Cyber trends for 2022

SMART Cybersecurity Handbook 2022 Editor's Choice

Supply chain cyber-attacks will become more common in 2022 according to Check Point Research’s (CPR) cybersecurity predictions for 2022.

Supply chain attackers take advantage of a lack of monitoring to perform different types of cyber-attacks, from data breaches to malware infections. In 2021, we saw supply chain attacks affect big brands like SolarWinds and Kaseya. These particular incidents were significant in that the attack spread to their customers.

Similarly, in July, Transnet, which operates ports and rail infrastructure in South Africa, announced that its online systems had been hacked. Transnet was forced to shut down certain IT applications in an effort to identify the source of the attack bringing various operations around the country to a halt.

“In 2021, cyber criminals adapted their attack strategy to exploit vaccination mandates, elections and the shift to hybrid working, to target organisations’ supply chains and networks to achieve maximum disruption,” says Pankaj Bhula, Check Point’s regional director for Africa. “The sophistication and scale of cyber-attacks will continue to break records and we can expect a huge increase in the number of ransomware and mobile attacks.”

As supply chain attacks become more common, governments will need to establish regulations to address these attacks and protect networks, says CPR. They will also have to look into collaborating with the private sector and with other countries, to identify threat groups operating on a global and regional scale.

Other risks in 2022

Misinformation makes a comeback: At the start of the pandemic, the South African government introduced a law that prohibited the spread of fake news. Unfortunately, this will do little to deter cyber groups. In 2022, fake news 2.0 will see malicious actors using emerging technologies to create fake news campaigns as part of elaborate phishing attacks and scams.

Mobile malware attacks to increase: There are 650 million mobile users in Africa and in some African countries, more people have access to a mobile phone than to clean water, a bank account or electricity, according to the World Bank and African Development Bank. As mobile wallets and mobile payment platforms are used more frequently, cyber criminals will adapt their techniques to exploit this growing reliance on mobile devices.

Cyber war to intensify: Just as companies are using new technologies to up their security game, hackers and cyber criminals are using the same innovations to improve their illicit activities. For example, in 2022, hackers will utilise penetration tools, which are typically used to evaluate how secure a system is, to customise their attacks in real-time. Improved infrastructure and technological capabilities will enable criminal groups to carry out more sophisticated, widespread attacks that aim to destabilise global activities.

Data breaches will be larger scale and costlier: Ransom amounts demanded by attackers are predicted to increase in 2022. Accompanying this trend, CPR also predict that data breaches will be on a larger scale as attackers target an organisation’s customers and/or business partners and demand ransoms from them too. In the last six months, we’ve seen the MSP (managed service provider), finance and public sector industries in South Africa hit hardest by cyber-attacks and this trend is expected to continue into 2022.

Cryptocurrency to become a focal point for cyber-attacks: In June 2021, the founders of South Africa’s largest cryptocurrency exchange, Africrypt, vanished, along with nearly US$ 3,6 billion in Bitcoin. The pair told investors that the exchange had been hacked. In 2022, we can expect to see an increase in similar cryptocurrency-related incidents and attacks.

Attackers to weaponise deepfake technologies: Taking the fake news threat to a whole new level, criminals will increasingly use deepfake social engineering attacks, which leverage artificial intelligence (AI) to create videos and images of fake events, to access sensitive data.

“Looking ahead, organisations should remain aware of the risks and ensure that they have the appropriate solutions in place to prevent, without disrupting the normal business flow, the majority of attacks including the most advanced ones,” concludes Bhula. “To stay ahead of threats, organisations must be proactive and leave no part of their attack surface unprotected or unmonitored, or they risk becoming the next victim of sophisticated, targeted attacks.”




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
Making drone security more accessible
Editor's Choice Integrated Solutions Residential Estate (Industry) AI & Data Analytics IoT & Automation
Michael Lever discusses advances in drone technology, focusing on cost reductions and the implementation of automated services, including beyond line of sight capabilities, for residential estates with SMART Security Solutions.

Read more...
Private fire services becoming the norm?
Technews Publishing SMART Security Solutions Editor's Choice
As the infrastructure and service delivery in many of South Africa’s major cities decline, with a few, limited exceptions, more of the work that should be done by the state has fallen to private companies.

Read more...
View from the trenches
Technews Publishing SMART Security Solutions Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
There are many great options available to estates for effectively managing their security and operations, but those in the trenches are often limited by body corporate/HOA budget restrictions and misunderstandings.

Read more...
SMART Estate Security Conference KZN 2025
Arteco Global Africa OneSpace Technologies SMART Security Solutions Technews Publishing Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
May 2025 saw the SMART Security Solutions team heading off to Durban for our annual Estate Security Conference, once again hosted at the Mount Edgecombe Country Club.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.