Untold Truth Of 2018 and What to Expect From 2019

There are a few days left for another year to end. During this year, many exploits were found and many governments, small and large companies suffered from cyber-attacks. Let’s remember some of the incidents that caused trouble…

  • As the value of bitcoin increased to 20,000 USD during the first month of 2018, cyber-attacks slightly changed their target and also revealed a new type of attack: Cryptojacking. Cryptocurrencies were stolen and victims’ computers were used to mine cryptocurrency. Even, governments of United Kingdom, United States and Australia experienced this security issue.
Designed by Fullvector, can be found on https://www.freepik.com/free-vector/internet-payments-protection-money-transfer-online-bank-budget-accounting_2910144.htm

Designed by Fullvector

  • Rather than a software vulnerability as usual, new hardware vulnerabilities were found in processor chips. Thus, Meltdown and Spectre attacks started to hunt down computers that had these processor chips: so, basically, every computer…
  • SamSam ransomware hit a city in United States. It affected almost every station in the city, such as water management departments and police stations. Even though the ransom was only $52.000, it cost $9.5 million to recover. Also, Baltimore’s 911 dispatch system was hit by a ransomware, which forced the employees to spend 17 hours making the dispatches manually.

These events are very important factors that show why ransomware should never be underestimated…

  • GitHub, the software development platform, was targeted by the biggest DDos attack ever experienced. Their servers exposed to 1.3 terabits of traffic per second.
  • So many companies and institutions including, Equifax, UnderArmor, Aadhaar, Biritsh Airways, Rail Europe, Dixons Carphone, Ticketfly, MyHeritage, Exactis, SingHealth, Timehop, Air Canada, Facebook, Amazon, Marriot, Germany’s foreign and interior ministries and the U.S. State Department experienced data breaches effecting 4 million people, 150 million accounts, 1.1 billion Indian citizens, 185,000 passengers, unknown numbers, 10 million people, 27 million customers, 92.2 million accounts, 340 million records, 1.5 million healthcare patient records, 21 million users, 20,000 customers, 30 million users, unknown numbers, 500 million hotel guests, at least 17 gigabytes of data and several hundred employees respectively.
  • According to a United Nations report, North Korean hackers attempted to get an access to e-mail accounts UN panel members who are enforcing trade sanctions against North Korea. Also, an evidence that shows same group of hackers was targeting Turkish banks and government finance agencies was revealed by the cyber security researches.

The list of significant cyber events goes on and on…

Lessons to Be Drawn

Cyber world offers limitless opportunities to people who want to reach any point in the world while they are sitting on their chair. Thus, it also gives opportunities to hackers to find vulnerabilities and exploit them far away from the crime scene. This indicates that hackers will always be lurking on the internet to find victims according to their taste.

As there are lots of reasons behind cyber-attacks, with the right protection, proper cyber security trainings for increasing the awareness against the threats and 24×7 security monitoring, most of the cyber-attacks can be prevented.

What to expect from 2019?

Just as cryptocurrencies, increased usage of Internet Of Things and their lack of security systems will create massive hunting grounds for the hackers. On April 2018, security researches have already shown that Alexa can be made to listen to the owners without hacking it. Imagine the outcome once your devices can listen to whatever you are doing… And now imagine, if your devices can see you, listen to you and sense you…

Internet of Things

Designed by Freepik

Every day a new piece of malware is being developed. Even as cyber security experts, we can’t know all of them. This is why they are called zero-day threats. However, we can predict that with the integration of Artificial Intelligence to our lives, the AI powered malware will also be implemented to our lives, eventually…

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: