Blog

Our experts' unique discoveries, observations, and opinions on what’s trending today in Business Risk Intelligence and the Deep & Dark Web.

Blog > BRI > Business Risk Intelligence Decision Report: 2017 Mid-Year Update

Business Risk Intelligence Decision Report: 2017 Mid-Year Update

Jon Condra Headshot
BRI Decision Report Blog

On January 11, we released our inaugural Business Risk Intelligence (BRI) – Decision Report. This report highlighted significant events and trends across the cyber threat and geopolitical landscape in 2016; it was intended to serve as a starting point to help both enterprise and public sector decision-makers assess and manage risk more effectively. In this same vein, we are now introducing the second edition of this report, the Business Risk Intelligence – Decision Report Mid-Year 2017 Update. Aside from elucidating trends in the threat landscape in the first half of 2017, the report draws on both open and proprietary sources to provide readers with the requisite contextual understanding within which these trends both find themselves and by which these trends are themselves shaped.

BRI Threat Matrix Chart

BRI Threat Matrix. Download the report to learn more.

Overall, the first half of 2017 was characterized by considerable activity in the cyber domain, including the continued fallout from the attacks on the U.S. Democratic National Committee, similar attempts to manipulate elections in Western Europe, the Shadow Brokers’s continued release of stolen and highly-sensitive documents and exploits, major regulatory shifts in China and Russia limiting anonymity in cyberspace, continued innovation in cybercrime, as well as the apparent shift of the locus of hacktivism away from the U.S. and Western Europe.

Moreover, the jihadi hacker sphere continues to remain characterized by low-level actors, although they appear as motivated as ever to conduct attacks against Western entities. This is despite a major setback stemming from the death of one of the most prominent jihadi hacker group’s leaders in Syria. In the cybercrime realm, threat actors continue to demonstrate keen interest in circumventing the rollout of EMV technology on payment cards, have very clearly grasped the value of personal data obtained from medical institutions, and have demonstrated the ability to quickly integrate advanced exploits — such as the infamous EternalBlue exploit — into their own schemes, as was the case with the WannaCry ransomware worm.

Download the full Business Risk Intelligence Decision Report: 2017 Mid-Year Update. If you’d like to read the inaugural report from January, you can download that, too.

About the author: Jon Condra

Jon Condra Headshot

Jon Condra serves as Director of Asia Pacific Research at Flashpoint. He joined the company in July 2014 from Versign iDefense. Aside from helping coordinate Flashpoint’s Subject Matter Experts and the delivery of intelligence products, Jon specializes in East Asian -- and in particular Chinese -- underground communities, including hacking, hacktivist, and cybercriminal communities. Jon speaks and reads Mandarin Chinese, and has a BA from Gettysburg College and an MA in Security Studies/Intelligence from Georgetown University.