Security News > 2021 > January > A hacker’s predictions on enterprise malware risk
![A hacker’s predictions on enterprise malware risk](/static/build/img/news/alt/cybersecurity-attacker-medium.jpg)
From the use of novel attack techniques to the targeting of new attack vectors, we have a preview into how attacks will evolve.
In 2021, threat actors will move on from basic ransomware attacks and will weaponize stolen information about an executive or business to create fraudulent content for extortion.
Threat actors are evolving from high-volume/low-value attacks, to high-value/low-volume attacks targeting businesses.
Ransomware attacks will shift from "I've stolen all your data, now pay me;" to, "I'm going to extort your CEO with information I've found in the data I've stolen from you, and if you don't pay, we'll devalue your stock on Wall Street."
Threat actors are beginning to sift through exfiltrated data from ransomware attacks for high value content, and their pot of gold? Cloud infrastructure credentials that could allow them to hold a company infrastructure for ransom.
While no CISO has access to a crystal ball demystifying how their organization will be attacked, they should know that in 2021, attacks will happen.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/MTedylzGy9c/
Related news
- North Korean Hackers Exploit Facebook Messenger in Targeted Malware Campaign (source)
- Russian hackers use new Lunar malware to breach a European govt's agencies (source)
- Foxit PDF Reader Flaw Exploited by Hackers to Deliver Diverse Malware Arsenal (source)
- Pakistan-linked Hackers Deploy Python, Golang, and Rust Malware on Indian Targets (source)
- Russian Hackers Target Europe with HeadLace Malware and Credential Harvesting (source)
- Andariel Hackers Target South Korean Institutes with New Dora RAT Malware (source)
- Hackers Use MS Excel Macro to Launch Multi-Stage Malware Attack in Ukraine (source)
- Hackers Exploit Legitimate Packer Software to Spread Malware Undetected (source)
- Pakistani Hackers Use DISGOMOJI Malware in Indian Government Cyber Attacks (source)
- Hackers use F5 BIG-IP malware to stealthily steal data for years (source)