{"id":115915,"date":"2021-01-13T01:00:12","date_gmt":"2021-01-13T09:00:12","guid":{"rendered":"\/blogs\/?p=115915"},"modified":"2024-06-24T23:35:39","modified_gmt":"2024-06-25T06:35:39","slug":"2021-threat-predictions-report","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2021-threat-predictions-report\/","title":{"rendered":"2021 Threat Predictions Report"},"content":{"rendered":"<p>The December 2020 revelations around the SUNBURST campaigns exploiting the SolarWinds Orion platform have revealed a new attack vector \u2013 the supply chain \u2013 that will continue to be exploited.<\/p>\n<p>The ever-increasing use of connected devices, apps and web services in our homes will also make us more susceptible to digital home break-ins. This threat is compounded by many individuals continuing to work from home, meaning this threat not only impacts the consumer and their families, but enterprises as well.<\/p>\n<p>Attacks on cloud platforms and users will evolve into a highly polarized state where they are either \u201cmechanized and widespread\u201d or \u201csophisticated and precisely handcrafted\u201d.<\/p>\n<p>Mobile users will need to beware of phishing\u00a0or\u00a0smishing\u00a0messages aimed at exploiting and defrauding\u00a0them through mobile\u00a0payment services.<\/p>\n<p>The use of\u00a0QR codes\u00a0has notably accelerated\u00a0during the pandemic,\u00a0raising the specter of a new\u00a0generation of\u00a0social engineering techniques\u00a0that\u00a0seek to exploit\u00a0consumers and\u00a0gain access to\u00a0their\u00a0personal data.<\/p>\n<p>Finally, the most sophisticated\u00a0threat actors will increasingly\u00a0use social networks to\u00a0target high value individuals working in\u00a0sensitive\u00a0industry\u00a0sectors\u00a0and roles.<\/p>\n<p>A new year offers hope and opportunities for consumers and enterprises, but also more cybersecurity challenges. I hope you find these helpful in planning your 2021 security strategies.<\/p>\n<p style=\"padding-left: 160px;\"><span data-contrast=\"none\">\u2013Raj Samani, Chief Scientist and McAfee Fellow, Advanced Threat Research<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 160px;\"><span data-contrast=\"none\">Twitter\u202f<\/span><a href=\"https:\/\/twitter.com\/Raj_Samani\"><span data-contrast=\"none\">@Raj_Samani<\/span><\/a><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:450,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">2021 Predictions\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 4.53752%;\">\n<h2 style=\"text-align: center;\"><strong>1.<\/strong><\/h2>\n<\/td>\n<td style=\"width: 95.4625%;\">\n<h2><span class=\"TextRun MacChromeBold SCXW133242407 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW133242407 BCX0\" data-ccp-parastyle=\"Plain Text\">Supply<\/span><\/span><span class=\"TextRun MacChromeBold SCXW133242407 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW133242407 BCX0\" data-ccp-parastyle=\"Plain Text\">\u00a0<\/span><\/span><span class=\"TextRun MacChromeBold SCXW133242407 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW133242407 BCX0\" data-ccp-parastyle=\"Plain Text\">Chain\u00a0<\/span><\/span><span class=\"TextRun MacChromeBold SCXW133242407 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW133242407 BCX0\" data-ccp-parastyle=\"Plain Text\">Backdoor\u00a0<\/span><\/span><span class=\"TextRun MacChromeBold SCXW133242407 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW133242407 BCX0\" data-ccp-parastyle=\"Plain Text\">Techniques<\/span><\/span><span class=\"TextRun MacChromeBold SCXW133242407 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW133242407 BCX0\" data-ccp-parastyle=\"Plain Text\">\u00a0<\/span><\/span><span class=\"TextRun MacChromeBold SCXW133242407 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW133242407 BCX0\" data-ccp-parastyle=\"Plain Text\">to\u00a0<\/span><\/span><span class=\"TextRun MacChromeBold SCXW133242407 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW133242407 BCX0\" data-ccp-parastyle=\"Plain Text\">Proliferate<\/span><\/span><span class=\"EOP SCXW133242407 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><b><span data-contrast=\"auto\">By <a href=\"https:\/\/www.mcafee.com\/blogs\/author\/steveg\/\" target=\"_blank\" rel=\"noopener noreferrer\">Steve Grobman<\/a><\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:360,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h4><b><span data-contrast=\"auto\">The revelations around\u00a0<\/span><\/b><b><span data-contrast=\"auto\">the\u00a0<\/span><\/b><b><span data-contrast=\"auto\">SolarWinds-<\/span><\/b><b><span data-contrast=\"auto\">SUNBURST\u00a0<\/span><\/b><b><span data-contrast=\"auto\">espionage campaign wi<\/span><\/b><b><span data-contrast=\"auto\">ll spark a proli<\/span><\/b><b><span data-contrast=\"auto\">feration<\/span><\/b><b><span data-contrast=\"auto\">\u00a0in copycat\u00a0<\/span><\/b><b><span data-contrast=\"auto\">supply chain\u00a0<\/span><\/b><b><span data-contrast=\"auto\">attacks of this kind<\/span><\/b><b><span data-contrast=\"auto\">.\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h4>\n<p><span data-contrast=\"auto\">On December 13, 2020,\u00a0<\/span><span data-contrast=\"auto\">the\u00a0<\/span><span data-contrast=\"auto\">cybersecurity industry learned\u00a0<\/span><span data-contrast=\"auto\">nation-state\u00a0<\/span><span data-contrast=\"auto\">threat actors had compromised SolarWinds\u2019s Orion IT monitoring and management software and used it to distribute a <\/span><span data-contrast=\"auto\">malicious\u00a0<\/span><span data-contrast=\"auto\">software backdoor\u00a0<\/span><span data-contrast=\"auto\">called SUNBURST\u00a0<\/span><span data-contrast=\"auto\">to dozens of that company\u2019s customers, including several\u00a0<\/span><span data-contrast=\"auto\">high-profile<\/span><span data-contrast=\"auto\">\u00a0U.S. government agencies.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This SolarWinds-SUNBURST campaign is the first major supply chain attack of its kind<\/span><span data-contrast=\"auto\">\u00a0and\u00a0<\/span><span data-contrast=\"auto\">has been\u00a0<\/span><span data-contrast=\"auto\">referred to by many as the \u201c<\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/executive-perspectives\/why-solarwinds-sunburst-is-our-cyber-pearl-harbor\/\"><span data-contrast=\"none\">Cyber Pearl Harbor<\/span><\/a><span data-contrast=\"auto\">\u201d that\u00a0<\/span><span data-contrast=\"auto\">U.S. cybersecurity\u00a0<\/span><span data-contrast=\"auto\">experts<\/span><span data-contrast=\"auto\">\u00a0have been\u00a0<\/span><span data-contrast=\"auto\">predicting<\/span><span data-contrast=\"auto\">\u00a0for a decade and a<\/span><span data-contrast=\"auto\">\u00a0half<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">The campaign also represents a shift in tactics where\u00a0nation state threat actors\u00a0have\u00a0employed a new weapon for cyber-espionage. <\/span><span class=\"s2\">\u202f<\/span><span class=\"s1\">Just as the use of nuclear weapons at the end of WWII changed military strategy for the next 75 years, the use of a supply chain attack has changed the way we need to consider defense against cyber-attacks.<\/span><span class=\"s2\">\u202f<\/span><span class=\"s1\">\u00a0\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">This supply chain attack operated at the scale of a worm such as WannaCry in 2017, combined with the precision and lethality of the 2014 Sony Pictures or 2015 U.S. government Office of Personnel Management (OPM) attacks.\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Within hours of its discovery, the magnitude of the campaign became frighteningly clear to organizations responsible for U.S. national security, economic competitiveness, and even consumer privacy and security.\u00a0\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">It enables\u00a0U.S. adversaries\u00a0to steal all manners\u00a0of information, from inter-governmental communications to national secrets. Attackers can, in turn, leverage this information to influence or impact U.S. policy through malicious leaks.<\/span><span class=\"s2\">\u202f<\/span><span class=\"s1\"> Every breached agency may have different secondary cyber backdoors planted, meaning that there is no single recipe to evict the intrusion across the federal government.\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">While some may argue\u00a0that government agencies are legitimate targets for nation-state\u00a0spy craft,\u00a0the campaign also impacted private companies.\u00a0Unlike government networks which\u00a0store\u00a0classified information\u00a0on isolated networks,\u00a0private organizations often have critical intellectual property on\u00a0networks with\u00a0access\u00a0to\u00a0the internet. <\/span><span class=\"s2\">\u202f<\/span><span class=\"s1\">Exactly what intellectual property or private data on employees has been stolen will be difficult to determine, and the full extent of\u00a0the\u00a0theft may never be\u00a0known.<\/span><span class=\"s2\">\u202f<\/span><span class=\"s1\">\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">This type of\u00a0attack\u00a0also poses a threat to individuals\u00a0and their families given\u00a0that\u00a0in today\u2019s highly interconnected homes, a breach of consumer electronics companies can result in attackers using their access to smart appliances such as TVs, virtual assistants, and smart phones to steal their information or act as a gateway to attack businesses while users are working remotely from home.\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">What makes this type of attack so dangerous is that it uses\u00a0trusted software to\u00a0bypass\u00a0cyber defenses,\u00a0infiltrate victim organizations with the backdoor and allow the attacker to take any number of secondary steps. This could\u00a0involve\u00a0stealing data,\u00a0destroying data,\u00a0holding\u00a0critical\u00a0systems for ransom, orchestrating system malfunctions that result in kinetic damage,\u00a0or simply implanting additional malicious content throughout the organization to stay in control even after the initial\u00a0threat appears to have passed.\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">McAfee believes the discovery of the SolarWinds-SUNBURST campaign will\u00a0expose attack techniques\u00a0that other malicious actors around the world will seek to duplicate\u00a0in 2021 and beyond.\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 4.53752%;\">\n<h2 style=\"text-align: center;\"><strong>2.<\/strong><\/h2>\n<\/td>\n<td style=\"width: 95.4625%;\">\n<h2><b><span data-contrast=\"auto\">Hacking the Home to Hack the Office<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><b><span data-contrast=\"auto\">By\u00a0<\/span><\/b><b><span data-contrast=\"auto\">Suhail Ansari,\u00a0<\/span><\/b><b><span data-contrast=\"auto\">Dattatraya Kulkarni<\/span><\/b><b><span data-contrast=\"auto\">\u00a0and <a href=\"https:\/\/www.mcafee.com\/blogs\/author\/steve-povolny\/\" target=\"_blank\" rel=\"noopener noreferrer\">Steve Povolny<\/a><\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:360,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h4><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><b><span data-contrast=\"auto\">The increasingly dense overlay of numerous connected devices, apps and web services used in our professional and private lives will grow the connected home\u2019s attack surface to the point that it raises significant new risks for individuals and their employers.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h4>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><span data-contrast=\"auto\">While the threat to connected homes is not new, what is new is the emergence of increased functionality in both home and business devices<\/span><span data-contrast=\"auto\">, and the fact that t<\/span><span data-contrast=\"auto\">hese devices connect to each other more than ever before<\/span><span data-contrast=\"auto\">. Compounding this is the increase in remote work \u2013 meaning many of\u00a0<\/span><span data-contrast=\"auto\">us are using these connected devices more than ever.\u00a0<\/span><\/p>\n<p>In 2020,the global pandemic shifted employees from the office to the home, making the home environment a work environment. In fact, since the onset of the coronavirus pandemic, McAfee Secure Home Platform device monitoring shows a 22% increase in the number of connected home devices globally and a 60% increase in the U.S. Over 70% of the traffic from these devices originated from smart phones, laptops, other PCs and TVs, and over 29% originated from IoT devices such as streaming devices, gaming consoles, wearables, and smart lights.<\/p>\n<p><span data-contrast=\"auto\">McAfee saw\u00a0<\/span><span data-contrast=\"auto\">cybercriminals\u00a0<\/span><span data-contrast=\"auto\">increase their focus on th<\/span><span data-contrast=\"auto\">e<\/span><span data-contrast=\"auto\">\u00a0home attack surface<\/span><span data-contrast=\"auto\">\u00a0with a surge in various phishing\u00a0<\/span><span data-contrast=\"auto\">message schemes across communications channels.\u00a0<\/span><span data-contrast=\"auto\">T<\/span><span data-contrast=\"auto\">he number of malicious\u00a0<\/span><span data-contrast=\"auto\">phishing<\/span><span data-contrast=\"auto\">\u00a0links\u00a0<\/span><span data-contrast=\"auto\">McAfee\u00a0<\/span><span data-contrast=\"auto\">block<\/span><span data-contrast=\"auto\">ed<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">grew over 21% from March to November<\/span><span data-contrast=\"auto\">,\u00a0<\/span><span data-contrast=\"auto\">at an average of\u00a0<\/span><span data-contrast=\"auto\">over 400 links per home.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><span data-contrast=\"auto\">T<\/span><span data-contrast=\"auto\">his increase\u00a0<\/span><span data-contrast=\"auto\">is significant<\/span><span data-contrast=\"auto\">\u00a0and\u00a0<\/span><span data-contrast=\"auto\">suggest<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">\u00a0a flood of phishing messages\u00a0<\/span><span data-contrast=\"auto\">with malicious links<\/span><span data-contrast=\"auto\">\u00a0entered<\/span><span data-contrast=\"auto\">\u00a0home<\/span><span data-contrast=\"auto\">\u00a0networks<\/span><span data-contrast=\"auto\">\u00a0through devices\u00a0<\/span><span data-contrast=\"auto\">with weaker\u00a0<\/span><span data-contrast=\"auto\">security measures<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><span data-contrast=\"auto\">M<\/span><span data-contrast=\"auto\">illions of individual employees\u00a0<\/span><span data-contrast=\"auto\">have\u00a0<\/span><span data-contrast=\"auto\">bec<\/span><span data-contrast=\"auto\">o<\/span><span data-contrast=\"auto\">me\u00a0<\/span><span data-contrast=\"auto\">responsible for their\u00a0<\/span><span data-contrast=\"auto\">employer\u2019s<\/span><span data-contrast=\"auto\">\u00a0IT<\/span><span data-contrast=\"auto\">\u00a0security<\/span><span data-contrast=\"auto\">\u00a0in a home office filled with\u00a0<\/span><span data-contrast=\"auto\">\u201c<\/span><span data-contrast=\"auto\">soft<\/span><span data-contrast=\"auto\">\u201d<\/span><span data-contrast=\"auto\">\u00a0targets<\/span><span data-contrast=\"auto\">,\u00a0<\/span><span data-contrast=\"auto\">unprotected\u00a0<\/span><span data-contrast=\"auto\">devices from the kitchen, to the family room, to the bedroom<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-contrast=\"auto\">Many of these home devices are\u00a0<\/span><span data-contrast=\"auto\">\u201corphaned\u201d\u00a0<\/span><span data-contrast=\"auto\">in that\u00a0<\/span><span data-contrast=\"auto\">their manufacturers fail to properly support the<\/span><span data-contrast=\"auto\">m<\/span><span data-contrast=\"auto\">\u00a0with security updates addressing new threats or vulnerabilities.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This contrasts with a corporate office environment filled with devices\u00a0<\/span><span data-contrast=\"auto\">\u201chardened\u201d<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">by<\/span><span data-contrast=\"auto\">\u00a0enterprise-grade security measures.\u00a0<\/span><span data-contrast=\"auto\">We now work with consumer-grade networking equipment\u00a0<\/span><span data-contrast=\"auto\">configured by\u00a0<\/span><span data-contrast=\"auto\">\u201cus\u201d<\/span><span data-contrast=\"auto\">\u00a0and lacking the\u00a0<\/span><span data-contrast=\"auto\">central manage<\/span><span data-contrast=\"auto\">ment, regular software updates<\/span><span data-contrast=\"auto\">\u00a0and\u00a0<\/span><span data-contrast=\"auto\">security\u00a0<\/span><span data-contrast=\"auto\">monitor<\/span><span data-contrast=\"auto\">ing of the enterprise<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Because of this,\u00a0<\/span><span data-contrast=\"auto\">w<\/span><span data-contrast=\"auto\">e believe cybercriminals will advance the home as an attack surface for campaigns targeting<\/span><span data-contrast=\"auto\">\u00a0not only our families<\/span><span data-contrast=\"auto\">\u00a0but also<\/span><span data-contrast=\"auto\">\u00a0corporations. The hackers will take advantage of\u00a0<\/span><span data-contrast=\"auto\">the home\u2019s\u00a0<\/span><span data-contrast=\"auto\">lack of regular firmware updates, lack of security mitigation features, weak privacy policies, vulnerability exploits, and user susceptibility to social engineering.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">By compromising the home environment, these malicious actors will launch\u00a0<\/span><span data-contrast=\"auto\">a variety of\u00a0<\/span><span data-contrast=\"auto\">attacks on\u00a0<\/span><span data-contrast=\"auto\">corporate as well as consumer devices in 2021.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 4.53752%;\">\n<h2 style=\"text-align: center;\"><strong>3.<\/strong><\/h2>\n<\/td>\n<td style=\"width: 95.4625%;\">\n<h2><b><span data-contrast=\"auto\">Attacks <\/span><\/b><b><span data-contrast=\"auto\">on Cloud Platforms Become Highly Mechanized<\/span><\/b><b><span data-contrast=\"auto\">\u00a0<\/span><\/b><b><span data-contrast=\"auto\">and Handcrafted<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><b><span data-contrast=\"auto\">By Sandeep Chandana\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h4><b><span data-contrast=\"auto\">Attacks on cloud platforms will\u00a0<\/span><\/b><b><span data-contrast=\"auto\">evolve<\/span><\/b><b><span data-contrast=\"auto\">\u00a0into a highly polarized state where they are either \u201cmechanized and widespread\u201d or \u201c<\/span><\/b><b><span data-contrast=\"auto\">targeted\u00a0<\/span><\/b><b><span data-contrast=\"auto\">and precisely handcrafted\u201d.\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h4>\n<p class=\"p1\"><span class=\"s1\">The COVID-19 pandemic\u00a0has also\u00a0hastened the pace of the corporate IT transition to the cloud,\u00a0accelerating the potential for new\u00a0corporate\u00a0cloud-related attack schemes.\u00a0With increased cloud adoption and the large number of enterprises working from home, not only is there a growing number of cloud users but also a lot more data both in motion and being transacted.\u00a0\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">\u00a0McAfee cloud usage data from more than 30 million McAfee MVISION Cloud users worldwide shows a 50% increase overall in enterprise cloud use across all industries the first four months of 2020. Our analysis showed an increase across all cloud categories, usage of collaboration services such as Microsoft O365 by 123%, increase in use of business services such as Salesforce by 61% and\u00a0the\u00a0largest growth in\u00a0collaboration services such as Cisco Webex (600%), Zoom (+350%), Microsoft Teams (+300%), and Slack (+200%). From January to April 2020, corporate cloud traffic from unmanaged devices increased 100% across all verticals.\u00a0\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">\u00a0During the same period, McAfee witnessed a surge in attacks on cloud accounts, an estimated 630% increase overall, with variations in the sectors that were targeted. Transportation led vertical industries with a 1,350% increase in cloud attacks, followed by education (+1,114%), government (+773%), manufacturing (+679%), financial services (+571%) and energy and utilities (+472%).\u00a0\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">The increasing proportion of unmanaged devices accessing the enterprise cloud has effectively made home networks an extension of the enterprise infrastructure. Cybercriminals will develop new, highly mechanized, widespread attacks for better efficacy against thousands of heterogenous home networks.\u00a0\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">One example could be a widespread brute force attack against O365 users, where the attacker\u00a0seeks to\u00a0leverage stolen credentials and exploit\u00a0users\u2019\u00a0poor practice of\u00a0re-using\u00a0passwords across different platforms and applications.\u00a0As many as 65% of\u00a0users reuse the same password for multiple or all accounts according to a 2019 security survey conducted by Google.\u00a0Where an attacker would\u00a0traditionally need to\u00a0manually encode first and last name combinations to find valid usernames, a learning algorithm could be used to predict O365 username patterns.\u00a0\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Additionally, cybercriminals could use AI and ML to bypass traditional network filtering technologies deployed to protect cloud instances. Instead of launching a classic brute force attack from compromised IPs until the IPs are blocked, resource optimization algorithms will be used to make sure the compromised IPs launch attacks against multiple services and sectors, to maximize the lifespan of compromised IPs used for the attacks. Distributed algorithms and reinforcement learning will be leveraged to identify attack plans primarily focused on avoiding account lockouts.\u00a0\u00a0\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">McAfee also predicts that, as enterprise cloud security postures mature, attackers will be forced to handcraft highly targeted exploits for specific enterprises, users and applications.\u00a0\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">The recent Capital One breach was an example of an advanced attack of this kind. The attack was thoroughly cloud-native. It was sophisticated and intricate in that a number of vulnerabilities and misconfigurations across cloud applications (and infrastructure) were exploited and chained. It was not a matter of chance that the hackers were successful, as the attack was very well hand-crafted.\u00a0\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">\u00a0We\u00a0believe attackers will\u00a0start leveraging threat surfaces across devices, networks\u00a0and the cloud\u00a0in these ways\u00a0in the months and years ahead.\u00a0<\/span><\/p>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 4.53752%;\">\n<h2 style=\"text-align: center;\"><strong>4.<\/strong><\/h2>\n<\/td>\n<td style=\"width: 95.4625%;\">\n<h2><b><span data-contrast=\"auto\">New Mobile Payment Scams<\/span><\/b><\/h2>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><b><span data-contrast=\"auto\">By <\/span><\/b><b><span data-contrast=\"auto\">Suhail Ansari and\u00a0<\/span><\/b><b><span data-contrast=\"auto\">Dattatraya Kulkarni<\/span><\/b><\/p>\n<h4><b>As users become more and more reliant on mobile payments, cybercriminals will increasingly seek to exploit and defraud users with scam SMS phishing or smishing messages containing malicious payment URLs.<\/b><\/h4>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><span data-contrast=\"auto\">Mobile payments have become more and more popular as a convenient mechanism to conduct transactions.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">A\u00a0<\/span><a href=\"https:\/\/blog.dataart.com\/what-to-expect-from-payment-trends-in-2021-and-beyond\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Worldpay Global Payments Report for 2020<\/span><\/a><span data-contrast=\"auto\">\u00a0estimated that 41% of payments today are on mobile<\/span><span data-contrast=\"auto\">\u00a0devices<\/span><span data-contrast=\"auto\">, and<\/span><span data-contrast=\"auto\">\u00a0this number<\/span><span data-contrast=\"auto\">\u00a0looks<\/span><span data-contrast=\"auto\">\u00a0to<\/span><span data-contrast=\"auto\">\u00a0increase<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">\u00a0at the expense\u00a0<\/span><span data-contrast=\"auto\">of\u00a0<\/span><span data-contrast=\"auto\">traditional credit and debit cards by 2023.\u00a0<\/span><span data-contrast=\"auto\">An\u00a0<\/span><a href=\"https:\/\/www.alliedmarketresearch.com\/mobile-payments-market\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"auto\">October\u00a0<\/span><\/a><span data-contrast=\"auto\">2020\u00a0<\/span><span data-contrast=\"auto\">study by Allied Market Research<\/span><span data-contrast=\"auto\">\u00a0found that\u00a0<\/span><span data-contrast=\"auto\">the\u00a0<\/span><span data-contrast=\"auto\">global mobile payment market size was valued at $1.48 trillion in 2019, and is projected to reach $12.06 trillion by 2027, growing at a\u00a0<\/span><span data-contrast=\"auto\">comp<\/span><span data-contrast=\"auto\">ound annual growth rate\u00a0<\/span><span data-contrast=\"auto\">of 30.1% from 2020 to 2027.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Additionally, the COVID-19 pandemic has driven the adoption of mobile payment methods higher as consumers have sought to avoid contact-based payments such as cash or physical credit cards.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">But fraudsters have followed the money to mobil<\/span><span data-contrast=\"auto\">e<\/span><span data-contrast=\"auto\">, pivoting from<\/span><span data-contrast=\"auto\">\u00a0PC<\/span><span data-contrast=\"auto\">\u00a0browsers and credit cards to mobile<\/span><span data-contrast=\"auto\">\u00a0payments<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0According to<\/span><span data-contrast=\"auto\">\u00a0research by<\/span><span data-contrast=\"auto\">\u00a0<\/span><a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/mobile-app-fraud-jumped-in-q1-as-attackers-pivot-from-browsers\/d\/d-id\/1338336\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">RSA<\/span><span data-contrast=\"none\">\u2019s<\/span><span data-contrast=\"none\">\u00a0Fraud and Risk Intelligence <\/span><\/a><span class=\"s1\">team, 72% of cyber fraud activity involved the mobile channel in the fourth quarter of 2019. The researchers observed that this represented \u201cthe highest percentage of fraud involving mobile apps in nearly two years and underscores a broader shift away from fraud involving web browsers on PCs.\u201d\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">McAfee predicts there will be an increase in \u201creceive\u201d-based mobile payment exploits, where a user receives a phishing email, direct message or smishing message telling him that he can receive a payment, transaction refund or cash prize by clicking on a malicious payment URL. Instead of receiving a payment, however, the user has been conned into sending a payment from his account.\u00a0\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">This could take shape in schemes where fraudsters set up a fake call center using a product return and servicing scam, where the actors send a link via email or SMS, offering a refund via a mobile payment app, but the user is unaware that they are agreeing to pay versus receiving a refund. The figures below show the fraudulent schemes in action.\u00a0\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Mobile wallets are making efforts to make it easier for users to understand whether they are paying or receiving<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">U<\/span><span data-contrast=\"auto\">nfortunately, as the payment methods p<\/span><span data-contrast=\"auto\">roliferate, fraudsters succeed in finding victims who either cannot disti<\/span><span data-contrast=\"auto\">nguish credit from debit or\u00a0<\/span><span data-contrast=\"auto\">can be<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">promp<\/span><span data-contrast=\"auto\">ted\u00a0<\/span><span data-contrast=\"auto\">into quick action\u00a0<\/span><span data-contrast=\"auto\">b<\/span><span data-contrast=\"auto\">y smart social engineering.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Governments and banks are making painstaking efforts to educate users to understand the use of\u00a0<\/span><span data-contrast=\"auto\">one-time passwords (<\/span><span data-contrast=\"auto\">OTPs<\/span><span data-contrast=\"auto\">)<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">and that<\/span><span data-contrast=\"auto\">\u00a0they<\/span><span data-contrast=\"auto\">\u00a0should not be shared<\/span><span data-contrast=\"auto\">. Adoption of frameworks such\u00a0<\/span><a href=\"https:\/\/www.fcc.gov\/call-authentication\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">as<\/span><span data-contrast=\"none\">\u00a0caller ID<\/span><span data-contrast=\"none\">\u00a0authentication<\/span><\/a><span data-contrast=\"auto\">\u00a0(also known as<\/span><span data-contrast=\"auto\">\u00a0STIR\/SHAKEN<\/span><span data-contrast=\"auto\">) help in ensuring that the caller ID is not masked by fraudster<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">, but\u00a0<\/span><span data-contrast=\"auto\">they\u00a0<\/span><span data-contrast=\"auto\">do not prevent a fraud<\/span><span data-contrast=\"auto\">ster from registering an entity that has a name close to the genuine\u00a0<\/span><span data-contrast=\"auto\">provider of service.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In the same way th<\/span><span data-contrast=\"auto\">at mobile\u00a0<\/span><span data-contrast=\"auto\">apps have simplified the ability to conduct transactions,\u00a0<\/span><span data-contrast=\"auto\">McAfee predicts\u00a0<\/span><span data-contrast=\"auto\">the technology\u00a0<\/span><span data-contrast=\"auto\">is making it\u00a0<\/span><span data-contrast=\"auto\">easier to\u00a0<\/span><span data-contrast=\"auto\">take advantage of\u00a0<\/span><span data-contrast=\"auto\">the\u00a0<\/span><span data-contrast=\"auto\">convenience for fraudulent purposes.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 4.53752%;\">\n<h2 style=\"text-align: center;\"><strong>5.<\/strong><\/h2>\n<\/td>\n<td style=\"width: 95.4625%;\">\n<h2><b><span data-contrast=\"auto\">Qshing<\/span><\/b><b><span data-contrast=\"auto\">: QR Code Abuse<\/span><\/b><b><span data-contrast=\"auto\">\u00a0in the Age of COVID<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><b><span data-contrast=\"auto\">By\u00a0<\/span><\/b><b><span data-contrast=\"auto\">Suhail Ansari and\u00a0<\/span><\/b><b><span data-contrast=\"auto\">Dattatraya Kulkarni<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:360,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h4><b><span data-contrast=\"auto\">Cybercriminals will seek new and ever cleverer ways to use social engineering\u202fand QR Code practices\u202fto gain access to consumer victims\u2019 personal data.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h4>\n<p><span data-contrast=\"auto\">The<\/span><span data-contrast=\"auto\">\u00a0global pandemic\u00a0<\/span><span data-contrast=\"auto\">has\u00a0<\/span><span data-contrast=\"auto\">created the need for all of us to operate and transact\u00a0<\/span><span data-contrast=\"auto\">in all areas of our lives in a \u201ccontactless\u201d way.<\/span><span data-contrast=\"auto\">\u00a0Accordingly, it should come as no surprise that\u00a0<\/span><span data-contrast=\"auto\">QR codes have emerged as a convenient input mechanism to make mobile transactions\u00a0<\/span><span data-contrast=\"auto\">more\u00a0<\/span><span data-contrast=\"auto\">efficient.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.mobileiron.com\/sites\/default\/files\/Datasheets\/qr-codes\/QR-Code-Sentiment-Data.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">QR code usage<\/span><\/a><span data-contrast=\"auto\">\u00a0has proliferated into many areas, including payments, product marketing, packaging, restaurants, retail, and recreation just to name a few.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"none\">QR codes are helping limit direct contact between businesses and consumers in every setting from restaurants to personal care salons, to fitness studios. They allow them to easily scan the code,\u202fshop for services or items offered, and easily purchase them.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A\u00a0<\/span><span data-contrast=\"auto\">September 2020 survey by\u00a0<\/span><span data-contrast=\"auto\">MobileIron<\/span><span data-contrast=\"auto\">\u00a0found that 86% of respondents scanned a QR code over the course of the previous year and over half (54%) reported an increase in the use of such codes since the pandemic began.\u00a0<\/span><span data-contrast=\"auto\">Respondents felt most secure using QR codes at restaurants or bars (46%) and retailers (38%).\u00a0<\/span><span data-contrast=\"auto\">Two-thirds (67%) believe that the technology makes life easier in a touchless world and over half (58%) wish to\u00a0<\/span><span data-contrast=\"auto\">see it used more broadly in the future.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">In just the area of\u00a0<\/span><a href=\"https:\/\/www.qrcode-tiger.com\/qr-code-statistics\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">discount\u00a0<\/span><span data-contrast=\"none\">coupons<\/span><\/a><span data-contrast=\"none\">,<\/span><span data-contrast=\"none\">\u00a0an estimated 1.7 billion coupons<\/span><span data-contrast=\"none\">\u00a0using QR codes were\u00a0<\/span><span data-contrast=\"none\">scanned\u00a0<\/span><span data-contrast=\"none\">globally\u00a0<\/span><span data-contrast=\"none\">in 2017, and that number is expected t<\/span><span data-contrast=\"none\">o increase by a factor of three to 5.3 billion by 2022<\/span><span data-contrast=\"none\">.\u00a0<\/span><span data-contrast=\"none\">In just four year<\/span><span data-contrast=\"none\">s<\/span><span data-contrast=\"none\">, from 2014 to 2018, the use of QR codes<\/span><span data-contrast=\"none\">\u00a0on consumer product packaging in Korea and Japan increased by 83%<\/span><span data-contrast=\"none\">.\u00a0<\/span><span data-contrast=\"auto\">The use of QR codes\u00a0<\/span><span data-contrast=\"auto\">in<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">such\u00a0<\/span><span data-contrast=\"auto\">\u201csmart\u201d\u00a0<\/span><span data-contrast=\"auto\">packaging is increasing at a<\/span><span data-contrast=\"auto\">n annual\u00a0<\/span><span data-contrast=\"auto\">rate of 8% globally.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">I<\/span><span data-contrast=\"auto\">n India, the <\/span><a href=\"https:\/\/blog.beaconstac.com\/2019\/12\/qr-code-statistics\/#Chapter-8:-QR-Codes-adoption-by-governments\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">government<\/span><span data-contrast=\"none\">\u2019<\/span><span data-contrast=\"none\">s<\/span><\/a><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">Unique Identification Authority of India (<\/span><span data-contrast=\"auto\">UIDAI<\/span><span data-contrast=\"auto\">)<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">uses QR codes in association with\u00a0<\/span><span data-contrast=\"none\">Aadhaar,\u00a0<\/span><span data-contrast=\"auto\">India\u2019s<\/span><span data-contrast=\"auto\">\u00a0unique<\/span><span data-contrast=\"auto\">\u00a0ID number,\u00a0<\/span><span data-contrast=\"auto\">to enable readers to\u00a0<\/span><span data-contrast=\"auto\">download<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">citizens\u2019\u00a0<\/span><span data-contrast=\"auto\">demographic information<\/span><span data-contrast=\"auto\">\u00a0as well as their photographs<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">However,\u00a0<\/span><span data-contrast=\"auto\">the technicalities of QR codes are something of a mystery to most users<\/span><span data-contrast=\"auto\">, and that makes them potentially dangerous if cybercriminals seek to exploit them to target victims.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">MobileIron\u00a0<\/span><span data-contrast=\"auto\">report found that whereas 69% of respondents believe the<\/span><span data-contrast=\"auto\">y<\/span><span data-contrast=\"auto\">\u00a0can distinguish a malicious URL<\/span><span data-contrast=\"auto\">\u00a0based on its familiar text-based format<\/span><span data-contrast=\"auto\">, only 37% believe they can distinguish a malicious QR code<\/span><span data-contrast=\"auto\">\u00a0using\u00a0<\/span><span data-contrast=\"auto\">its unique dot pattern format<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-contrast=\"none\">Give<\/span><span data-contrast=\"none\">n<\/span><span data-contrast=\"none\">\u00a0that QR codes are designed precisely to hide the text of the URL, users find it difficult to identify and even suspect malicious QR codes.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Almost two-thirds (61%) of respondents know that QR codes can open a URL and almost half (49%) know that a QR code can download an application. But fewer than one-third (31%) realize that a QR code can make a payment, cause a user to follow someone on social media (22%), or start a phone call (21%). A quarter of respondents admit scanning a QR code that did something unexpected (such as take them to a suspicious website)<\/span><span data-contrast=\"auto\">, and 16% admitted that they were unsure if a QR code actually did what it was intended to do.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">It is therefore no surprise that QR codes have been used in phishing schemes to avoid anti-phishing solutions\u2019 attempts to identify malicious URLs within email messages. They can also be used on webpages or social media.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.brusselstimes.com\/news\/belgium-all-news\/90061\/police-issue-warning-about-qr-code-fraud-scam-banking-police-computer-crime-smartphone\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">In such schemes<\/span><\/a><span data-contrast=\"none\">, <\/span><span class=\"s1\">victims scan fraudulent QRs and find themselves taken to malicious websites where they are asked to provide login, personal info, usernames and passwords, and payment information, which criminals then steal. The sites could also be used to simply download malicious programs onto a user\u2019s device.\u00a0\u00a0<\/span><\/p>\n<p><span class=\"s1\">McAfee<\/span><span class=\"s2\">\u202f <\/span><span class=\"s1\">predicts that hackers will\u00a0increasingly use these\u00a0QR code\u00a0schemes\u00a0and\u00a0broaden them using\u00a0social engineering<\/span><span class=\"s2\">\u202f<\/span><span class=\"s1\">techniques. For instance, knowing that business<\/span><span class=\"s2\">\u202f<\/span><span class=\"s1\">owners<\/span><span class=\"s2\">\u202f<\/span><span class=\"s1\">are<\/span><span class=\"s2\">\u202f<\/span><span class=\"s1\">looking<\/span><span class=\"s2\">\u202f<\/span><span class=\"s1\">to<\/span><span class=\"s2\">\u202f<\/span><span class=\"s1\">download\u00a0QR code generator\u00a0apps, bad actors<\/span><span class=\"s2\">\u202f<\/span><span class=\"s1\">will<\/span><span class=\"s2\">\u202f<\/span><span class=\"s1\">entice<\/span><span class=\"s2\">\u202f<\/span><span class=\"s1\">consumers<\/span><span class=\"s2\">\u202f<\/span><span class=\"s1\">into downloading malicious QR code generator apps<\/span><span class=\"s2\">\u202f<\/span><span class=\"s1\">that pretend to do the same.<\/span><span class=\"s2\">\u202f<\/span><span class=\"s1\">In the process of generating the QR code (or even pretending to be generating the correct QR code), the malicious apps will steal the<\/span><span class=\"s2\">\u202f<\/span><span class=\"s1\">victim\u2019s\u00a0sensitive\u00a0data, which scammers could then use for a variety of fraudulent purposes.\u00a0\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Although the QR codes themselves are a secure\u00a0and convenient\u00a0mechanism,\u00a0we expect\u00a0them\u00a0to be misused by bad actors\u00a0in 2021 and beyond.\u00a0<\/span><\/p>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 4.53752%;\">\n<h2 style=\"text-align: center;\"><strong>6.<\/strong><\/h2>\n<\/td>\n<td style=\"width: 95.4625%;\">\n<h2><b><span data-contrast=\"auto\">Social Networks <\/span><\/b><b><span data-contrast=\"auto\">as Workplace Attack Vectors<\/span><\/b><b><span data-contrast=\"auto\">\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><b><span data-contrast=\"auto\">By <a href=\"https:\/\/www.mcafee.com\/blogs\/author\/raj-samani\/\" target=\"_blank\" rel=\"noopener noreferrer\">Raj Samani<\/a><\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:360,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h4><b><span data-contrast=\"auto\">McAfee predict<\/span><\/b><b><span data-contrast=\"auto\">s<\/span><\/b><b><span data-contrast=\"auto\">\u00a0that sophisticated cyber adversaries will increasingly target, engage and compromise corporate victims using social networks as an attack vector.\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h4>\n<p><span data-contrast=\"auto\">Cyber adversaries have traditionally relied heavily on phishing emails as an attack vector for compromising organizations through individual employees. However,\u00a0<\/span><span data-contrast=\"auto\">as organizations have implement<\/span><span data-contrast=\"auto\">ed<\/span><span data-contrast=\"auto\">\u00a0spam detection, data loss prevention (DLP) and other solutions to prevent phishing attempts on corporate email accounts, more sophisticated adversaries a<\/span><span data-contrast=\"auto\">re\u00a0<\/span><span data-contrast=\"auto\">pivot<\/span><span data-contrast=\"auto\">ing<\/span><span data-contrast=\"auto\">\u00a0to target employees through social networking platforms to which these increasingly effective defenses cannot be applied.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">McAfee has observed\u00a0<\/span><span data-contrast=\"auto\">such<\/span><span data-contrast=\"auto\">\u00a0threat actors increasingly using\u00a0<\/span><span data-contrast=\"auto\">the messaging features of\u00a0<\/span><span data-contrast=\"auto\">LinkedIn, What\u2019s App, Facebook and Twitter to engage, develop relationships with and then compromise\u00a0<\/span><span data-contrast=\"auto\">corporate\u00a0<\/span><span data-contrast=\"auto\">employees<\/span><span data-contrast=\"auto\">. Through these victims,\u00a0<\/span><span data-contrast=\"auto\">adversaries\u00a0<\/span><span data-contrast=\"auto\">compromise\u00a0<\/span><span data-contrast=\"auto\">the broader enterprises that\u00a0<\/span><span data-contrast=\"auto\">employ\u00a0<\/span><span data-contrast=\"auto\">them. McAfee predicts that such actors will seek to broaden the use of this attack vector in 2021 and beyond for a variety of reasons.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Malicious actors have used the social network platforms in\u00a0<\/span><span data-contrast=\"auto\">broad scoped schemes to perpetrate<\/span><span data-contrast=\"auto\">\u00a0relatively\u00a0<\/span><span data-contrast=\"auto\">low-level<\/span><span data-contrast=\"auto\">\u00a0criminal scams.\u00a0<\/span><span data-contrast=\"auto\">However,<\/span><span data-contrast=\"auto\">\u00a0prominent actors such as\u00a0<\/span><a href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2019\/07\/22\/critical-linkedin-warning-as-irans-hackers-send-fake-invites-laced-with-malware\/?sh=4ff821c46ac1\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">APT34<\/span><\/a><span data-contrast=\"auto\">,\u00a0<\/span><a href=\"https:\/\/threatpost.com\/charming-kitten-whatsapp-linkedin-effort\/158813\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Charming Kitten<\/span><\/a><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">and\u00a0<\/span><a href=\"https:\/\/www.secureworks.com\/research\/suspected-iran-based-hacker-group-creates-network-of-fake-linkedin-profiles\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Threat Group-2889<\/span><\/a><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"auto\">(among\u00a0<\/span><a href=\"https:\/\/www.theguardian.com\/technology\/2017\/mar\/15\/twitter-turkey-accounts-hack-tweet-swastikas-pro-erdogan\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">others<\/span><\/a><span data-contrast=\"auto\">)<\/span><span data-contrast=\"auto\">\u00a0have been identified using these platforms for higher-value, more targeted campaigns on the strength of the medium\u2019s capacity for enabling customize<\/span><span data-contrast=\"auto\">d<\/span><span data-contrast=\"auto\">\u00a0content for specific types of victims.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/operation-north-star-a-job-offer-thats-too-good-to-be-true\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Operation North Star<\/span><\/a><span data-contrast=\"auto\">\u00a0demonstrates\u00a0<\/span><span data-contrast=\"auto\">a\u00a0<\/span><span data-contrast=\"auto\">state-of-the-art<\/span><span data-contrast=\"auto\">\u00a0attack of this kind.\u00a0<\/span><span data-contrast=\"auto\">D<\/span><span data-contrast=\"auto\">iscovered and exposed by McAfee in August 2020,\u00a0<\/span><span data-contrast=\"auto\">the\u00a0<\/span><span data-contrast=\"auto\">campaign\u00a0<\/span><span data-contrast=\"auto\">showed how lax social media privacy controls,\u202feas<\/span><span data-contrast=\"auto\">e of<\/span><span data-contrast=\"auto\">\u202fdevelopment and use\u202fof fake LinkedIn user accounts and job descriptions could be used to lure and attack defense sector employees.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Just as individuals and organizations engage potential consumer customers on social platforms by gathering information, developing specialized content, and conducting targeted interactions with customers, malicious actors can similarly use these platform attributes to target high value employees with a deeper level of engagement.\u00a0\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Additionally, individual employees engage with social networks in a capacity that straddles both their professional and personal lives. While enterprises assert security controls over corporate-issued devices and place restrictions on how consumer devices access corporate IT assets, user activity on social network platforms is not monitored or controlled in the same way. As mentioned, LinkedIn and Twitter direct messaging will not be the only vectors of concern for the corporate security operations center (SOC).\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">While it is unlikely that email will ever be replaced as an attack vector, McAfee foresees this social network platform vector becoming more common in 2021 and beyond, particularly among the most advanced actors.\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The December 2020 revelations around the SUNBURST campaigns exploiting the SolarWinds Orion platform have revealed a new attack vector \u2013&#8230;<\/p>\n","protected":false},"author":674,"featured_media":115990,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[3973],"class_list":["post-115915","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>2021 Threat Predictions Report | McAfee Blog<\/title>\n<meta name=\"description\" content=\"The December 2020 revelations around the SUNBURST campaigns exploiting the SolarWinds Orion platform have revealed a new attack vector \u2013 the supply chain\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2021 Threat Predictions Report | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"The December 2020 revelations around the SUNBURST campaigns exploiting the SolarWinds Orion platform have revealed a new attack vector \u2013 the supply chain\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2021-threat-predictions-report\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-13T09:00:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-25T06:35:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/McAfee_2021ThreatPredictions_General.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"209\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2021-threat-predictions-report\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2021-threat-predictions-report\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"2021 Threat Predictions Report\",\"datePublished\":\"2021-01-13T09:00:12+00:00\",\"dateModified\":\"2024-06-25T06:35:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2021-threat-predictions-report\/\"},\"wordCount\":3394,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2021-threat-predictions-report\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/McAfee_2021ThreatPredictions_General.png\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2021-threat-predictions-report\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2021-threat-predictions-report\/\",\"name\":\"2021 Threat Predictions Report | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2021-threat-predictions-report\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2021-threat-predictions-report\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/McAfee_2021ThreatPredictions_General.png\",\"datePublished\":\"2021-01-13T09:00:12+00:00\",\"dateModified\":\"2024-06-25T06:35:39+00:00\",\"description\":\"The December 2020 revelations around the SUNBURST campaigns exploiting the SolarWinds Orion platform have revealed a new attack vector \u2013 the supply chain\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2021-threat-predictions-report\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2021-threat-predictions-report\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2021-threat-predictions-report\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/McAfee_2021ThreatPredictions_General.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/McAfee_2021ThreatPredictions_General.png\",\"width\":400,\"height\":209},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2021-threat-predictions-report\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"2021 Threat Predictions Report\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2021 Threat Predictions Report | McAfee Blog","description":"The December 2020 revelations around the SUNBURST campaigns exploiting the SolarWinds Orion platform have revealed a new attack vector \u2013 the supply chain","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"2021 Threat Predictions Report | McAfee Blog","og_description":"The December 2020 revelations around the SUNBURST campaigns exploiting the SolarWinds Orion platform have revealed a new attack vector \u2013 the supply chain","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2021-threat-predictions-report\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2021-01-13T09:00:12+00:00","article_modified_time":"2024-06-25T06:35:39+00:00","og_image":[{"width":400,"height":209,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/McAfee_2021ThreatPredictions_General.png","type":"image\/png"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2021-threat-predictions-report\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2021-threat-predictions-report\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"2021 Threat Predictions Report","datePublished":"2021-01-13T09:00:12+00:00","dateModified":"2024-06-25T06:35:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2021-threat-predictions-report\/"},"wordCount":3394,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2021-threat-predictions-report\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/McAfee_2021ThreatPredictions_General.png","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2021-threat-predictions-report\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2021-threat-predictions-report\/","name":"2021 Threat Predictions Report | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2021-threat-predictions-report\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2021-threat-predictions-report\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/McAfee_2021ThreatPredictions_General.png","datePublished":"2021-01-13T09:00:12+00:00","dateModified":"2024-06-25T06:35:39+00:00","description":"The December 2020 revelations around the SUNBURST campaigns exploiting the SolarWinds Orion platform have revealed a new attack vector \u2013 the supply chain","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2021-threat-predictions-report\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2021-threat-predictions-report\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2021-threat-predictions-report\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/McAfee_2021ThreatPredictions_General.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/McAfee_2021ThreatPredictions_General.png","width":400,"height":209},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2021-threat-predictions-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"2021 Threat Predictions Report"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/115915","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=115915"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/115915\/revisions"}],"predecessor-version":[{"id":195248,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/115915\/revisions\/195248"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/115990"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=115915"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=115915"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=115915"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=115915"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}