{"id":92746,"date":"2018-11-29T01:00:11","date_gmt":"2018-11-29T09:00:11","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=92746"},"modified":"2024-02-18T22:33:52","modified_gmt":"2024-02-19T06:33:52","slug":"mcafee-labs-2019-threats-predictions","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/","title":{"rendered":"McAfee Labs 2019 Threats Predictions Report"},"content":{"rendered":"<p><em>These predictions were written by Eoin Carroll, Taylor Dunton, John Fokker, German Lancioni, Lee Munson, Yukihiro Okutomi, Thomas Roccia, Raj Samani, Sekhar Sarukkai, Dan Sommer, and Carl Woodward.<\/em><\/p>\n<p>As 2018 draws to a close, we should perhaps be grateful that the year has not been entirely dominated by <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/security-awareness\/ransomware.html\">ransomware<\/a>, although the rise of the GandCrab and SamSam variants show that the threat remains active. Our predictions for 2019 move away from simply providing an assessment on the rise or fall of a particular threat, and instead focus on current rumblings we see in the cybercriminal underground that we expect to grow into trends and subsequently threats in the wild.<\/p>\n<p>We have witnessed greater collaboration among cybercriminals exploiting the underground market, which has allowed them to develop efficiencies in their products. Cybercriminals have been partnering in this way for years; in 2019 this market economy will only expand. The game of cat and mouse the security industry plays with ransomware developers will escalate, and the industry will need to respond more quickly and effectively than ever before.<\/p>\n<p>Social media has been a part of our lives for more than a decade. Recently, nation-states have infamously used social media platforms to spread misinformation. In 2019, we expect criminals to begin leveraging those tactics for their own gain. Equally, the continued growth of the Internet of Things in the home will inspire criminals to target those devices for monetary gain.<\/p>\n<p>One thing is certain: Our dependency on technology has become ubiquitous. Consider the breaches of identity platforms, with reports of 50 million users being affected. It is no longer the case that a breach is limited to that platform. Everything is connected, and you are only as strong as your weakest link. In the future, we face the question of which of our weakest links will be compromised.<\/p>\n<p>\u2014Raj Samani, Chief Scientist and McAfee Fellow, Advanced Threat Research<\/p>\n<p>Twitter @Raj_Samani<\/p>\n<p>&nbsp;<\/p>\n<h2>Predictions<\/h2>\n<p><a href=\"#underground\"><strong>Cybercriminal Underground to Consolidate, Create More Partnerships to Boost Threats<\/strong><\/a><\/p>\n<p><a href=\"#evasion\"><strong>Artificial Intelligence the Future of Evasion Techniques<\/strong><\/a><\/p>\n<p><a href=\"#synergistic\"><strong>Synergistic Threats Will Multiply, Requiring Combined Responses<\/strong><\/a><\/p>\n<p><a href=\"#extortion\"><strong>Misinformation, Extortion Attempts to Challenge Organizations\u2019 Brands<\/strong><\/a><\/p>\n<p><a href=\"#data\"><strong>Data Exfiltration Attacks to Target the Cloud <\/strong><\/a><\/p>\n<p><a href=\"#digital\"><strong>Voice-Controlled Digital Assistants the Next Vector in Attacking IoT Devices<\/strong><\/a><\/p>\n<p><a href=\"#identity\"><strong>Cybercriminals to Increase Attacks on Identity Platforms and Edge Devices Under Siege<\/strong><\/a><\/p>\n<p><a name=\"underground\"><\/a><\/p>\n<h2>Cybercriminal Underground to Consolidate, Create More Partnerships to Boost Threats<\/h2>\n<p>Hidden hacker forums and chat groups serve as a market for cybercriminals, who can buy malware, exploits, botnets, and other shady services. With these off-the-shelf products, criminals of varying experience and sophistication can easily launch attacks. In 2019, we predict the underground will consolidate, creating fewer but stronger malware-as-a-service families that will actively work together. These increasingly powerful brands will drive more sophisticated cryptocurrency mining, rapid exploitation of new vulnerabilities, and increases in mobile malware and stolen credit cards and credentials.<\/p>\n<p>We expect more affiliates to join the biggest families, due to the ease of operation and strategic alliances with other essential top-level services, including exploit kits, crypter services, Bitcoin mixers, and counter-antimalware services. Two years ago, we saw many of the largest ransomware families, for example, employ affiliate structures. We still see numerous types of <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/security-awareness\/ransomware.html\">ransomware<\/a> pop up, but only a few survive because most cannot attract enough business to compete with the strong brands, which offer higher infection rates as well as operational and financial security. At the moment the largest families actively advertise their goods; business is flourishing because they are strong brands <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/rapidly-evolving-ransomware-gandcrab-version-5-partners-with-crypter-service-for-obfuscation\/\" target=\"_blank\" rel=\"noopener noreferrer\">(see GandCrab)<\/a> allied with other top-level services, such as money laundering or making malware undetectable.<\/p>\n<p>Underground businesses function successfully because they are part of a trust-based system. This may not be a case of \u201chonor among thieves,\u201d yet criminals appear to feel safe, trusting they cannot be touched in the inner circle of their forums. We have seen this trust in the past, for example, with the popular credit card shops in the first decade of the century, which were a leading source of cybercrime until major police action broke the trust model.<\/p>\n<p>As endpoint detection grows stronger, the vulnerable remote desktop protocol (RDP) offers another path for cybercriminals. In 2019 we predict malware, specifically ransomware, will increasingly use RDP as an entry point for an infection. Currently, most underground shops <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/organizations-leave-backdoors-open-to-cheap-remote-desktop-protocol-attacks\/\" target=\"_blank\" rel=\"noopener noreferrer\">advertise RDP access<\/a> for purposes other than ransomware, typically using it as a stepping stone to gain access to Amazon accounts or as a proxy to steal credit cards. Targeted ransomware groups and ransomware-as-a-service (RaaS) models will take advantage of RDP, and we have seen highly successful under-the-radar schemes use this tactic. Attackers find a system with weak RDP, attack it with ransomware, and propagate through networks either living off the land or using worm functionality <a href=\"https:\/\/securingtomorrow.mcafee.com\/executive-perspectives\/analysis-wannacry-ransomware-outbreak\/\" target=\"_blank\" rel=\"noopener noreferrer\">(EternalBlue).<\/a> There is evidence that the author of GandCrab is already working on an RDP option.<\/p>\n<p>We also expect malware related to cryptocurrency mining will become more sophisticated, selecting which currency to mine on a victim\u2019s machine based on the processing hardware <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency\" target=\"_blank\" rel=\"noopener noreferrer\">(WebCobra)<\/a> and the value of a specific currency at a given time.<\/p>\n<p>Next year, we predict the length of a vulnerability\u2019s life, from detection to weaponization, will grow even shorter. We have noticed a trend of cybercriminals becoming more agile in their development process. They gather data on flaws from online forums and the Common Vulnerabilities and Exposures database to add to their malware. We predict that criminals will sometimes take a day or only hours to implement attacks against the latest weaknesses in software and hardware.<\/p>\n<p>We expect to see an increase in underground discussions on mobile malware, mostly focused on Android, regarding botnets, banking fraud, ransomware, and bypassing two-factor authentication security. The value of exploiting the mobile platform is currently underestimated as phones offer a lot to cybercriminals given the amount of access they have to sensitive information such as bank accounts.<\/p>\n<p>Credit card fraud and the demand for stolen credit card details will continue, with an increased focus on online skimming operations that target third-party payment platforms on large e-commerce sites. From these sites, criminals can silently steal thousands of fresh credit cards details at a time. Furthermore, social media is being used to recruit unwitting users, who might not know they are working for criminals when they reship goods or provide financial services.<\/p>\n<p>We predict an increase in the market for stolen credentials\u2014fueled by recent large data breaches and by bad password habits of users. The breaches lead, for example, to the sale of voter records and email-account hacking. These attacks occur daily.<\/p>\n<p><a name=\"evasion\"><\/a><\/p>\n<h2>Artificial Intelligence the Future of Evasion Techniques<\/h2>\n<p>To increase their chances of success, attackers have long employed evasion techniques to bypass security measures and avoid detection and analysis. Packers, crypters, and other tools are common components of attackers\u2019 arsenals. In fact, an entire underground economy has emerged, offering products and dedicated services to aid criminal activities. We predict in 2019, due to the ease with which criminals can now outsource key components of their attacks, evasion techniques will become more agile due to the application of artificial intelligence. Think the counter-AV industry is pervasive now?\u00a0This is just the beginning.<\/p>\n<p>In 2018 we saw new process-injection techniques such as <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/mcafee-protects-against-doppelganging-technique\/\" target=\"_blank\" rel=\"noopener noreferrer\">\u201cprocess doppelg\u00e4nging\u201d<\/a> with the SynAck ransomware, and <a href=\"https:\/\/securityonline.info\/rig-exploit-kit-use-the-propagate-injection-technology-to-spread-monero-miners\/?cn-reloaded=1\" target=\"_blank\" rel=\"noopener noreferrer\">PROPagate injection delivered<\/a> by the RigExploit Kit.\u00a0By adding technologies such as artificial intelligence, evasion techniques will be able to further circumvent protections.<\/p>\n<h4><strong>Different evasions for different malware <\/strong><\/h4>\n<p>In 2018, we observed the emergence of new threats such as cryptocurrency miners, which hijack the resources of infected machines. With each threat comes inventive evasion techniques:<\/p>\n<ul>\n<li>Cryptocurrency mining: Miners implement a number of evasion techniques. Minerva Labs <a href=\"https:\/\/blog.minerva-labs.com\/waterminer-a-new-evasive-crypto-miner\">discovered WaterMiner,<\/a> which simply stops its mining process when the victim runs the Task Manager or an antimalware scan.<\/li>\n<li>Exploit kits: Popular evasion techniques include process injection or the manipulation of memory space and adding arbitrary code. In-memory injection is a popular infection vector for avoiding detection during delivery.<\/li>\n<li>Botnets: Code obfuscation or anti-disassembling techniques are often used by large botnets that infect thousands of victims. In May 2018, AdvisorsBot was discovered using junk code, fake conditional instructions, XOR encryption, and even API hashing. Because bots tend to spread widely, the authors implemented many evasion techniques to slow reverse engineering. They also used obfuscation mechanisms for communications between the bots and control servers. Criminals use botnets for activities such as DDOS for hire, proxies, spam, or other malware delivery. Using evasion techniques is critical for criminals to avoid or delay botnet takedowns.<\/li>\n<li>Advanced persistent threats: Stolen certificates bought on the cybercriminal underground are often used in targeted attacks to bypass antimalware detection. Attackers also use low-level malware such as rootkits or firmware-based threats. For example, in 2018 ESET discovered the first UEFI rootkit, LoJax. Security researchers have also seen destructive features used as anti-forensic techniques: The OlympicDestroyer malware targeted the Olympic Games organization and erased event logs and backups to avoid investigation.<\/li>\n<\/ul>\n<h4><strong>Artificial intelligence the next weapon <\/strong><\/h4>\n<p>In recent years, we have seen malware using evasion techniques to bypass machine learning engines. For example, in 2017 the Cerber ransomware dropped legitimate files on systems to trick the engine that classifies files. In 2018, PyLocky ransomware used InnoSetup to package the malware and avoid machine learning detection.<\/p>\n<p>Clearly, bypassing artificial intelligence engines is already on the criminal to-do list; however, criminals can also implement artificial intelligence in their malicious software. We expect evasion techniques to begin leveraging artificial intelligence to automate target selection, or to check infected environments before deploying later stages and avoiding detection.<\/p>\n<p>Such implementation is game changing in the threat landscape. We predict it will soon be found in the wild.<\/p>\n<p><a name=\"synergistic\"><\/a><\/p>\n<h2>Synergistic Threats Will Multiply, Requiring Combined Responses<\/h2>\n<p>This year we have seen cyber threats adapt and pivot faster than ever. We have seen <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/rapidly-evolving-ransomware-gandcrab-version-5-partners-with-crypter-service-for-obfuscation\/\" target=\"_blank\" rel=\"noopener noreferrer\">ransomware evolving to be more effective<\/a> or operate as a smoke screen. We have seen <a href=\"https:\/\/securingtomorrow.mcafee.com\/business\/cryptojacking-soaring-stegware-makes-stealth-bomber\/\" target=\"_blank\" rel=\"noopener noreferrer\">cryptojacking<\/a> soar, as it provides a better, and safer, return on investment than ransomware. We can still see <a href=\"https:\/\/threatpost.com\/innovative-phishing-tactic-makes-inroads-using-azure-blob\/138183\/\" target=\"_blank\" rel=\"noopener noreferrer\">phishing going strong<\/a> and finding new vulnerabilities to exploit. We also noticed fileless and \u201cliving off the land\u201d threats are more slippery and evasive than ever, and we have even seen the incubation of steganography malware in the <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/malicious-document-targets-pyeongchang-olympics\/\" target=\"_blank\" rel=\"noopener noreferrer\">Pyeongchang Olympics campaign<\/a>. In 2019, we predict attackers will more frequently combine these tactics to create multifaced, or synergistic, threats.<\/p>\n<h4><strong>What could be worse?<\/strong><\/h4>\n<p>Attacks are usually centered on the use of one threat. Bad actors concentrate their efforts on iterating and evolving one threat at a time for effectiveness and evasion. When an attack is successful, it is classified as ransomware, cryptojacking, data exfiltration, etc., and defenses are put in place. At this point, the attack\u2019s success rate is significantly reduced. However, if a sophisticated attack involves not one but five top-notch threats synergistically working together, the defense panorama could become very blurry. The challenge arises when an attempt is made to identify and mitigate the attack. Because the ultimate attack goals are unknown, one might get lost in the details of each threat as it plays a role in the chain.<\/p>\n<p>One of the reasons synergic threats are becoming a reality is because bad actors are improving their skills by <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/rapidly-evolving-ransomware-gandcrab-version-5-partners-with-crypter-service-for-obfuscation\/\" target=\"_blank\" rel=\"noopener noreferrer\">developing foundations, kits, and reusable threat components<\/a>. As attackers organize their efforts into a black-market business model, they can focus on adding value to previous building blocks. This strategy allows them to orchestrate multiple threats instead of just one to reach their goals.<\/p>\n<h4><strong>An example is worth a thousand words<\/strong><\/h4>\n<p>Imagine an attack that starts with a phishing threat\u2014not a typical campaign using Word documents, but a novel technique. This phishing email contains a video attachment. When you open the video, your video player does not play and prompts you to update the codec. Once you run the update, a steganographic polyglot file (a simple GIF) is deployed on your system. Because it is a polyglot (a file that conforms to more than one format at the same time), the GIF file schedules a task that fetches a fileless script hosted on a compromised system. That script running in memory evaluates your system and decides to run either ransomware or a cryptocurrency miner. That is a dangerous synergistic threat in action.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/11\/20181116-Predictions-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-92774\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/11\/20181116-Predictions-1.png\" alt=\"\" width=\"797\" height=\"491\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/20181116-Predictions-1.png 797w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/20181116-Predictions-1-300x185.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/20181116-Predictions-1-768x473.png 768w\" sizes=\"auto, (max-width: 797px) 100vw, 797px\" \/><\/a><\/p>\n<p>The attack raises many questions: What are you dealing with? Is it phishing 2.0? Is it stegware? Is it fileless and \u201cliving off the land\u201d? Cryptojacking? Ransomware? It is everything at the same time.<\/p>\n<p>This sophisticated but feasible example demonstrates that focusing on one threat may not be enough to detect or remediate an attack. When you aim to classify the attack into a single category, you might lose the big picture and thus be less effective mitigating it. Even if you stop the attack in the middle of the chain, discovering the initial and final stages is as important for protecting against future attempts.<\/p>\n<h4><strong>Be curious, be creative, connect your defenses<\/strong><\/h4>\n<p>Tackling sophisticated attacks based on synergic threats requires questioning every threat. What if this ransomware hit was part of something bigger? What if this phishing email pivots to a technique that employees are not trained for? What if we are missing the real goal of the attack?<\/p>\n<p>Bearing these questions in mind will not only help capture the big picture, but also get the most of security solutions. We predict bad actors will add synergy to their attacks, but cyber defenses can also work synergistically.<\/p>\n<p><a name=\"extortion\"><\/a><\/p>\n<h2>Cybercriminals to Use Social Media Misinformation, Extortion Campaigns to Challenge Organizations\u2019 Brands<\/h2>\n<p>The elections were influenced, fake news prevails, and our social media followers are all foreign government\u2013controlled bots.\u00a0At least that\u2019s how the world feels sometimes. To say recent years have been troubled for social media companies would be an understatement.\u00a0During\u00a0this period a game of cat and mouse has ensued, as automated accounts are taken down, adversaries tactics evolve, and botnet accounts emerge looking more legitimate than ever before.\u00a0In 2019, we predict an increase of misinformation and extortion campaigns via social media that will focus on brands and originate not from nation-state actors but from criminal groups.<\/p>\n<p>Nation-states leverage bot battalions to deliver messages or manipulate opinion, and their effectiveness is striking. Bots often will take both sides of a story to spur debate, and this tactic works. By employing a system of amplifying nodes, as well as testing the messaging (including hashtags) to determine success rates, botnet operators demonstrate a real understanding of how to mold popular opinion on critical issues.<\/p>\n<p>In one example, an account that was only two weeks old with 279 followers, most of which were other bots, began a harassment campaign against an organization. By amplification, the account generated an additional 1,500 followers in only four weeks by simply tweeting malicious content about their target.<\/p>\n<p>Activities to manipulate public opinion have been well documented and bots well versed in manipulating conversations to drive agendas stand ready. Next year we expect that cybercriminals will repurpose these campaigns to extort companies by threatening to damage their brands. Organizations face a serious danger.<\/p>\n<p><a name=\"data\"><\/a><\/p>\n<h2>Data Exfiltration Attacks to Target the Cloud<\/h2>\n<p>In the past two years, enterprises have widely adopted the Software-as-a-Service model, such as Office 365, as well as Infrastructure- and Platform-as-a-Service cloud models, such as AWS and Azure. With this move, far more corporate data now resides in the cloud. In 2019, we expect a significant increase in attacks that follow the data to the cloud.<\/p>\n<p>With the increased adoption of Office 365, we have noticed a surge of attacks on the service\u2014 especially attempts to compromise email. One threat the McAfee cloud team uncovered was the botnet <a href=\"https:\/\/www.skyhighnetworks.com\/cloud-security-blog\/skyhigh-discovers-ingenious-new-attack-scheme-on-office-365\/\" target=\"_blank\" rel=\"noopener noreferrer\">KnockKnock,<\/a> which targeted system accounts that typically do not have multifactor authentication. We have also seen the emergence of exploits of the trust model in the Open Authorization standard. One was launched by Fancy Bear, the Russian cyber espionage group, phishing users with a fake Google security app to gain access to user data.<\/p>\n<p>Similarly, during the last couple of years we have seen many high-profile data breaches attributed to misconfigured Amazon S3 buckets. This is clearly not the fault of AWS. Based on the shared responsibility model, the customer is on the hook to properly configure IaaS\/PaaS infrastructure and properly protect their enterprise data and user access. Complicating matters, many of these misconfigured buckets are owned by vendors in their supply chains, rather than by the target enterprises. With access to thousands of open buckets and credentials, bad actors are increasingly opting for these easy pickings.<\/p>\n<p>McAfee has found that 21% of data in the cloud is sensitive\u2014such as intellectual property, and customer and personal data\u2014according to the <a href=\"https:\/\/www.skyhighnetworks.com\/cloud-report\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>McAfee Cloud Adoption and Risk Report.<\/em><\/a> With a 33% increase in users collaborating on this data during the past year, cybercriminals know how to seek more targets:<\/p>\n<ul>\n<li>Cloud-native attacks targeting weak APIs or ungoverned API endpoints to gain access to the data in SaaS as well as in PaaS and serverless workloads<\/li>\n<li>Expanded reconnaissance and exfiltration of data in cloud databases (PaaS or custom applications deployed in IaaS) expanding the S3 exfiltration vector to structured data in databases or data lakes<\/li>\n<li>Leveraging the cloud as a springboard for cloud-native man-in-the-middle attacks (such as <a href=\"https:\/\/www.skyhighnetworks.com\/cloud-security-blog\/skyhigh-discovers-ghostwriter-a-pervasive-aws-s3-man-in-the-middle-exposure\/\" target=\"_blank\" rel=\"noopener noreferrer\">GhostWriter,<\/a> which exploits publicly writable S3 buckets introduced due to customer misconfigurations) to launch cryptojacking or ransomware attacks into other variants of MITM attacks.<\/li>\n<\/ul>\n<p><a name=\"digital\"><\/a><\/p>\n<h2>Voice-Controlled Digital Assistants the Next Vector in Attacking IoT Devices<\/h2>\n<p>As tech fans continue to fill their homes with smart gadgets, from plugs to TVs, coffee makers to refrigerators, and motion sensors to lighting, the means of gaining entry to a home network are growing rapidly, especially given how poorly secured many IoT devices remain.<\/p>\n<p>But the real key to the network door next year will be the voice-controlled digital assistant, a device created in part to manage all the IoT devices within a home. As sales increase\u2014and an explosion in adoption over the holiday season looks likely\u2014the attraction for cybercriminals to use assistants to jump to the really interesting devices on a network will only continue to grow.<\/p>\n<p>For now, the voice assistant market is still taking shape, with many brands still looking to dominate the market, in more ways than one, and it is unclear whether one device will become ubiquitous. If one does take the lead, its security features will quite rightly fall under the microscope of the media, though not perhaps before its privacy concerns have been fully examined in prose.<\/p>\n<p>(Last year we highlighted privacy as the key concern for home IoT devices. Privacy will continue to be a concern, but cybercriminals will put more effort into building botnets, demanding ransoms, and threatening the destruction of property of both homes and businesses).<\/p>\n<p>This opportunity to control a home\u2019s or office\u2019s devices will not go unnoticed by cybercriminals, who will engage in an altogether different type of writing in relation to the market winner, in the form of malicious code designed to attack not only IoT devices but also the digital assistants that are given so much license to talk to them.<\/p>\n<p>Smartphones have already served as the door to a threat. In 2019, they may well become the picklock that opens a much larger door. We have already seen two threats that demonstrate what cybercriminals can do with unprotected devices, in the form of the <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-quarterly-threats-mar-2017.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Mirai botnet,<\/a> which first struck in 2016, and <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/iot_reaper\/\" target=\"_blank\" rel=\"noopener noreferrer\">IoT Reaper,<\/a> in 2017. These IoT malware appeared in many variants to attack connected devices such as routers, network video recorders, and IP cameras. They expanded their reach by password cracking and exploiting known vulnerabilities to build worldwide robot networks.<\/p>\n<p>Next year we expect to see two main vectors for attacking home IoT devices: routers and smartphones\/ tablets. The Mirai botnet demonstrated the lack of security in routers. Infected smartphones, which can already monitor and control home devices, will become one of the top targets of cybercriminals, who will employ current and new techniques to take control.<\/p>\n<p>Malware authors will take advantage of phones and tablets, those already trusted controllers, to try to take over IoT devices by password cracking and exploiting vulnerabilities. These attacks will not appear suspicious because the network traffic comes from a trusted device. The success rate of attacks will increase, and the attack routes will be difficult to identify. An infected smartphone could cause the next example of <a href=\"https:\/\/thehackernews.com\/2018\/04\/android-dns-hijack-malware.html\" target=\"_blank\" rel=\"noopener noreferrer\">hijacking the DNS settings on a router<\/a>. Vulnerabilities in mobile and cloud apps are also ripe for exploitation, with smartphones at the core of the criminals\u2019 strategy.<\/p>\n<p>Infected IoT devices will supply botnets, which can launch DDoS attacks, as well as steal personal data. The more sophisticated IoT malware will exploit voice-controlled digital assistants to hide its suspicious activities from users and home-network security software. Malicious activities such as opening doors and connecting to control servers could be triggered by user voice commands (\u201cPlay music\u201d and \u201cWhat is today\u2019s weather?\u201d). Soon we may hear infected IoT devices themselves exclaiming: \u201cAssistant! Open the back door!\u201d<\/p>\n<p><a name=\"identity\"><\/a><\/p>\n<h2>Cybercriminals to Increase Attacks on Identity Platforms and Edge Devices Under Siege<\/h2>\n<p>Large-scale data breaches of identity platforms\u2014which offer centralized secure authentication and authorization of users, devices, and services across IT environments\u2014have been well documented in 2018. Meanwhile, the captured data is being reused to cause further misery for its victims. In 2019, we expect to see large-scale social media platforms implement additional measures to protect customer information. However, as the platforms grow in numbers, we predict criminals will further focus their resources on such attractive, data-rich environments.\u00a0The struggle between criminals and big-scale platforms will be the next big battleground.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/triton-malware-spearheads-latest-generation-of-attacks-on-industrial-systems\/\" target=\"_blank\" rel=\"noopener noreferrer\">Triton, malware<\/a> that attacks industrial control systems (ICS), has demonstrated the capabilities of adversaries to remotely target manufacturing environments through their adjacent IT environments. Identity platform and \u201cedge device\u201d breaches will provide the keys to adversaries to launch future remote ICS attacks due to static password use across environments and constrained edge devices, which lack secure system requirements due to design limitations. (An edge device is any network-enabled system hardware or protocol within an IoT product.) We expect multifactor authentication and identity intelligence will become the best methods to provide security in this escalating battle. We also predict identity intelligence will complement multifactor authentication to strengthen the capabilities of identity platforms.<\/p>\n<p>Identity is a fundamental component in securing IoT. In these ecosystems, devices and services must securely identify trusted devices so that they can ignore the rest. The identity model has shifted from user centric in traditional IT systems to machine centric for IoT systems. Unfortunately, due to the integration of operational technology and insecure \u201cedge device\u201d design, the IoT trust model is built on a weak foundation of assumed trust and perimeter-based security.<\/p>\n<p>At Black Hat USA and DEF CON 2018, 30 talks discussed IoT edge device exploitation. That\u2019s a large increase from just 19 talks on the topic in 2017. The increase in interest was primarily in relation to ICS, consumer, medical, and \u201csmart city\u201d verticals. (See Figure 1.) Smart edge devices, combined with high-speed connectivity, are enabling IoT ecosystems, but the rate at which they are advancing is compromising the security of these systems.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/11\/20181116-Predictions-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-92775\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/11\/20181116-Predictions-2.png\" alt=\"\" width=\"1128\" height=\"640\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/20181116-Predictions-2.png 1128w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/20181116-Predictions-2-300x170.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/20181116-Predictions-2-768x436.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/20181116-Predictions-2-1024x581.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/20181116-Predictions-2-881x500.png 881w\" sizes=\"auto, (max-width: 1128px) 100vw, 1128px\" \/><\/a><\/p>\n<p><em>Figure 1: The number of conference sessions on the security of IoT devices has increased, matching the growing threat to poorly protected devices.<\/em><em>\u00a0<\/em><\/p>\n<p>Most IoT edge devices provide no self-defense (isolating critical functions, memory protection, firmware protection, least privileges, or security by default) so one successful exploit owns the device. IoT edge devices also suffer from \u201cbreak once, run everywhere\u201d attacks\u2014due to insecure components used across many device types and verticals. (See articles on <a href=\"https:\/\/defcon.org\/html\/defcon-26\/dc-26-speakers.html#Rodriguez\" target=\"_blank\" rel=\"noopener noreferrer\">WingOS<\/a> and <a href=\"https:\/\/dgiese.scripts.mit.edu\/talks\/DEFCON26\/DEFCON26-Having_fun_with_IoT-Xiaomi.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">reverse engineering.)<\/a><\/p>\n<p>McAfee Advanced Threat Research team engineers have demonstrated how <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals\/\" target=\"_blank\" rel=\"noopener noreferrer\">medical device protocols can be exploited<\/a> to endanger human life and <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/mcafee-researchers-find-poor-security-exposes-medical-data-to-cybercriminals\/\" target=\"_blank\" rel=\"noopener noreferrer\">compromise patients\u2019 privacy<\/a> due to assumed trust. These examples illustrate just a few of many possible scenarios that lead us to believe adversaries will choose IoT edge devices as the path of least resistance to achieve their objectives. Servers have been hardened over the last decade, but IoT hardware is far behind. By understanding an adversary\u2019s motives and opportunities (attack surface and access capability), we can define a set of security requirements independent of a specific attack vector.<\/p>\n<p>Figure 2 gives a breakdown of the types of vulnerabilities in IoT edge devices, highlighting weak points to address by building identity and integrity capabilities into edge hardware to ensure these devices can deflect attacks.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/11\/20181116-Predictions-3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-92776\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/11\/20181116-Predictions-3.png\" alt=\"\" width=\"934\" height=\"674\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/20181116-Predictions-3.png 934w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/20181116-Predictions-3-300x216.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/20181116-Predictions-3-768x554.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/20181116-Predictions-3-693x500.png 693w\" sizes=\"auto, (max-width: 934px) 100vw, 934px\" \/><\/a><\/p>\n<p><em>Figure 2: Insecure protocols are the primary attack surface in IoT edge devices. <\/em><\/p>\n<p>IoT security must begin on the edge with a zero-trust model and provide a hardware root of trust as the core building block for protecting against <a href=\"http:\/\/infocenter.arm.com\/help\/index.jsp?topic=\/com.arm.doc.prd29-genc-009492c\/ch01s03s03.html\" target=\"_blank\" rel=\"noopener noreferrer\">hack and shack attacks<\/a> and other threats. McAfee predicts an increase in compromises on identity platforms and IoT edge devices in 2019 due to the adoption of smart cities and increased ICS activity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our predictions for 2019 move away from simply providing an assessment on the rise or fall of a particular threat, and instead focus on current rumblings we see in the cybercriminal underground that we expect to grow into trends and subsequently threats in the wild.<\/p>\n","protected":false},"author":695,"featured_media":92797,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[5526,4139,1298,76,4452,4131,180,214],"coauthors":[4136],"class_list":["post-92746","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs","tag-advanced-threat-research","tag-annual-threats-predictions","tag-cloud-security","tag-cybercrime","tag-cybersecurity","tag-internet-of-things","tag-malware","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>McAfee Labs 2019 Threats Predictions Report | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Our predictions for 2019 move away from simply providing an assessment on the rise or fall of a particular threat, and instead focus on current rumblings we see in the cybercriminal underground that we expect to grow into trends and subsequently threats in the wild.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"McAfee Labs 2019 Threats Predictions Report | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Our predictions for 2019 move away from simply providing an assessment on the rise or fall of a particular threat, and instead focus on current rumblings we see in the cybercriminal underground that we expect to grow into trends and subsequently threats in the wild.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-29T09:00:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-19T06:33:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/Digital-binary-code-on-computer-screen-pen-pointing-out-security-breach-in-red-characters..jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1365\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"21 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"McAfee Labs 2019 Threats Predictions Report\",\"datePublished\":\"2018-11-29T09:00:11+00:00\",\"dateModified\":\"2024-02-19T06:33:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/\"},\"wordCount\":4106,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/Digital-binary-code-on-computer-screen-pen-pointing-out-security-breach-in-red-characters..jpg\",\"keywords\":[\"Advanced Threat Research\",\"Annual Threats Predictions\",\"cloud security\",\"cybercrime\",\"cybersecurity\",\"Internet of Things\",\"malware\",\"mobile security\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/\",\"name\":\"McAfee Labs 2019 Threats Predictions Report | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/Digital-binary-code-on-computer-screen-pen-pointing-out-security-breach-in-red-characters..jpg\",\"datePublished\":\"2018-11-29T09:00:11+00:00\",\"dateModified\":\"2024-02-19T06:33:52+00:00\",\"description\":\"Our predictions for 2019 move away from simply providing an assessment on the rise or fall of a particular threat, and instead focus on current rumblings we see in the cybercriminal underground that we expect to grow into trends and subsequently threats in the wild.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/Digital-binary-code-on-computer-screen-pen-pointing-out-security-breach-in-red-characters..jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/Digital-binary-code-on-computer-screen-pen-pointing-out-security-breach-in-red-characters..jpg\",\"width\":2048,\"height\":1365},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"McAfee Labs 2019 Threats Predictions Report\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"McAfee Labs 2019 Threats Predictions Report | McAfee Blog","description":"Our predictions for 2019 move away from simply providing an assessment on the rise or fall of a particular threat, and instead focus on current rumblings we see in the cybercriminal underground that we expect to grow into trends and subsequently threats in the wild.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"McAfee Labs 2019 Threats Predictions Report | McAfee Blog","og_description":"Our predictions for 2019 move away from simply providing an assessment on the rise or fall of a particular threat, and instead focus on current rumblings we see in the cybercriminal underground that we expect to grow into trends and subsequently threats in the wild.","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-11-29T09:00:11+00:00","article_modified_time":"2024-02-19T06:33:52+00:00","og_image":[{"width":2048,"height":1365,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/Digital-binary-code-on-computer-screen-pen-pointing-out-security-breach-in-red-characters..jpg","type":"image\/jpeg"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"21 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"McAfee Labs 2019 Threats Predictions Report","datePublished":"2018-11-29T09:00:11+00:00","dateModified":"2024-02-19T06:33:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/"},"wordCount":4106,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/Digital-binary-code-on-computer-screen-pen-pointing-out-security-breach-in-red-characters..jpg","keywords":["Advanced Threat Research","Annual Threats Predictions","cloud security","cybercrime","cybersecurity","Internet of Things","malware","mobile security"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/","name":"McAfee Labs 2019 Threats Predictions Report | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/Digital-binary-code-on-computer-screen-pen-pointing-out-security-breach-in-red-characters..jpg","datePublished":"2018-11-29T09:00:11+00:00","dateModified":"2024-02-19T06:33:52+00:00","description":"Our predictions for 2019 move away from simply providing an assessment on the rise or fall of a particular threat, and instead focus on current rumblings we see in the cybercriminal underground that we expect to grow into trends and subsequently threats in the wild.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/Digital-binary-code-on-computer-screen-pen-pointing-out-security-breach-in-red-characters..jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/11\/Digital-binary-code-on-computer-screen-pen-pointing-out-security-breach-in-red-characters..jpg","width":2048,"height":1365},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-2019-threats-predictions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"McAfee Labs 2019 Threats Predictions Report"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/92746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=92746"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/92746\/revisions"}],"predecessor-version":[{"id":183007,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/92746\/revisions\/183007"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/92797"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=92746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=92746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=92746"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=92746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}