What’s Next in Cybersecurity | MIT Technology Review
According to Carhart, one of the reasons that cyberspace hasn’t played a larger role in the war is because “over the whole of the conflict, we saw Russia as unprepared for everything and without a plan.” good game. So it’s not really surprising that we see that in the cyber arena as well.”
Furthermore, Ukraine, under the leadership of Zhora and his cybersecurity agency, have worked to protect the network for many years and have received support from the international community since the war began, according to experts. Finally, an interesting twist in the internet conflict between Russia and Ukraine is the rise of the international decentralized network alliance known as the IT Army, has scored a significant number of hacks, suggesting that future wars could also be fought by attackers.
Ransomware raging again
This year, in addition to the usual corporations, hospitals and schools, government agencies in Costa Rica, Montenegrinand album are all damaged by ransomware attacks. In Costa Rica, the government declared a national emergency, the first after a ransomware attack. And in Albania, the government expelled Iranian diplomats from the country—for the first time in cybersecurity history—after a destructive cyber attack.
These attack patterns hit an all-time high in 2022, a trend that is likely to continue next year, according to Allan Liska, a ransomware-focused researcher at cybersecurity firm Recorded Future.
“[Ransomware is] It’s not just a technical issue like an information stealer or other commodity malware. There are geopolitical implications in the real world,” he said. For example, in the past, a North Korean ransomware called WannaCry cause serious disruption to the UK’s National Health System and there are an estimated 230,000 computers worldwide.
Fortunately, not all is bad news about ransomware. According to Liska, there are some early signs of the “death of the ransomware-as-a-service model,” in which ransomware gangs rent out hacking tools. The main reason, he said, is that whenever a gang gets too big, “something bad is going to happen to them.”
For example, the REvil and DarkSide/BlackMatter ransomware groups were attacked by the government; Conti, a Russian ransomware gang, unravels inside when Ukrainian researcher terrified by Conti’s public support for the war leaked internal chats; and the LockBit team also leaked its code.
“We see a lot of affiliates deciding that maybe I don’t want to be part of a big ransomware group, because they all have targets behind their backs, which means I probably have targets behind them. and I just wanted to do my cybercrime,” Liska said.