Q4 2022 Threat Landscape: Tech and Manufacturing Targeted (2025)

In a year where headlines were dominated by the global economic and geopolitical uncertaintyaround Russia’s war on Ukraine, 2022 saw a threat landscape that was both volatile and fragmented, largely due to the war. As the year drew to an end, ransomware hit a peak, primarily due to the rise in attacks impacting the manufacturing, health care, technology and telecommunications industries. This came after a dip in ransomware during the third quarter of 2022, suspected to be due to the disbandment of the Conti ransomware group.

Kroll’s research found that several other familiar threats remained highly active throughout 2022, such as a significant increase in phishing and a notable rise in unauthorized access, increasing from 18% of cases in 2021 to 25% in 2022. Notable new initial access methods included an infection method leveraging Google Adsto spread credential-stealing malware and a rise in the use of USB-borne malware as a means to spread infection throughout a network.

Q4 2022 Threat Timeline

  • Oct 4 – New ProxyNotShell Exploit Emerges: ProxyNotShell becomes a new exploit, taking advantage of two vulnerabilities (CVE-2022-41040 and CVE-2022-41082), which gives an attacker visibility of emails on an organization’s server and grants them the ability to plant malware on an Exchange server. Microsoft issued mitigation steps to address the vulnerabilities before issuing a patch in the November 8 Patch Tuesday Updates.
  • Oct 7 – Rclone Used in Microsoft 365 to Execute Email Compromise Attacks: Kroll observes the data syncing tool Rclone being used in M365for network compromises or phishing attacks. Rclone is seen being used to download a large number of files on SharePoint/OneDrive from a Microsoft 365 account in only a little over an hour.
  • Nov 19 – Google Ads Used to Distribute Royal Ransomware: Microsoft warns about threat actors using Google Ads to distribute post-compromise payloads, including Royal ransomware.
  • Nov 24 – Qakbot Malware Used to Infiltrate U.S. Companies: The Black Basta ransomware group is found to be using aggressive QakBot malware campaigns that lead to ransomware infections on compromised networks.
  • Dec 5 – New Tactics Associated with AvosLocker Ransomware: Threat actors associated with the ransomware target Veeam Backup and Replication systems for possible exfiltration. (CVE-2022-26500 and CVE-2022-26501).

Sector Analysis: Tech and Manufacturing Caught in the Crosshairs

In 2022, the top five impacted sectors across Kroll incident response cases were: professional services, health care, financial services, manufacturing, and technology and telecommunications.

Q4 2022 Threat Landscape: Tech and Manufacturing Targeted (1)

While the professional services sector has typically been the top targeted sector for Kroll cases, in 2022, Kroll observed a slight decline in those attacks, while other sectors were targeted more, namely manufacturing and technology and telecommunications.

This differs from the industry spread of data breaches Kroll saw in 2022. In Kroll’s Data Breach Outlookreport, health care overtook finance as the most breached industry of the year, accounting for 22% of all breaches, compared to 16% in 2021. Delving further into this data, Kroll received most engagement from consumers whose data had been breached in the financial services sector, and this concern seems to be increasing as call volumes increased 127% year on year in 2022.

Q4 2022 Threat Landscape: Tech and Manufacturing Targeted (2)

Ransomware was evident in the majority of attacks impacting manufacturing, health care, technology and telecommunications. Its prevalence in these sectors spiked in the fourth quarter.

Q4 2022 Threat Landscape: Tech and Manufacturing Targeted (3)

There were some other notable cases Kroll observed in the manufacturing, technology and telecommunications industries that point to wider trends.

Case Study: The Technology and Telecommunications Industry Becomes a Route to Managed Service Providers

In the technology industry, Kroll has seen many attacks on managed service providers (MSPs). In one case, threat actors had set up Google Ads for the search term “common IT management software.” This software is widely used by MSPs, and it is likely that IT administrators and MSPs were the target of these adverts. The ads provided the legitimate software packaged with a Batloader installer that, when executed, provided a backdoor with elevated privileges to the network. This then allowed the threat actor to quickly scout the internal network for sensitive files and high-value systems before disabling security software.

The threat actor traversed several file servers and extracted data from each before exfiltrating the data to cloud data storage via Rclone. Once the exfiltration was completed, the Black Basta ransomware binary was executed. The impact of this activity had many complications as data was removed, which may have contained client data, as well as the encryption of vital servers, likely affected the MSP’s daily operations to its clients, thus increasing the pressure to pay the ransom.

“MSPs are a prime target for cybercriminals,” says Vice President at Kroll, Stephen Green. “The nature of an MSP’s business means that the demands of the supply chain will often provide greater pressure to pay any ransom. The access granted to an MSP also provides opportunities to conduct further attacks against its clients for additional payments. This may be a reason Kroll has observed threat activity increasingly targeting the technology sector and is supported by a number of industry warnings about supply chain risk, including from the Five Eyes (FVEY) intelligence alliance and the UK’s National Cyber Security Centre (NCSC).”

Case Study: Cybercriminals Tap into Business Continuity Concerns in the Manufacturing Sector

In a representative incident in the manufacturing sector, Kroll observed the deployment of Vice Society ransomware. Initial access was obtained through a botnet infection that helped attackers conduct an initial exploration of the network. Once the attackers had gained a foothold in the system, they maintained persistence using a variety of remote access tools. After moving into a domain admin account, they exfiltrated hundreds of gigabytes of data for a series of days and then encrypted the network. The attackers locked IT staff out of the company’s systems. This meant that all critical operating systems, including production, were halted.

“The manufacturing sector is an attractive target for ransomware gangs due to the level of business disruption it can cause,” says Kroll Managing Director, Walmir Freitas. “Often these sectors hadn’t typically seen themselves as targets for cybercriminals because they held limited sensitive information. But the growth in ransomware has changed the game; manufacturing organizations may be more willing to pay a ransom when their ability to operate is hanging in the balance.”

Most Common Cyber Threats of 2022 vs. 2021

Q4 2022 Threat Landscape: Tech and Manufacturing Targeted (4)

Several notable trends shone through in our analysis:

  • Email compromise saw a decline from its 42% peak in 2021, likely due to widespread patching for the Microsoft Exchange ProxyLogonvulnerabilities that threat actors continued to attempt to use to exploit email servers in 2022.
  • Unauthorized access saw a large year-over-year increase in 2022. As discussed in the Q3 Threat Landscape report, insider threat accounted for the majority of this activity in 2022.
  • Although the total number of ransomware incidents in 2022 decreased slightly from 2021, ransomware still accounted for nearly a third of Kroll incident response cases.

Q4 2022 Threat Landscape: Tech and Manufacturing Targeted (5)

Ransomware Analysis: 2022 – A Year of Regrouping, with Rising Activity in Q4

Ransomware continues to be a top threat impacting organizations, and during the past year, Kroll has seen many ransomware groups evolve their tactics to reach more victims.

Q4 2022 Threat Landscape: Tech and Manufacturing Targeted (6)

As security controls got better at stopping certain ransomware attacks, affiliates were forced to switch to different variants during the same access period. This observation highlights that affiliates distributing ransomware are often doing so on behalf of more than one cybercriminal group. In 2022, Kroll observed increased activity from familiar groups such as Hive, AvosLocker and Vice Society. After Conti disbanded in June 2022, LockBit became the most commonly observed ransomware across Kroll engagements. Other newcomers such as BlackBasta and Royal were also active during the year.

Although the group associated with Royal ransomware has been active since January 2022, Kroll first observed a case in November 2022, and in Q4, Royal ransomware accounted for nearly 14% of ransomware activity. Royal appears to be a collective of threat actorsfrom other well-known malware groups such as Roy/Zeon, Conti and TrickBot, working together as a private ransomware group. Royal ransomware has been connected with many different initial access techniques, including callback phishing attacks, brokered access and Google Ads abuse.

Other variants that Kroll observed on the rise in Q4 were Phobos, Dharma and AvosLocker.

Top Initial Access Methods in 2022

Q4 2022 Threat Landscape: Tech and Manufacturing Targeted (7)

2022 saw a significant shift in the top initial access methods for threat actors. While CVEs and zero-day exploitations were responsible for 44% of initial access methods in 2021, phishing was responsible for 52% in 2022. In 2021, a high percentage of Kroll’s email compromise cases were associated with the Exchange ProxyLogon CVE and a significant volume of exploited vulnerabilities.

In Q4, Kroll noted another rise in the use of external remote services, which continues to be a favorite access method for ransomware groups. Kroll also reported on a novel access method leveraging Google Adsto infect users with credential-stealing malware such as VIDAR.

Beyond VIDAR, which has been around since at least 2018 and has benefitted from several improvementsover the years, the increase of SocGholish usage for initial access in 2022 is worth highlighting. SocGholish is commonly delivered via search engine optimization hijacking, ad impersonation and drive-by-download. In 2022, SocGholish worked with cybercriminal partners to increase its infection efficacy by increasing the number of websites serving malware and the reputation of the sites that redirect to them, helping to improve their search engine rankings. Defenders should treat detections of either VIDAR or SocGholish as a high-severity threat.

2022 Into 2023: Turbulence Continues

Activity observed by Kroll in Q4 aligned with the trend that defined 2022 as a whole: not only have many familiar threats not gone away, but they continue to evolve and adapt. This was evidenced by the prominence of ransomware throughout 2022, hitting health care in Q2, then education in Q3, before a significant spike in focus on technology and manufacturing in Q4.

While the specific types of threats may not have changed much from 2021 to 2022, the central story of 2022 is cybercriminals’ ability to quickly evolve and regroup in the face of advancing security controls, law enforcement activity and geopolitical disruption. The near-seamless transition from Office maldocs to container files in phishing attacks and new access tactics like Google Ads abuse illustrate the constant evolution of techniques to which organizations must pay attention in order to improve their defenses. However, they also need to ensure they are prepared to meet the challenges presented by newly emerging threats.

The Year Ahead: Threats Likely to Evolve in Form and Focus

As threat actor activity is often shaped by fluctuations in economic conditions, there is little doubt that the variability of behaviors observed in 2022 will endure in 2023. Due to the continued market volatilityacross the globe and the ongoing war on Ukraine, it is likely that the unstable circumstances in which attackers thrive will persist in 2023. The continued democratization of cybercrime through technology such as ChatGPT could also drive further developments in threat activity.

2023 is likely to see threat actors honing their tactics to move faster and more nimbly, with more techniques to circumvent defense tools. This makes swift detection of suspicious activity even more critical for organizations. As suggested by activity observed in Q4, it is also highly probable that ransomware will continue to evolve in complexity and impact in the year ahead.

With the value of cryptocurrency going down and the average ransomware profits declining in 2022, 2023 could well see ransomware-as-a-service groups looking to maximize their revenue streams and ransomware actors as a whole becoming more destructive.

Following on from the technology sector being a major target of ransomware in Q4 2022, large IT providers are likely to be a target in 2023, as threat actors attempt to use them as a route to compromise end clients via supply chain attacks. An increase in attacks against Operational Technology (OT) environments is also highly probable, as is the use of techniques similar to those used in 2022.

Key Steps to Stay Resilient in a Volatile Security Landscape

With so many sectors targeted by attackers throughout 2022, no industry or market segment can afford to be complacent as it relates to ongoing monitoring of their internal infrastructure. Actionable threat intelligence and a robust managed detection and response programwill play a vital role in enabling businesses to respond effectively to the many and varied threats likely to arise in 2023. Apart from working with trusted partners to achieve this, businesses can implement specific changes themselves. These include enforcing multi-factor authentication, using remote desktop protocol (RDP), creating multiple backups and having effective access control. By taking proactive steps now, organizations can ensure they are better prepared to respond to the global headwinds likely in 2023 and beyond.

To learn more, view the Kroll guide, 10 Essential Cybersecurity Controls for Increased Resilience.


Download the Report

Q4 2022 Threat Landscape: Tech and Manufacturing Targeted (2025)

FAQs

What is the newest threat facing the security landscape? ›

Top 16 Cybersecurity Threats in 2024
  • Social Engineering. Common Types of Social Engineering.
  • Third-Party Exposure.
  • Configuration Mistakes.
  • Artificial Intelligence Cyber Threats.
  • DNS Tunneling.
  • Insider Threats.
  • State Sponsored Attacks.
  • Ransomware.
Aug 5, 2024

What is the biggest security threat to businesses in 2022? ›

#1 — Ransomware

Ransomware is a type of malware (malicious software) that uses encryption to hold a victim's information or systems at ransom. For businesses, ransomware attacks can be unimaginably destructive.

What does "threat landscape" mean? ›

The threat landscape is the entirety of potential and identified cyberthreats affecting a particular sector, group of users, time period, and so forth.

How to protect against the threat landscape? ›

How to Protect Against the Threat Landscape
  1. Implement Strong Access Controls. ...
  2. Regularly Update Software and Systems. ...
  3. Conduct Regular Employee Training. ...
  4. Implement Robust Incident Response Plans. ...
  5. Use Encryption and Data Loss Prevention (DLP) ...
  6. Conduct Regular Security Assessments. ...
  7. Establish a Supply Chain Security Program.

What is considered the biggest threat in today's landscape for information security? ›

Common cyber threats include: Malware. Advanced Persistent Threats (APTs) Social engineering attacks, such as phishing scams.

What are the top 4 cyber threats? ›

Defending against cyberthreats is a critical and ongoing process that requires a proactive and multifaceted approach. Social engineering, third-party exposure, cloud vulnerabilities, ransomware, and IoT are the top threats that organizations should focus on to protect their data, systems, and reputations.

What is the most common cyber threat in 2022? ›

According to experts, social engineering attacks are classified as one of the biggest cyber security threats of 2022. Unfortunately, even the most sophisticated cyber security systems can't stop a social engineering assault if the target allows the hacker into the system.

What is the #1 cybersecurity threat today? ›

Man-in-the-Middle Attacks

A common example of MitM is WiFi eavesdropping, where attackers use unsecured WiFi networks to intercept user data. Recent statistics highlight a 35% increase in MitM attacks reaching inboxes from early 2022 to early 2023, with the majority targeting Office 365 authentication.

What types of businesses are most at risk for a cyberattack? ›

Industries Most Susceptible to Cyberattacks
  • Manufacturing: Industry 4.0 and the Cyber Challenge. ...
  • Professional, Business and Consumer Services. ...
  • Healthcare Industry: A High-Stakes Target. ...
  • Financial Services: A Persistent Battleground. ...
  • Energy and Utilities: Industrial Sector Under Siege.
Jan 9, 2024

What are the 4 types of threats? ›

Threats can be classified in four categories: direct, indirect, veiled, or conditional.

Is the threat landscape constantly evolving? ›

-Staying up-to-date with the latest threats

The cyber threat landscape is constantly evolving, and new threats emerge on a regular basis. It is essential to stay up-to-date with the latest threats and trends, and to implement measures to protect your business against them.

Which sentence best describes what the threat landscape is? ›

C:The threat landscape relates to all potential vulnerabilities of an application, the attackers that may be targeting this area, and the attacks that are used. C (Correct. It is an encompassing term that relates to the attack, area under attack and the attackers.)

Why should you conduct a threat landscape assessment? ›

A Threat Landscape Assessment provides value add to a cybersecurity risk assessment, by reducing uncertainty and providing critical situational awareness of the shifting cybersecurity threat landscape, while aiding in identifying probable threats and opportunities to reduce the risk of a real attack.

What is the emerging cyber threat landscape? ›

This threat landscape includes several security threats including data leaks, malware attacks, financial loss, compromised critical infrastructure and many others. Cyber attackers employ numerous techniques to exploit these threats which may result in severe repercussions.

What is the new security threat? ›

They range from sophisticated malware and ransomware attacks to social engineering tactics and advanced persistent threats (APTs). As technology advances, so too do these threats, leveraging the latest developments in artificial intelligence, machine learning, and IoT devices to carry out their malicious activities.

What is the new threat to human security? ›

Multiple threats from COVID-19, digital technology, climate change, and biodiversity loss, have become more prominent or taken new forms in recent years. In short, humankind is making the world an increasingly insecure and precarious place.

What are some current threats to our national security? ›

Hostile foreign governments and terrorists trade in, or seek to acquire, weapons of mass destruction and/or the materials to produce them. Tons of illegal drugs are smuggled into our country each year. The newest threats we face, and perhaps the fastest growing, are those in cyberspace.

Top Articles
Latest Posts
Recommended Articles
Article information

Author: Amb. Frankie Simonis

Last Updated:

Views: 6294

Rating: 4.6 / 5 (76 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Amb. Frankie Simonis

Birthday: 1998-02-19

Address: 64841 Delmar Isle, North Wiley, OR 74073

Phone: +17844167847676

Job: Forward IT Agent

Hobby: LARPing, Kitesurfing, Sewing, Digital arts, Sand art, Gardening, Dance

Introduction: My name is Amb. Frankie Simonis, I am a hilarious, enchanting, energetic, cooperative, innocent, cute, joyous person who loves writing and wants to share my knowledge and understanding with you.