last year\u2019s predictions\u00a0came true and then try<\/p>\n","protected":false},"author":40,"featured_media":5822,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[1110,1236,111,282,575,862,521],"class_list":{"0":"post-5821","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-1110","9":"tag-1236","10":"tag-attacks","11":"tag-cybersecurity","12":"tag-great","13":"tag-predictions","14":"tag-threats"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/kaspersky-predictions-2017\/5821\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/kaspersky-predictions-2017\/4050\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/kaspersky-predictions-2017\/10638\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/kaspersky-predictions-2017\/8194\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/kaspersky-predictions-2017\/8763\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/kaspersky-predictions-2017\/9818\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/kaspersky-predictions-2017\/9551\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/kaspersky-predictions-2017\/2834\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/kaspersky-predictions-2017\/13776\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/kaspersky-predictions-2017\/6812\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/kaspersky-predictions-2017\/5896\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/kaspersky-predictions-2017\/9457\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/kaspersky-predictions-2017\/13529\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/kaspersky-predictions-2017\/13776\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/kaspersky-predictions-2017\/13776\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/predictions\/","name":"predictions"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5821","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=5821"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5821\/revisions"}],"predecessor-version":[{"id":6261,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5821\/revisions\/6261"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/5822"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=5821"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=5821"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=5821"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}