{"id":161609,"date":"2022-12-06T06:00:57","date_gmt":"2022-12-06T14:00:57","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=161609"},"modified":"2024-07-10T07:02:38","modified_gmt":"2024-07-10T14:02:38","slug":"mcafee-2023-threat-predictions-evolution-and-exploitation","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/security-news\/mcafee-2023-threat-predictions-evolution-and-exploitation\/","title":{"rendered":"McAfee 2023 Threat Predictions: Evolution and Exploitation"},"content":{"rendered":"<p><span data-contrast=\"none\">As 2022 draws to a close, the Threat Research Team at McAfee Labs takes a look forward\u2014offering their predictions for 2023 and how its threat landscape may take shape.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">This year saw the continued evolution of scams, which is unlikely to slow down, as well as greater adoption of Chrome as an operating system. It also saw the introduction of AI tools that are easy and accessible to virtually anyone with a phone or laptop, which will continue to have significant implications, as will the fluctuating popularity of cryptocurrency and the emergence of \u201cWeb3.\u201d\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Advances such as these have set the stage for 2023, which will continue to reshape our interactions with technology\u2014advances that bad actors will try to exploit, and in turn, us.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Yet as the threat landscape continues to evolve, so do the ways we can protect ourselves. With that, we share McAfee\u2019s threat predictions for 2023, along with insights and advice that can help us enjoy the advances to come with confidence.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">AI Goes Mainstream and the Distribution of Disinformation Rises<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">By Steve Grobman, Chief Technology Officer<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Humans have been fascinated by artificial intelligence (AI) for almost as long as we\u2019ve been using computers. And in some cases, even fearful of it. Depictions in pop culture range from HAL, the sentient computer from 2001: A Space Odyssey to Skynet, the self-aware neural network at the center of the Terminator franchise. The reality of current AI technologies is both more complicated and less autonomous than either of these. While AI is rapidly evolving, humans remain at the heart of it, and whether it\u2019s put to beneficial or nefarious use.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Within the last few months, creating AI-generated images, videos, and even voices are no longer strictly left to professionals. Now anyone with a phone or computer can take advantage of the technology using publicly available applications like Open AI\u2019s <\/span><a href=\"https:\/\/openai.com\/dall-e-2\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Dall-E<\/span><\/a><span data-contrast=\"auto\"> or stability.ai\u2019s <\/span><a href=\"https:\/\/stability.ai\/blog\/stable-diffusion-public-release\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Stable Diffusion<\/span><\/a><span data-contrast=\"auto\">. Google has even made <\/span><a href=\"https:\/\/cloud.google.com\/video-intelligence\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">creating AI-generated videos<\/span><\/a><span data-contrast=\"auto\"> easier than ever.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">What does this mean for the future?\u00a0 It means the next generation of content creation is becoming available to the masses and will only continue to evolve. People both at work and at home will have the ability to create the AI-generated content in minutes. Just as desktop publishing, photo editing, and inexpensive photorealistic home printers created major advances that empowered individuals to create content that previously required a professional designer, these technologies will enable sophisticated outputs with minimal expertise or effort.\u00a0\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Advances in desktop publishing and consumer printing also provided benefits to criminals, enabling better counterfeiting and more realistic manipulation of images. Similarly, these emerging next-generation content tools will also be used by a range of bad actors. From cybercriminals to those seeking to falsely influence public opinion, these tools will empower scammers and propagandists to take their tradecraft to the next level with more realistic results and significantly improved efficiency.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This is especially likely to ramp up in 2023 as the U.S. begins the 2024 presidential election cycle in earnest. Globally, the political environment is polarized. The confluence of the emergence of accessible next-generation generative AI tools and what is sure to be a highly contested 2024 election season is a perfect storm for creating and distributing disinformation for political and monetary gain. <\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">We\u2019ll all need to be more mindful of the content we consume and the sources that it originates from. Fact-checking images, videos, and news content, something that\u2019s already on the rise, will continue to be a necessary and valuable part of media consumption.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">New Year, New Scams<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">By Oliver Devane, Security Researcher<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Cryptocurrency scams<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In 2022 we saw several online scams making use of existing content to make crypto scams more believable. One such example was the <\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/crypto-scammers-exploit-elon-musk-speaks-on-cryptocurrency\"><span data-contrast=\"none\">double your money cryptocurrency scam<\/span><\/a><span data-contrast=\"auto\"> that used an old Elon Musk video as a lure. We expect such scams to evolve in 2023 and make use of deep fake videos, as well as audio, to trick victims into parting ways with their hard-earned money.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-161610\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/crypto.png\" alt=\"\" width=\"602\" height=\"337\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/crypto.png 602w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/crypto-300x168.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/crypto-205x115.png 205w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><\/p>\n<h3><b><span data-contrast=\"auto\">Investment scams<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">The financial outlook of 2023 remains uncertain for many people. During these times, people often look for ways to make some extra money and this can lead them vulnerable to social media messages and online ads that offer huge financial gains for little investment.\u202f\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">According to the <\/span><a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2021_IC3Report.pdf\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">IC3 2021<\/span><\/a><span data-contrast=\"auto\"> report, the losses for financial scams increased from $336,469,000 in 2020 to $1,455,943,193 in 2021, this shows that this type of scam is growing by an enormous amount, and we expect this to continue.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Fake loans<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Unfortunately, scammers will often target the most vulnerable people. Fake loan scams are one such scam where the scammers know that the victims are desperate for the loan and therefore are less likely to react to warning signs such as asking for an upfront fee. McAfee predicts that there will be a large increase in these types of scams in 2023. When looking for a loan, always use a trusted provider and be careful of clicking on online ads.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Metaverse<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Metaverses such as Facebook&#8217;s Horizon enable their users to explore an online world that was previously unimaginable. When these platforms are in the early stages, malicious actors will usually attempt to exploit the lack of understanding of how they work and use this to scam people. We have observed phishing campaigns targeting users of these platforms in 2022 and we expect this to increase dramatically in 2023 as more and more users sign up for the platforms.\u00a0\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">The Rise of ChromeOS Threats<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">By Craig Schmugar, McAfee Senior Principal Engineer<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">More than 25 years ago, Windows 95 became the platform of choice not just for millions of users around the globe, but for malware authors targeting those users.\u202fOver the years, Windows has evolved, as has the threat landscape.\u202fToday, Windows 10 and 11 make up the majority of the desktop PC market, but thanks to the rise of the mobile Internet, device diversity has greatly evolved since the advent of Windows 95.\u202f\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Over five years ago, <\/span><a href=\"https:\/\/gs.statcounter.com\/press\/android-overtakes-windows-for-first-time\"><span data-contrast=\"none\">Android overtook Windows as the world&#8217;s most popular OS<\/span><\/a><span data-contrast=\"none\"> and with this shift bad actors have been pursing alternative methods of attack.\u202fThe ultimate vectors are those which impact users across a spectrum of devices.\u202fEmail and web-based scams (some of which are outlined in the blog above) are as prolific as ever as these technologies are ubiquitous across desktop and mobile devices.\u202f<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Meanwhile, other technologies span across desktop and mobile experiences as well. For Google, such cross-platform capabilities are highlighted by increased adoption of ChromeOS and a few underlying technologies.\u202fThis includes 270 million active Android users and a 270% increase in Progressive Web Application (PWA) installations [<\/span><a href=\"https:\/\/chromeos.dev\/\"><span data-contrast=\"none\">https:\/\/chromeos.dev<\/span><\/a><span data-contrast=\"none\">].\u202f ChromeOS\u2019 ability to run Android applications, combined with its wide-spread adoption, provides the climate for increased attention by those with ill intentions.\u202f\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Similarly, adoption of PWAs provide bad actors with additional incentive to deliver deceptive and imposter attacks through this multi-OS channel, including ChromeOS, iOS, MacOS, and Windows.\u202f\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Finally, on the heels of COVID restrictions that impacted schools in various countries, Google reported 50 million students and educators worldwide [<\/span><a href=\"https:\/\/chromeos.dev\/\"><span data-contrast=\"none\">https:\/\/chromeos.dev<\/span><\/a><span data-contrast=\"none\">] using ChromeOS. Many users will be unaware of <\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-cookie-stuffing-chrome-extensions-with-1-4-million-users\/\"><span data-contrast=\"none\">malicious Chrome extensions<\/span><\/a><span data-contrast=\"none\"> lurking in the Chrome Web Store.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">All of this means that the stage is set for a marked increase in threats impacting Chromebook in the year to come. In 2023, we can expect to see Chromebook users among millions of unsuspecting victims that download and run malicious content, whether from malicious Android Apps, Progressive Web Apps, or Chrome Web Store extensions, users should be leery of popups and push notifications urging them to install untrusted apps.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">Web3 Threats will take advantage of FOMO<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">By Fernando Ruiz, Senior Security Researcher<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">Editor\u2019s Note: Web3? FOMO? If you\u2019re already lost, you\u2019re not alone. Web3 is a term some use to encompass decentralized internet services, technologies like Bitcoin and Non-Fungible Tokens (digital art that collectors can purchase with cryptocurrency). Still confused? A lot of people are. This New York Times article is a <\/span><\/i><a href=\"https:\/\/www.nytimes.com\/interactive\/2022\/03\/18\/technology\/web3-definition-internet.html\"><i><span data-contrast=\"none\">good primer on what is currently considered Web3<\/span><\/i><\/a><i><span data-contrast=\"none\">.\u00a0\u00a0<\/span><\/i><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">As for FOMO, that\u2019s just an acronym meaning the \u201cFear of Missing Out.\u201d That nagging feeling, most often felt by extroverts, that others are out there having more fun than them and that they\u2019re missing the party.\u00a0<\/span><\/i><\/p>\n<p><span data-contrast=\"none\">Whether you invest in cryptocurrency or just see the headlines on Twitter, no doubt you\u2019ve seen that the price of cryptocurrency has sharply declined during 2022. These fluctuations are becoming more normal as crypto becomes even more mainstream. It\u2019s very likely that the value of crypto will rise again.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">When the last upturn in valuation happened near the start of the pandemic, the hype about crypto also skyrocketed. Suddenly Bitcoin and other cryptocurrencies were everywhere. Out of that, rose the concept of Web3, with more companies investing in new applications over blockchain (the technology that is the backbone of cryptocurrency).\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">McAfee predicts that the popularity of cryptocurrency will rise again, and consumers will hear much more about Web3 concepts like <\/span><a href=\"https:\/\/www.federalreserve.gov\/econres\/feds\/decentralized-finance-defi-transformative-potential-and-associated-risks.htm\"><span data-contrast=\"none\">decentralized finance<\/span><\/a><span data-contrast=\"none\"> (DeFi), <\/span><a href=\"https:\/\/www.forbes.com\/sites\/cathyhackl\/2021\/06\/01\/what-are-daos-and-why-you-should-pay-attention\/?sh=60e5e8e67305\"><span data-contrast=\"none\">decentralized autonomous organizations<\/span><\/a><span data-contrast=\"none\"> (DAOs), <\/span><span data-contrast=\"none\">self-sovereign identity<\/span><span data-contrast=\"none\"> (SSI) and more.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Some amateur investors, remembering the rapid rise of the value of Bitcoin earlier this decade, won\u2019t want to miss out on what they think will be a great opportunity to get rich quick. It\u2019s this group that bad actors will seek to exploit, offering up links or applications that play on these users\u2019 crypto\/Web3 FOMO.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">As crypto bounces back and initial awareness of decentralization grows in the general population, consumers will begin to explore these Web3 offerings without fully understanding what they mean or what dangers they should be aware of, leaving them open to scams as they invest time and money into crypto or creating their own <\/span><a href=\"https:\/\/www.economist.com\/the-economist-explains\/2021\/10\/12\/what-is-an-nft?utm_medium=cpc.adword.pd&amp;utm_source=google&amp;ppccampaignID=17210591673&amp;ppcadID=&amp;utm_campaign=a.22brand_pmax&amp;utm_content=conversion.direct-response.anonymous&amp;gclid=CjwKCAiAvK2bBhB8EiwAZUbP1MTepNVXVvzw6wQebi8ogy02QVT1lnYOeE19MHzhoOwdfVA8LuWXwhoCD8oQAvD_BwE&amp;gclsrc=aw.ds\"><span data-contrast=\"none\">NFT content<\/span><\/a><span data-contrast=\"none\">. These scams could entice users to click on a link or download an app that appears to legitimately interact with some blockchains, but in actuality:\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Does not have the functionality to interact with any blockchain.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Are designed to collect traditional currency for fees or services that do not actually provide any value.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"none\">Possess aggressive adware that compromises user\u2019s privacy, time, device performance, data usage, and drains their device battery.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">Additionally, when consumers DO hold crypto, NFT, digital land, or other blockchain financial assets they are going to be targeted for more sophisticated threats that can drain their funds: smart contracts, exchanges, digital wallets, and synchronization services can all be associated with hidden authorizations that allow a third party (potentially a bad actor) to take control of the assets.\u202fIt\u2019s important that users read the terms and conditions of any app they download, especially those that will be accessing ANY type of financial institution or currency, whether traditional or crypto.<\/span><b><span data-contrast=\"none\">\u00a0<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Social engineering will also continue to be a top entry point for cybercriminals. The complexity of the attacks will evolve as the technology does, which will require more preparation and understanding of how Web3 applications and tools work in order to safely interact with them.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">What has emerged from the world of Web3 thus far, while exciting, has also expanded attack surfaces and vectors, which we expect to see grow throughout 2023 as Web3 evolves.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As 2022 draws to a close, the Threat Research Team at McAfee Labs takes a look forward\u2014offering their predictions for&#8230;<\/p>\n","protected":false},"author":695,"featured_media":162046,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10667],"tags":[15626,5091,5220,15627],"coauthors":[4136],"class_list":["post-161609","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-news","tag-2023-threat-predictions","tag-ai","tag-cryptocurrency","tag-web3"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>McAfee 2023 Threat Predictions: Evolution and Exploitation | McAfee Blog<\/title>\n<meta name=\"description\" content=\"As 2022 draws to a close, the Threat Research Team at McAfee Labs takes a look forward\u2014offering their predictions for 2023 and how its threat landscape\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"McAfee 2023 Threat Predictions: Evolution and Exploitation | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"As 2022 draws to a close, the Threat Research Team at McAfee Labs takes a look forward\u2014offering their predictions for 2023 and how its threat landscape\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/security-news\/mcafee-2023-threat-predictions-evolution-and-exploitation\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-06T14:00:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-10T14:02:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/300x200-2023-Prediction.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/mcafee-2023-threat-predictions-evolution-and-exploitation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/mcafee-2023-threat-predictions-evolution-and-exploitation\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"McAfee 2023 Threat Predictions: Evolution and Exploitation\",\"datePublished\":\"2022-12-06T14:00:57+00:00\",\"dateModified\":\"2024-07-10T14:02:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/mcafee-2023-threat-predictions-evolution-and-exploitation\/\"},\"wordCount\":1849,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/mcafee-2023-threat-predictions-evolution-and-exploitation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/300x200-2023-Prediction.png\",\"keywords\":[\"2023 threat predictions\",\"AI\",\"cryptocurrency\",\"web3\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/mcafee-2023-threat-predictions-evolution-and-exploitation\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/mcafee-2023-threat-predictions-evolution-and-exploitation\/\",\"name\":\"McAfee 2023 Threat Predictions: Evolution and Exploitation | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/mcafee-2023-threat-predictions-evolution-and-exploitation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/mcafee-2023-threat-predictions-evolution-and-exploitation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/300x200-2023-Prediction.png\",\"datePublished\":\"2022-12-06T14:00:57+00:00\",\"dateModified\":\"2024-07-10T14:02:38+00:00\",\"description\":\"As 2022 draws to a close, the Threat Research Team at McAfee Labs takes a look forward\u2014offering their predictions for 2023 and how its threat landscape\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/mcafee-2023-threat-predictions-evolution-and-exploitation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/security-news\/mcafee-2023-threat-predictions-evolution-and-exploitation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/mcafee-2023-threat-predictions-evolution-and-exploitation\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/300x200-2023-Prediction.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/300x200-2023-Prediction.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/mcafee-2023-threat-predictions-evolution-and-exploitation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security News\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee 2023 Threat Predictions: Evolution and Exploitation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"McAfee 2023 Threat Predictions: Evolution and Exploitation | McAfee Blog","description":"As 2022 draws to a close, the Threat Research Team at McAfee Labs takes a look forward\u2014offering their predictions for 2023 and how its threat landscape","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"McAfee 2023 Threat Predictions: Evolution and Exploitation | McAfee Blog","og_description":"As 2022 draws to a close, the Threat Research Team at McAfee Labs takes a look forward\u2014offering their predictions for 2023 and how its threat landscape","og_url":"https:\/\/www.mcafee.com\/blogs\/security-news\/mcafee-2023-threat-predictions-evolution-and-exploitation\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2022-12-06T14:00:57+00:00","article_modified_time":"2024-07-10T14:02:38+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/300x200-2023-Prediction.png","type":"image\/png"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/mcafee-2023-threat-predictions-evolution-and-exploitation\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/mcafee-2023-threat-predictions-evolution-and-exploitation\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"McAfee 2023 Threat Predictions: Evolution and Exploitation","datePublished":"2022-12-06T14:00:57+00:00","dateModified":"2024-07-10T14:02:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/mcafee-2023-threat-predictions-evolution-and-exploitation\/"},"wordCount":1849,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/mcafee-2023-threat-predictions-evolution-and-exploitation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/300x200-2023-Prediction.png","keywords":["2023 threat predictions","AI","cryptocurrency","web3"],"articleSection":["Security News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/mcafee-2023-threat-predictions-evolution-and-exploitation\/","url":"https:\/\/www.mcafee.com\/blogs\/security-news\/mcafee-2023-threat-predictions-evolution-and-exploitation\/","name":"McAfee 2023 Threat Predictions: Evolution and Exploitation | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/mcafee-2023-threat-predictions-evolution-and-exploitation\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/mcafee-2023-threat-predictions-evolution-and-exploitation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/300x200-2023-Prediction.png","datePublished":"2022-12-06T14:00:57+00:00","dateModified":"2024-07-10T14:02:38+00:00","description":"As 2022 draws to a close, the Threat Research Team at McAfee Labs takes a look forward\u2014offering their predictions for 2023 and how its threat landscape","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/mcafee-2023-threat-predictions-evolution-and-exploitation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/security-news\/mcafee-2023-threat-predictions-evolution-and-exploitation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/mcafee-2023-threat-predictions-evolution-and-exploitation\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/300x200-2023-Prediction.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/300x200-2023-Prediction.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/mcafee-2023-threat-predictions-evolution-and-exploitation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Security News","item":"https:\/\/www.mcafee.com\/blogs\/security-news\/"},{"@type":"ListItem","position":3,"name":"McAfee 2023 Threat Predictions: Evolution and Exploitation"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/161609","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=161609"}],"version-history":[{"count":4,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/161609\/revisions"}],"predecessor-version":[{"id":196398,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/161609\/revisions\/196398"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/162046"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=161609"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=161609"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=161609"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=161609"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}