Business Risk Intelligence Decision Report: 2017 Mid-Year Update
On January 11, we released our inaugural Business Risk Intelligence (BRI) – Decision Report. This report highlighted significant events and trends across the cyber threat and geopolitical landscape in 2016; it was intended to serve as a starting point to help both enterprise and public sector decision-makers assess and manage risk more effectively. In this same vein, we are now introducing the second edition of this report, the Business Risk Intelligence – Decision Report Mid-Year 2017 Update. Aside from elucidating trends in the threat landscape in the first half of 2017, the report draws on both open and proprietary sources to provide readers with the requisite contextual understanding within which these trends both find themselves and by which these trends are themselves shaped.
Overall, the first half of 2017 was characterized by considerable activity in the cyber domain, including the continued fallout from the attacks on the U.S. Democratic National Committee, similar attempts to manipulate elections in Western Europe, the Shadow Brokers’s continued release of stolen and highly-sensitive documents and exploits, major regulatory shifts in China and Russia limiting anonymity in cyberspace, continued innovation in cybercrime, as well as the apparent shift of the locus of hacktivism away from the U.S. and Western Europe.
Moreover, the jihadi hacker sphere continues to remain characterized by low-level actors, although they appear as motivated as ever to conduct attacks against Western entities. This is despite a major setback stemming from the death of one of the most prominent jihadi hacker group’s leaders in Syria. In the cybercrime realm, threat actors continue to demonstrate keen interest in circumventing the rollout of EMV technology on payment cards, have very clearly grasped the value of personal data obtained from medical institutions, and have demonstrated the ability to quickly integrate advanced exploits — such as the infamous EternalBlue exploit — into their own schemes, as was the case with the WannaCry ransomware worm.