Leonardo’s latest Cyber Threats Snapshot highlights the main malevolent actors (threat actors), cybercrime activities and vulnerabilities found between October and December 2021.

The analysis was conducted by Leonardo’s Cyber Threat Intelligence experts, in support of the Global Security Operation Centre (SOC).

Among the most significant trends recorded in the last three months of 2021:

  • Telecommunications companies high on the target list of threat actors.
  • COVID-19 is used as the subject of emails with malicious attachments.
  • One of the most serious vulnerabilities of the decade was identified.
  • Telecommunications under attack for wiretapping purposes.

Rise in cybercrimes in the telecommunications sector

Till date, the most affected sectors by threat actors have been the government, defence, aerospace and healthcare. Now, however, there is a growing focus by cyber criminals on telecommunications companies. Not only are these organisations’ computer systems, software or networks being targeted, but also the infrastructures.

The purpose of the attacks is to intercept sensitive user communications and spy against specific targets, such as companies, politicians, government officials, law enforcement agencies and political activists.

Another case of ‘spam-demia’

The scam (phishing) emails sent to the victims contain related information to an alleged contact of the recipient

A new malspam campaign, i.e. the receipt of emails or messages containing malicious links or attachments, which exploits COVID-19, characterised the last quarter of 2021. The scam (phishing) emails sent to the victims contain related information to an alleged contact of the recipient, with a positive colleague on the Omicron variant.

The victim is invited to view an attachment. By opening it and enabling its content, the malware is automatically downloaded and begins to search for banking credentials, and / or to obtain remote access on the infected device.

More generally, the report highlights how malspam campaigns continue to be the most used tool to violate IT systems, because they are often facilitated by the actions of people, ‘the victims’, who, unaware, put the integrity of personal data or business systems at risk. The human factor in cyber security remains a crucial issue.

A potential risk for hundreds of millions of machines

In December 2021, a serious vulnerability was found that caused much concern among experts. The software, in which this vulnerability is found, is one of the most important tools for managing application logging libraries used by companies, websites and online services.

It is estimated that the vulnerability could be present on three billion devices globally. This vulnerability allows external users to break into systems, remotely executing malicious code. Due to the spread of this software on a global scale and the ease of execution of attacks, the vulnerability received a criticality rating of 10 out of 10.

The reports’ conclusions include an analysis of the dynamics observed in the reference period, with a forecast of future trends for the various business sectors, in light of the experience gained by Leonardo’s analysts.

Download PDF version Download PDF version

In case you missed it

Honeywell - how disruptive technologies make security systems better
Honeywell - how disruptive technologies make security systems better

The shift from standalone systems to fully integrated solutions is one of the biggest shifts the security industry has experienced in recent years.  There is a higher demand...

Has price inflation ended (or slowed down) in the security market?
Has price inflation ended (or slowed down) in the security market?

Inflation, the rise in prices of goods and services over time, can result from a multitude of factors. It happens when there is more money chasing a limited supply of goods. It hap...

Proactive security: the future of perimeter defence
Proactive security: the future of perimeter defence

The days of being reactive are over. That’s right, we as an industry, can no longer afford to be reactive. As threats evolve, the need for proactive security is critical. W...

Quick poll
Which feature is most important in a video surveillance system?