2022 Cybersecurity Threats Report
2022 Cybersecurity Threats Report
YEAR
REPORT
www.socradar.io
Table of Contents
Executive Summary 2
www.socradar.io
1
END OF YEAR REPORT 2022
Executive Summary
2022 has been a challenging year for cybersecurity worldwide.
Russian invasion of Ukraine accompanied by waves of
cyberattacks marked the start of the year. Perhaps too often,
the CISOs of large corporations did not sleep well due to the
constant new cyberattacks and significant data breaches that
emerged throughout the year. In those same sleepless nights,
we at SOCRadar were called to new challenges, fighting deep
inside the trenches to prevent the following significant cyber
incident proactively.
2
END OF YEAR REPORT 2022
Here are the largest cyber attacks, threats, and data breaches
that will shake the world in 2022:
•.com is the leading choice of threat actors by 33%.
•55% of the Impersonating domains use an SSL certificate to give users a false sense
of security.
•Government and finance were at the forefront industries that threat actors
discussed the most over dark web channels.
Findings
contained in a single bucket and affecting more
than 65.000 entities across 111 countries, it can be
considered one of the biggest B2B leaks.
3
END OF YEAR REPORT 2022
Ransomware-as-a-Service (RaaS)
and Containers-as-a-Service (CaaS)
DRPS
The increase in RaaS and CaaS services
are likely to facilitate the process of The value of information in
conducting the attacks which will cause underground forums is getting more
more number of related cyber cases. and more critical every day. Considering
this year's Medibank case, the
information sold on Telegram for the
first entry is precious. Dark web
monitoring is mentioned frequently in
DDoS, yes, again 2023.
Looking at the past year's examples, there
will be another break of new records in
DDoS attacks.
MFA Bypass
MFA Bypass methods will be used more as
Rise of Supply Chain Attacks the use of MFA increases. The importance
and usefulness of Yubikey-style FIDO2
passwordless authentication will increase.
Organizations that are difficult to hack
and infiltrate will continue to be infiltrated
through Supply Chain-3rd party vendors.
4
END OF YEAR REPORT 2022
We Shared
755.309 22.983
1.580.000+ IP Login 15.126
Domain Discovered Page
Dark Web
News
332.587 27.566
SSL Cloud
Service
2.549
2.039 12.292
Mobile App Rogue
Mobile App Ransomware
News
+200k Regional
News
Dark Web
News Notification*
5
END OF YEAR REPORT 2022
Phishing in 2022
One of the services SOCRadar provides is discovering and taking action against
impersonating domains trying to harvest credentials and personally identifiable
information from your employees and customers. Remember that phishing and social
engineering are still the starting points of many cyber attacks.
other com
%33,51% %33,03%
cn
%2,42% top
%8,92%
xyz
%2,51% org
%5,82%
co
%2,97% app
%3,95%
icu
%3,29%
net
%3,57%
.com is the leading choice of threat actors by 33%.
1.5 % 10.1 %
Betting Finance, Banking,
Insurance
1.7 % 3.5 %
Legal
Telecommunication
Services
10.4 % 5.1 %
Government Cryptocurrency 6.9 %
10.4 % Media &
Entertaintment
Cyber Security
8.8 %
3.0 % E-commerce 2.8 %
Healtcare
4.6 % Manufacturing
9.2 % 2.8 %
Education
Information Gaming
2% 2%
Accommodation Technologies Non-governmental
& Food Services Organization
6
END OF YEAR REPORT 2022
Phishing in 2022
C. SSL Certificate Preference
%44,72%
%55,28%
https http
55% of the Impersonating domains use SSL certificates to give users a false sense of security.
India %4,1 %
Indonesia %3,6 %
Brazil %3,2 %
China %3 %
France %3 %
Germany %2,3 %
Turkey %1,9 %
7
END OF YEAR REPORT 2022
Phishing in 2022
E. Most Affected Websites
We analyzed some of the most visited sites of the US for potential impersonating
domains using one of the SOCRadar`s free SOC Tools, Phishing Radar.
instagram.com 4.942
facebook.com 4.934
linkedin.com 4.918
discord.com 4.691
walmart.com 4.690
yahoo.com 4.602
roblox.com 4.597
netflix.com 4.487
twitter.com 4.469
xnxx.com 4.463
amazon.com 4.447
youtube.com 4.293
espn.com 4.244
reddit.com 4.207
google.com 4.195
ebay.com 4.195
xvideos.com 3.758
weather.com 3.740
pornhub.com 3.306
bing,com 3.111
wikipedia.org 2.467
live.com 2.314
pinterest.com 1.546
usps.com 1.419
Foxnews.com 1.130
quora.com 686
nytimes.com 654
etsy.com 596
msn.com 592
You will notice at first glance that the top 5 sites are all
duckduckgo.com 322
social media networks. This result corroborates the
cnn.com 311 trend that threat actors are targeting mobile devices.
8
END OF YEAR REPORT 2022
Phishing in 2022
F. Email Security Grader and Analyzer
One of the measures against phishing is keeping your e-mail services secure. Another
free tool from the free SOC Tools of SOCRadar, "Email Security Grader Report," allows
you to determine that.Then, Email Security Grader performs passive and active checks
using cyberattack techniques. Afterward, it completes its work by making checks on
threat intelligence.
Also, if you have a suspicious email, save it as a .eml file and upload it to the E-mail Threat Analyzer.
It will help you figure out if the email is a scam.
9
END OF YEAR REPORT 2022
Threat actors could choose a company in any field as their target to compromise the
victim's digital assets. However, being attacked reduces significantly a company's
productivity and damages its reputation.
Here are the top 10 industries that the threat actors discussed the most over the dark
web channels:
Industries Mentioned Most on the Darkweb
•Government
•Finance Government
•Cybersecurity Finance %5 %
•IT %6%
•E-commerce Manufacturing
Legal Services %27%
•Media & Entertainment %6 %
•Cryptocurrency
•Education
Media & Entertainment
•Telecommunication %6%
•Healthcare
Professional, Scientific,
and Technical Servicesvand Technical Services
%7 %
Healthcare Construction
%10% %11%
(Source: SOCRadar)
The top industries targeted by ransomware threat actors differ from those mentioned
in dark web posts. The graph shows that ransomware actors choose industries in
which business continuity has utmost importance.
Based on the information above, dark web forums and ransomware groups in 2022
targeted the health industry. As SOCRadar monitored, 163 ransomware attacks against
the healthcare industry were reported in 2022, with LockBit ransomware being the
most active ransomware group. More information about the functional ransomware
groups and notable cyberattacks on the healthcare industry in 2022 can be found in
SOCRadar’s research.
10
END OF YEAR REPORT 2022
Analysts at SOCRadar keep an eye on these gangs through the standard methods in
addition to the affiliated blogs and forums. Here are the top 10 industries where
ransomware and extortion gangs are most discussed on their blogs and forums.
•Manufacturing
•Information Technology
•Construction
•Healthcare
•Education
•Professional, Scientific, and Technical Services
•Media & Entertainment
•Legal Services
•Finance Industries Targeted Most by Ransomware Gangs
•Government
Government
%5%
Finance
%6%
Manufacturing
Legal Services %27%
%6%
Professional, Scientific,
and Technical Services
%7%
Information Technology
Education %14%
%8%
Healthcare
%10% Construction
%11%
(Source: SOCRadar)
11
END OF YEAR REPORT 2022
%16 %
%7 %
United States Russian India Indonesia Brazil United China France Germany Turkey
Federation Kingdom
The list of the most mentioned countries in these channels (Source: SOCRadar)
Other
%3% about trading and exchanging
data.
12
END OF YEAR REPORT 2022
41,8%
8,2%
6,2% 5,6% 4,6% 4,6% 4,1% 3,2% 3,2% 2,9%
United States United Kingdom Germany France Italy Canada Spain Brazil Australia China
Except for Brazil and China, 8 of the top 10 targets are located in North
America, Europe and Commonwealth Countries. What has been shared in
these channels are the announcements of victims and exposed data of
uncooperative victims. As shown in the circle graph below, most posts were
victim announcements, either because the victim paid the demanded ransom
or because the statement was a fake story. Even if the ransomware attack is
unsuccessful, it will still harm an organization’s reputation.
Categories of Shares
Data Sharing
%31%
Victim Announcement
%69%
31,1%
8,8%
6,5%
5,2% 5%
4,1% 4%
2,3% 2,1% 2,1%
0
Lockbit AlphVM Blackcat Conti Black Basta HiveLeaks Karakurt Vice Society BianLian Quantum Royal
The SOCRadar Threat Actors/Malware tab can track and index hacker groups,
ransomware organizations, and the malware they use, giving you access to relevant IoCs.
14
END OF YEAR REPORT 2022
SOCRadar, Attack Surface Management tab can help identify and reduce the number of
potential entry points for ransomware, further reducing the risk of a successful attack.
15
END OF YEAR REPORT 2022
China-Taiwan Conflict
August
Nancy Pelosi was the first US representative to visit Taiwan in the
last 25 years, and her visit in August 2022 sparked some diplomatic
events and cyberattacks. China did not want the visit to happen
and started to pressure Taiwan in response to its recent political
recognition. Before Pelosi arrived, attackers hacked billboards in
shops and train stations. The hacked billboards showed Chinese
messages that were urging Pelosi to leave Taiwan. Threat actors
launched strong DDoS attacks against Taiwan’s presidential office
and other official government agencies’ websites, including the
Ministries of Foreign Affairs and National Defense; as a result, the
websites went offline. Around the time of the visit, many threat
actors began selling and leaking company and citizen data
related to Taiwan and China on underground forums.
16
END OF YEAR REPORT 2022
17
END OF YEAR REPORT 2022
18
END OF YEAR REPORT 2022
19
END OF YEAR REPORT 2022
20
END OF YEAR REPORT 2022
21
END OF YEAR REPORT 2022
Lesson 2: Companies that share data with a third-party organization must ensure
they have at least the same cybersecurity awareness. Third-party vendors and
service providers should be closely monitored, conduct due diligence, and provide
necessary security protocols to prevent abuse of data exchanges between them by
threat actors.
22
END OF YEAR REPORT 2022
23
END OF YEAR REPORT 2022
Here are the top 5 vulnerabilities in 2022 curated from the SOCRadar Vulnerability
Intelligence module:
Zerologon | CVE-2020-1472
24
END OF YEAR REPORT 2022
Log4Shell | CVE-2021-44228
It is a remote code execution (RCE) flaw found on Apache Log4j 2 Java logging library. One
of the most dangerous vulnerability types because it allows remote attackers to control
servers over the Internet entirely. At the time of the discovery, all the versions of Log4j 2
were open to vulnerability. The first 72 hours of the vulnerability saw nearly a million
attempts at exploitation. It is still present and widely used by threat actors. Also, the CISA’s
report on China State-Sponsored Threat Actors states that it is still one of the top
vulnerabilities leveraged by China-linked threat actors. For a detailed explanation. Apache
has released a patch for the vulnerability. In addition to patches, some mitigation
techniques are also shared by Apache.
25
END OF YEAR REPORT 2022
Lesson 2: Despite the widespread awareness of the Log4Shell vulnerability within the
cybersecurity community, vulnerable versions of Log4j remain hard to detect in some
instances. Some applications might use the open-source logging library as a direct
dependency in their applications. SOCRadar provides Supply Chain Intelligence. With its
help, you can proactively configure security measures using the intelligence provided by
SOCRadar.
SOCRadar provides Supply Chain Intelligence. With its help, you can proactively
configure security measures using the intelligence provided by SOCRadar.
Lesson 3: Visibility equates to speed in time of a potential crisis. Complete visibility into
your environment when vulnerabilities such as Log4j are discovered is paramount when
time is of the essence. Being able to immediately access your network and know exactly
where to look for certain tools, technologies, attributes, and software can be the difference
between a breach and a successful defense.
With the help of SOCRadar’s External Attack Surface Management, organizations can have
broader visibility into their system. In a case such as Log4j, organizations could have had a
high level of visibility into their environment and would be able to understand how to
handle a Log4j attack.
26
END OF YEAR REPORT 2022
Darknet and Deep Web Monitoring: Protecting Customers’ PII: Scan millions of
SOCRadar's fusion of its unique dark web data points on the surface web, deep web,
Recon technology with the human analyst and darknet to accurately identify the
eye further provides in-depth insights into leakage of your customers' personally
financially-targeted APT groups and the identifiable information (PII) in compliance
threat landscape. with regulations.
Credit Card Monitoring: Enhance your fraud 360-Degree Visibility: Achieve digital
detection mechanisms with automation resiliency by maintaining internet-facing
speed by identifying stolen credit card data digital asset inventory. Significantly accelerate
on popular global black markets, carding this process by automated discovery,
forums, social channels, and chatters. mapping, and continuous asset monitoring.