1、CYBER SECURITYREPORT20232CHECK POINT SOFTWARE|SECURITY REPORT 2023YOU D E S E R V E THE BE S T SECURIT Y3CHECK POINT SOFTWARE|SECURITY REPORT 2023CHAPTER 1:INTRODUCTION TO THE 2023 CYBERSECURITY REPORT BY MAYA HOROWITZCHAPTER 2:TIMELINE OF KEY 2022S CYBER EVENTSCHAPTER 3:2022S CYBER SECURITY TRENDS
2、20Russo-Ukrainianconflict22Theyearofwiperdisruption26Hacktivismgraduatestomajorplayerongeopoliticalstage30WeaponizationofLegitimateTools34RansomwareExtortionShiftingfocusfromencryptiontodataextortion38MobileMalwareLandscapeTheRiskofTrustingtheFamiliar41Cloud:ThirdPartyThreatCHAPTER 4:GLOBAL ANALYSIS
3、CHAPTER 5:HIGH PROFILE GLOBAL VULNERABILITIESCHAPTER 6:INCIDENT RESPONSE PERSPECTIVECHAPTER 7:2023 INSIGHTS FOR CISOS:DISRUPTION AND DESTRUCTIONCHAPTER 8:PREVENTION IS AT REACHCHAPTER 9:MALWARE FAMILY DESCRIPTIONSCHAPTER 10:CONCLUSIONC O N T E N T S0407194463687585971074CHECK POINT SOFTWARE|SECURITY
4、 REPORT 20234CH A P TER 1INTRODUCTION TO THE CHECK POINT 2023 SECURITY REPORT5CHECK POINT SOFTWARE|SECURITY REPORT 20235MAYA HOROWITZVPResearch,CheckPointIn1976,QueenElizabethIIsentthefirstroyalemail.ItwassentoverARPANET,7yearsbeforetheinternetwasinvented,andalong13yearsbeforethefirstrecordedinterne
5、thack.Almost50yearslater,emailhasevolvedintoapopularcommunicationmethod,andthemostpopularvehicleforthreatactorstoinitiatetheirattacks.Infact,theCheckPointResearch(cp)annualSecurityReportshowsthatin2022,theproportionofemail-delivered-attackshasincreased,reachingastaggeringrecordof86%ofallfile-basedat
6、tacksin-the-wild.InourSecurityReport,wediscussafewmoretrendsobservedbycpthroughouttheyear.TheRussia-Ukrainewardemonstratedhowthetraditional,kinetic,warcanbeaugmentedbyacyberneticwar.Ithasalsoinfluencedthebroaderthreatlandscapeintherapidchangesofhacktivismandhowindependentthreatactorschoosetoworkfors