Digital Threat Report 2024
Digital Threat Report 2024
DIGITAL THREAT
REPORT
REPORT 2024
2024
For
Forthe
theBanking
BankingFinancial
Financial Services
Services
and
andInsurance
Insurance(BFSI)
(BFSI) Sector
Sector
02 Introduction
03 Point of View
04 Highlights
Methodology & Sources
Illuminate Adversaries’ Playbooks Anticipate Future Attacks: Assess the Impact of AI in Breaches:
Offer insights into the methods, tactics, Predict potential future breaches based on Explore how AI and machine learning are
and procedures (TTPs) employed by current trends, dark web chatter, and the being utilized by attackers to develop
threat actors, including how they exploit evolution of attack techniques, enabling sophisticated malware, automate attacks,
vulnerabilities, use AI to enhance their organizations to proactively prepare for create convincing deepfakes, and lower the
attacks, and target organizations through emerging threats. barriers for cybercriminal activities.
novel means.
Direct Observations from SISA’s Observations of CSIRT-Fin, CERT-In: Research and Analysis:
DFIR Investigations:
Drawing on select cases and insights gained Based on a comprehensive analysis of cyber Leveraging research on AI’s impact on
from digital forensics and incident response incidents affecting the BFSI sector, with cybersecurity, including adversarial machine
(DFIR) projects handled by SISA over the actionable recommendations for enhancing learning, deepfake technology, and
past year. cyber maturity, data rotection, backup malicious use of large language models.
strategies, and recovery measures.
In the sections that follow, this report will trace the details of
these challenges, vulnerabilities, and emerging trends.
A notable trend has been the rise of grant access to critical systems like single
social engineering, with Business Email sign-on platforms, virtual private networks
Compromise (BEC) and sophisticated (VPNs), email accounts, and software as
phishing campaigns dominating the threat a service (SaaS) applications. Many SaaS
54% of the Business
landscape. Attackers are increasingly platforms include client-specific information
Email Compromise case
turning to AI-powered tools to mine social in URLs, compounding the risk by exposing
investigated had instances
media, scrape employee data, and craft sensitive data when combined with
of pretexting4.
highly personalized lures that bypass compromised credentials.
traditional security filters. Pretexting, the art Phishing Attacks
of creating false scenarios, plays a central
role in these attacks, deceiving employees Stolen credentials and information stealing
into transferring funds, sharing credentials, malware remain among the most effective
or altering account information under the tactics for attackers to breach organizational Phishing attacks,
guise of legitimate requests. The growing networks. Malicious actors acquire accounting for 25% of initial
accessibility of “deepfake as a service” credentials through phishing, information infection vectors, deceive
platforms further amplify the effectiveness stealing malware, or dark web purchases, individuals into revealing
of these schemes, allowing adversaries to targeting usernames, passwords, and sensitive information by
convincingly impersonate executives and session cookies that bypass multi-factor impersonating trusted
bypass manual verification processes. authentication (MFA). These credentials entities5.
Ransomware Attacks
STRUCTURED AND SEGMENTED APPROACH FOR ATTACK VECTORS ACROSS THE BFSI OPERATIONS
Vendor & Partner Integration Systems IoT & Connected Device Security
This case (outside India) is of a multi-stage mobile wallets to bank accounts. Using a Top 5 Mitigation Steps
cyberattack targeting a reward points replay attack methodology, they replicated
system, exploiting server vulnerabilities, and genuine bank transfer requests from physical 1. Multi-Factor Authentication (MFA):
leveraging weaknesses in API transactions branches, mimicking API calls with identical Enable MFA for VPNs, webmail, and
for financial fraud. request identities to bypass security checks accounts accessing critical systems.
and execute unauthorized transfers.
Attackers breached a Linux web server, 2. Network Segmentation: Segment
The attackers’ ultimate objective—to inflate and segregate networks into security
exploiting vulnerabilities to deploy malware
reward points, credit unauthorized amounts zones, separating administrative
and secure remote access for themselves.
to wallets, and transfer funds to external networks from business processes
After gaining initial access, the attackers using physical controls and virtual local
moved laterally within the system by accounts—was successfully achieved.
area networks (VLANs).
exploiting hardcoded database credentials
to access sensitive information. This 3. Application Whitelisting: Enforce
oversight in database security provided the whitelisting on endpoints to block
unauthorized software execution.
attackers unrestricted access, allowing them This case underscores
to manipulate critical data. significant vulnerabilities, 4. Log Monitoring and Retention: Audit
such as the use of and monitor logs to detect unusual
Attackers targeted the reward points hardcoded database patterns or behaviors in events and
system, inflating the value of 250 points credentials, the lack of incidents. Redesign log retention
from $50 to $50,000. They updated only validation in the reward policies to store logs for at least 180
days to ensure availability for incident
specific wallets with these manipulated points system, and the
investigations.
points, eventually making them universally absence of mechanisms
accessible for redemption and monetization, to detect replay attacks. 5. Regular Updates and Virtual
thus enabling widespread exploitation. It also highlights the Patching: Ensure all operating systems
importance of robust and applications are updated regularly.
Attackers were able to deceive the system vulnerability management, Use virtual patching to protect legacy
systems and networks.
by crediting manipulated reward points to secure transaction
users’ mobile wallets. This credit served workflows, and
as a stepping stone for the next phase of continuous monitoring to
the attack which was to transfer funds from prevent such exploitation.
STRUCTURED AND SEGMENTED APPROACH FOR ATTACK VECTORS ACROSS THE BFSI OPERATIONS
Vendor & Partner Integration Systems IoT & Connected Device Security
CSIRT-Fin/CERT-In has been watchful The attackers aimed to bypass security Top 5 Mitigation Strategies
and has proactively taken measures and checks and exploit gaps in the information
thwarted cyber-attacks which could have infrastructure of these small entities. Key 1. Multi-Factor Authentication (MFA):
caused damage in the BFSI sector. protective measures include enforcing Multi- Enforce MFA for accessing critical
Factor Authentication (MFA), segmenting systems.
But for the timely intervention and networks into secure zones, implementing
preventive measures, any lapses would have application whitelisting, using virtual 2. Network Segmentation: Segment
and segregate networks into security
resulted in financial and reputational risk for patching for legacy systems, and deploying
zones to protect sensitive information
the sector. robust web and email filters with antivirus
and services.
scanning at both host and gateway levels.
Small entities in the BFSI sector must take 3. Application Whitelisting: Enforce
proactive steps to secure their information whitelisting on endpoints to prevent
system infrastructure against cyber-attacks. unauthorized software execution.
STRUCTURED AND SEGMENTED APPROACH FOR ATTACK VECTORS ACROSS THE BFSI OPERATIONS
Vendor & Partner Integration Systems IoT & Connected Device Security
A third-party service provider in the BFSI Once inside, the attacker deleted critical Top 5 Mitigation Strategies
sector was impacted by a cyber attack. database backups and deployed a custom
ransomware variant called ‘cryptor’, 1. Multi-Factor Authentication (MFA):
The attacker, a member of the notorious encrypting critical files. The ransom note Enable MFA for VPNs, webmail, and
RansomEXX ransomware group, gained left behind was more than just a demand— accounts accessing critical systems.
access through vulnerabilities in the it was a threat of double extortion, warning
provider’s infrastructure, slipping past that sensitive client data would be leaked if 2. Regular Updates: Ensure all operating
systems and applications are updated
defenses undetected. the ransom wasn’t paid. (Double extortion
regularly. Use virtual patching to
– (1) demand for ransom, (2) leaking client
protect legacy systems and networks.
data)
3. Data Protection: Enforce data
This wasn’t a direct assault The compromised entity suffered protection, backup, and recovery
on the BFSI entity—but reputational damage, operational measures. Encrypt data at rest to
safeguard against breaches and
rather an exploitation disruption, and an increased risk of
exfiltration.
of the supply chain that customer churn.
underpinned the entity’s 4. Advanced Security Systems: Deploy
core services. intrusion detection & prevention
systems, network detection and
response system, extended detection
and response system, network
behaviour and anomaly detection
system, and firewalls as appropriate
for enhanced threat detection and
prevention.
STRUCTURED AND SEGMENTED APPROACH FOR ATTACK VECTORS ACROSS THE BFSI OPERATIONS
Vendor & Partner Integration Systems IoT & Connected Device Security
In a carefully orchestrated attack on a external merchants. The loophole created a Top 5 Mitigation Strategies
payment service entity, the threat actors perfect storm—transactions appeared valid
exploited a vulnerability in the wallet flow on the merchant’s side while leaving the 1. Confidentiality: Restrict access to API
of the payment service entity, targeting actual wallet balances untouched. documentation, including Postman
the integration between the payment collections, ensuring it is accessible
service provider and merchants, to carry out The payment service provider faced financial only to authorized personnel.
multiple unauthorized transactions. losses. Subsequently this vulnerability has
2. Strong Authentication: Use robust
been fixed.
mechanisms like API keys, OAuth,
By leveraging this exploit, the attackers
or JSON web token (JWT) with
seamlessly placed orders through third- secure token management practices,
party applications, exploiting the direct link appropriate expiration times, and
between the payment service provider and granular access control based on user
roles and permissions.
STRUCTURED AND SEGMENTED APPROACH FOR ATTACK VECTORS ACROSS THE BFSI OPERATIONS
Vendor & Partner Integration Systems IoT & Connected Device Security
STRUCTURED AND SEGMENTED APPROACH FOR ATTACK VECTORS ACROSS THE BFSI OPERATIONS
Vendor & Partner Integration Systems IoT & Connected Device Security
A fintech company specializing in tax on the company’s Amazon Web Services Top 5 Mitigation Strategies
related services became the target of a (AWS) infrastructure. By leveraging these
sophisticated cyberattack that exposed webshells, the attacker gained unauthorized 1. Multi-Factor Authentication: Enable
critical weaknesses in its cloud infrastructure. access to the company’s Simple Storage multi-factor authentication of users
The breach began with the exploitation of Service platform (S3 bucket), where sensitive particularly for cloud, virtual private
cross-site scripting (XSS) in a commonly client data was stored. networks, webmail, and accounts that
used rich text editor embedded in the access critical systems.
company’s web applications. This unauthorized access led to a severe
2. Cloud Instance Security: Check public
data breach, operational disruption, and
accessibility of all cloud instances in
The attacker used the XSS vulnerability financial losses. Client trust eroded as use. Make sure that no server/bucket
to inject malicious scripts, establishing a sensitive financial records and business is inadvertently leaking data due to
foothold within the company’s environment. data were compromised, highlighting inappropriate configurations.
From there, the threat actor escalated the cascading impact of inadequate web
access, deploying webshells (enables a application security combined with cloud 3. Access Token Security: Ensure proper
security of AWS/Azure/GCP access
threat actor to remotely access the web misconfigurations.
tokens. The tokens should not be
server) to execute commands directly exposed publicly in website source
code, any configuration files, etc.
STRUCTURED AND SEGMENTED APPROACH FOR ATTACK VECTORS ACROSS THE BFSI OPERATIONS
Vendor & Partner Integration Systems IoT & Connected Device Security
An insider threat case (outside India) reveals Post receiving the prepaid cards, the Top 5 Mitigation Strategies
how an employee abused administrative perpetrator manipulated the database to
privileges to manipulate dormant accounts inflate account balances, loading the cards 1. Least Privilege Principle: Apply the
and withdraw funds undetected. With with substantial funds. The withdrawal of the principle of least privilege across all
access to critical systems, the insider threat money was via ATMs, concealing the modus system levels to minimize risk. Limit
actor orchestrated financial pilferage over a operandi by deleting transaction data and administrative access to critical systems
period of two years. restoring balances to erase all traces. and enforce strict role-based access
controls (RBAC).
The Internet of Things (IoT) is transforming opening through smart speakers and
the way businesses operate, particularly mobile devices. These advancements not
in industries driven by digital innovation only enrich customer experiences but also
such as Banking, Financial Services, and provide valuable insights into consumer
Insurance (BFSI). IoT has embedded behavior.
itself into daily workflows, revolutionizing
customer experiences and streamlining However, in the BFSI sector, IoT applications
operations. From connected ATMs to extend beyond front-end customer
wearable payment devices, the integration interactions. Check scanners, touch-
of IoT in financial services has redefined enabled kiosks, branch digital signage, and
engagement, data collection, and service bluetooth beacons silently operate behind
delivery. the scenes, enhancing user engagement
and operational efficiency. On-premise
The number of Internet of Things (IoT) ATMs interface with connected devices,
devices worldwide is forecast to reach 32.1 amplifying potential vulnerabilities.
billion IoT devices in 2030, significantly
broadening the attack surface. As IoT A key challenge in securing IoT in financial
adoption accelerates, financial institutions services is visibility and control—knowing
are increasingly relying on these devices where devices are deployed and how they
to optimize processes and enhance operate. Forrester’s research highlights
customer interactions. However, with this that 36% of financial leaders prioritize IoT-
exponential growth comes an alarming rise driven operational efficiency. Yet, many
in security vulnerabilities. Nearly 99% of IoT IoT deployments in banking, trade finance,
exploitation attempts leverage previously and supply chain management often lack
known vulnerabilities (CVEs), exposing adequate oversight. This lack of visibility
critical gaps in security infrastructure. leaves financial ecosystems exposed to
potential breaches and cyberattacks.
Financial institutions are increasingly
leveraging IoT for personalized services. The consequences of IoT vulnerabilities
Banks utilize IoT to identify and greet are significant. Forrester’s findings reveal
customers as they enter branches, enhance that 34% of enterprises impacted by IoT
credit risk assessments through real- breaches experienced losses ranging from
time data, and deliver targeted product $5 million to $10 million—substantially
recommendations via wearables. IoT- higher than attacks on traditional IT
powered devices also facilitate on-the-go infrastructure.
transactions and enable remote account
The last case is an in-depth analysis that explores IoT vulnerabilities and attacks,
providing valuable insights into how these risks translate to the BFSI sector. By
examining real-world incidents—from breaches through connected fish tanks and
medical devices to compromised home security cameras and cryptocurrency wallets—
this analysis underscores the critical need for enhanced IoT security measures.
STRUCTURED AND SEGMENTED APPROACH FOR ATTACK VECTORS ACROSS THE BFSI OPERATIONS
Vendor & Partner Integration Systems IoT & Connected Device Security
Hardware hacker Joe Grand successfully out” during the boot process, Grand tuning of signal widths, wire lengths,
unlocked a Trezor wallet (outside India) disrupted the firmware’s security check, and trigger points proved essential in
containing US$2 million in cryptocurrency by forcing the Trezor to copy the unencrypted hitting the microcontroller at exactly the
exploiting hardware vulnerabilities through seed and PIN into RAM—allowing him to right moment. After hours of meticulous
fault injection7. extract them without triggering the system’s attempts, Grand successfully retrieved the
safeguards. funds, demonstrating how microcontroller
Faced with strict PIN limits and irreversible weaknesses in embedded devices can be
data erasure, Grand used voltage glitching The attack required precise manipulation— exploited if not rigorously secured against
to disrupt the wallet’s boot process, removing capacitors, fine-tuning glitch fault attacks.
bypassing the Readout Protection (RDP) parameters, and avoiding crashes
mechanism. By precisely inducing a “brown- that could erase critical data. Careful
As we move into 2025, the digital payments variations often result in inefficiencies, The integration of compliance and
and BFSI industries stand at the cusp of a especially in cross-border payment innovation is not merely a response to
transformative shift driven by regulatory solutions, which are crucial to the financial external pressures but a fundamental shift
changes and the accelerating digitization of industry’s global operations. in how organizations view their roles in the
financial services. digital ecosystem. The expected growth
Despite these hurdles, the narrative is of cyber attacks underscores the critical
In this shifting landscape, compliance is beginning to shift toward regulatory need for resilience and adaptability. In this
no longer merely a matter of adhering to harmonization. context, compliance is no longer seen as
checklists but has emerged as a strategic a cost center but as a cornerstone of trust
imperative that will shape the industry’s and a catalyst for growth. It has become an
future. This transformation is not without essential component of an organization’s
its challenges, but it also opens a gateway The push for unified ability to build credibility and foster long-
to significant opportunities for growth and global standards is gaining term customer loyalty.
resilience. momentum, offering a
way to bridge regional As the BFSI industry moves forward,
The rapid pace of regulatory evolution gaps and create cohesive the conversation around compliance is
has created a complex environment for frameworks that simplify evolving. What was once perceived as
financial institutions. Mandates such as compliance and improve a reactive, burdensome process is now
CERT-IN directives for reporting cyber operational efficiency. recognized as a strategic driver of resilience
incidents within 6 hours of noticing such and innovation. The ability to navigate a
incidents or being brought to notice about harmonized compliance framework will not
such incidents, RBI Master Direction in This movement toward regulatory alignment only help organizations manage the growing
Digital Payment Security Controls(DPSC) is not just a means of reducing friction but complexity of regulatory requirements
and Master Direction in Outsourcing of hold the promise of making compliance an but also position them to thrive in an
Information technology services; RBI enabler of growth for the financial sector interconnected, data-driven global
Cyber Security Framework in Banks globally. economy. The next decade will redefine
(CSF); SEBI’s Cybersecurity and Cyber the role of compliance, transforming it into
Resilience Framework (CSCRF), Digital The dual demands of regulatory compliance a force that propels the industry toward
Personal Data Protection (DPDP) Act, and technological innovation present a greater trust, innovation, and sustainable
2023, PCI DSS 4.0, European General Data delicate balancing act for digital payment growth.
Protection Regulation (GDPR),the California organizations. The need to stay ahead in
Consumer Privacy Act (CCPA) have set new areas such as real-time payments, fraud
benchmarks for accountability and data detection, and predictive financial services
protection. These frameworks underscore requires a forward-looking approach RBI, IRDA and SEBI are
the urgent need for organizations to to compliance. Emerging techniques proactively supporting the
anticipate and adapt to emerging risks, like data anonymization and synthetic BFSI sector from a policy
especially as the digital payments sector, data generation are paving the way for and direction perspective,
with its vast repository of sensitive financial innovation without compromising privacy CERT-In and CSIRT-Fin are
data, becomes an increasingly attractive or security. Additionally, embedding helping from a strategic,
target for cyber perpetrators. However, compliance into the design phase of new tactical and operational
the fragmented nature of compliance technologies is proving to be a game- perspective. Thus, all
frameworks across jurisdictions adds changing strategy, enabling organizations to these entities are working
another layer of complexity, particularly for future-proof their innovations and mitigate cohesively to ensure trust
businesses operating across borders. Local risks proactively. and resilience in the BFSI
laws, cultural nuances, and jurisdictional sector for all stakeholders.
Harmonizing security standards across all Addressing the talent gap requires fostering
digital payment methods—not just cards— a skilled workforce through certification
ensures a consistent and comprehensive programs focused on payment security.
security framework that addresses emerging This will enable enterprises to design secure
risks in alternative payment systems like payment applications and implement robust
wallets, UPI, and QR codes. security standards effectively.
% COMPLIANT IN % COMPLIANT
HEADING CONTROL
INDIA GLOBAL
Hardening and configuration documentation
System Hardening and Configuration
aligned with Center for Internet Security (CIS)
Management
standards
SISA assessed approximately 1,550 clients The analysis is based on technical gap The gap assessments included PCI DSS, PCI
globally between November 2022 and reports generated from assessments PIN, P2PE, PCI SAQ, and local governance
November 2024 to derive the observed conducted by SISA’s Qualified Security standards and regulations.
control gap compliance percentages. Assessors (QSAs).
Out of 850 clients assessed in India, A similar methodology was applied to 700
765 were compliant while frequently clients assessed outside India to determine
encountering observed control gaps. global compliance percentages.
Firewall: Most institutions have Conformance (DMARC), and Sender Policy Content Filtering / Proxy: This area
implemented basic firewall configurations, Framework (SPF) configurations. However, lacks dedicated solutions and consistent
however, clients allow all traffic through geo-location-based blocking and periodic rule reviews. Absence of content control
open policy configurations, lacking granular rule reviews are often missing, which increases exposure to unfiltered, potentially
control. Additionally, insufficient impact weakens phishing and spam defences. malicious traffic.
analysis in change management processes
leads to critical changes not being tracked, Virtual Network / Network Segregation: Web Application Firewall (WAF): WAF
increasing the risk of unauthorized access. Many institutions have implemented implementation is inconsistent. Many
network segmentation but often lack proper applications are not covered, and URI paths
DDoS Mitigation: DDoS protection is testing and validation of these segmentation are not adequately tested or blocked. High
largely limited to internet service provider controls. Overly broad access control and medium threat signatures are often
(ISP)-level solutions, and dedicated mechanisms are frequently observed, which set only to detect, leaving gaps in active
enterprise-grade DDoS mitigation is often undermines the intended security benefits defences.
missing. This leaves institutions vulnerable of segmentation.
to volumetric and application-layer attacks.
Application Security Secure Configuration
Content Filtering / Proxy: Similar to
application security, network-level content IPS/IDS: There is a fair presence of Intrusion Webserver & Database: Lack of application
filtering shows a lack of dedicated solutions Prevention and Detection systems. However, hardening and limited security standards
and regular reviews, which are essential for medium and low severity signatures often in application design, coupled with
filtering malicious or unwanted traffic. remain unblocked, and many organizations inadequate coordination between security
lack internal IPS, posing risks to application and application teams, results in a larger
Email Gateway: Email gateways security. attack surface and greater exposure to
primarily use standard Domain-based vulnerabilities.
Message Authentication, Reporting, and
Cloud Environment Specifics (AWS, Azure, User Access review: If excessive user
GCP): Common gaps include missing audit rights are not revoked or accounts for all VAPT (Vulnerability Assessment and
logging for PaaS, insufficient hardening, and terminated users have not been removed Penetration Testing)
absent MFA. These vulnerabilities reflect a in due time, they may be used by malicious
need for stronger cloud access control and users for unauthorized access. Internal/External vulnerabilities and
monitoring. Penetration testing – Periodic vulnerability
management and penetrations testing are
Endpoint Security not regularly followed by many financial
Monitoring & Response institutions. Attackers routinely look for
Endpoint Detection and Response (EDR): unpatched or vulnerable externally facing
Security Logging: Critical logs such as Most large financial institutions have servers, which can be leveraged to launch a
DNS, proxy, MFA, and O365 (email logs) implemented EDR solutions, providing directed attack. Because external networks
are not integrated by many organizations. advanced detection and response are at greater risk of compromise, external
This lack of integration limits visibility and capabilities. However, some mid-sized and vulnerability scanning must be performed
hampers the ability to detect potential smaller clients are still relying primarily periodically.
threats effectively. Additionally, API- on traditional antivirus (AV) solutions with
based integrations for SAAS services limited EDR functionality. This limits the
are sometimes constrained by licensing scope of endpoint threat containment
limitations, further impacting comprehensive and makes them more vulnerable to
threat monitoring. sophisticated attacks that require proactive
threat hunting and automated response.
SIEM Integration: SIEM integration lacks
comprehensive data feeds, such as DNS and
MFA logs, essential for threat correlation.
This hinders timely detection and response
capabilities, particularly for SAAS and cloud
environments.
This report
Before draws
we dive intoon the collective
recommendations artificial
are intelligence.
shifting towards Attacks in 2025 will
harmonization, Drawing insights from observed threats
expertise
based on theandgaps
insights of industry
and vulnerabilities not only
with the be
goalmore sophisticated
of unifying but also
disparate across the digital payment ecosystem,
leaders to provide
highlighted a unified
in the previous view of
section, it’s exponentially
standards moreregions.
across evasive Compliance
and pervasive. we present a series of predictions for
the cybersecurity
crucial landscape
to shift our focus in and
forward 2024.grasp Threat
is actors arefrom
transforming set toa harness
burdensomeAI to craft 2025 - seven highly anticipated attack
It
howreflects a seamless landscape
the cybersecurity exchange is ofset to highly customized
obligation assaults, leaving
into a strategic enabler— minimal methodologies likely to dominate the threat
knowledge, shaped
transform in the comingby year.
real-world cyber
Understanding tracethat
one as they
canoperate at an unprecedented
unlock growth, improve landscape in 2025.
incidents, evolving
the trends and adversarial
challenges of 2025tactics,
is not and scale—powered
operational by the same
efficiency, revolutionary
and reinforce
emerging threat intelligence.
just valuable—it’s imperative for crafting technologies
resilience transforming
in sectors industries
like digital payments, These insights aim to empower
strategies that are resilient to the threats of globally.
where Add to that
sensitive datathe looming
remains quantum
a prime organizations with a forward-looking
By integrating a national perspective on
tomorrow. computing
target revolution capable of rendering
for attackers. perspective, guiding them to anticipate,
cyber trends with frontline experience today’s encryption obsolete, organizations adapt, and fortify their defenses in the
in mitigating
As we peer intosophisticated
the future of attacks, this
cybersecurity, face an evolving
Beneath and complex
these strategic shiftsreality.
lies a more face of an increasingly volatile cyber
report
the delivers
crystal a holistic
ball reveals understanding
a landscape Preparingreality—critical
pressing for these seismiccontrol
shifts isgaps
no environment.
of the shifting
dramatically threat environment.
reshaped by the power of The longer optional;
continue it’s essential
to persist for survival.
across industries.
result is a comprehensive resource that Weak access controls, over-privileged
empowers organizations to anticipate user accounts, and misconfigurations
risks, strengthen defenses, and navigate leave even the most fortified
the complexities of today’s cybersecurity organizations exposed. This report
challenges. highlights Rise
howofthese
deep fakes &
vulnerabilities are
AI generated content
not merely by-products of oversight but
Attackers will leverage deep
Over the past year, cyberattacks have structural weaknesses that adversaries
fakes to impersonate executives
grown more sophisticated, driven by consistently
andexploit to devastating
bypass verification, enabling effect.
social engineering attacks.
the intersection of new techniques and
the persistence of proven methods.
IoT devices expanding As the industry braces for what lies Growing threat of
Social engineering, inattack surfaces
particular, has ahead, the future of cybersecurity is supply chain attacks
and malicious libraries
surged to the forefront, with Business
Compromised IoT devices already being reshaped by artificial
provide entry points for attackers, Malicious code injected into
Email Compromise (BEC) and advanced intelligence (AI). The same technology
enabling lateral movement trusted software updates or
phishing campaigns operating
across networkswith
and potentially that drives innovation is arming attackers libraries compromises entire supply
disrupting critical operations. chains, spreading vulnerabilities
alarming precision. These attacks, often with the tools to conduct highly across multiple organizations.
bolstered by data sourced from the dark personalized, evasive,01 and large-scale
web, bypass traditional defenses by attacks. In 2025 and beyond, AI-driven
leveraging stolen credentials and session threats07will challenge existing defense
cookies, effectively neutralizing multi- mechanisms, forcing organizations to02
factor authentication. Meanwhile, supply rethink their approach to threat detection
chain breaches have escalated, exploiting and response.
ANTICIPATED CYBER
the trust organizations
Crypto - A new place in third-party
frontier THREATS IN 2025 Emerging threat of
vendors andforopen-source
cyber threats repositories 06 report offers
This concrete
Identify. Defend. LLM prompt hacking
thereby introducing vulnerabilities at
Cyber attackers exploit
recommendationsSecurerooted in frontline 03
the future. Attackers manipulate LLM
scale. cryptocurrencies for anonymous audits and incident analysis, outlining the (Large Language Models)
transactions, target crypto wallets, inputs to extract sensitive data,
and attack exchanges, leading to steps necessary to close control gaps, override controls, and induce
financial
Yet, the rising tide theft
ofand extortion.
cyber threats is strengthen defenses, and build adaptive harmful outputs in local Al
05 applications.
not occurring in isolation. As digital strategies against emerging 04threats. The
ecosystems expand, so too does the findings presented here serve as both a
recognition that compliance must evolve reflection of the current landscape and a
beyond rigid frameworks. This report guidepost for navigating the uncertainties
explores how regulatory landscapesQuantum computing
of tomorrow.
- Adversarial LLMs
A looming threat to enchaning attack
cryptography capabilities
Quantum advancements Malicious LLMs (Large Language
threaten to break current Models) enable attackers to
encryption methods, exposing automate malware creation,
sensitive data and enabling phishing campaigns, and exploit
large-scale cyber espionage. development, intensifying the
threat landscape.
8
33 DIGITAL THREAT REPORT 2024
ANTICIPATED ATTACK 1:
RISE OF DEEP FAKES AND AI-GENERATED CONTENT
ANTICIPATED ATTACK 2:
GROWING THREAT OF SUPPLY CHAIN
ATTACKS AND MALICIOUS LIBRARIES
As Large Language Models (LLMs) become Attackers can exploit these vulnerabilities
increasingly integrated into various to manipulate the LLM’s output, leading to
applications, there is a growing threat unauthorized actions, disclosure of sensitive
of LLM prompt hacking, where attackers information, or the generation of harmful
manipulate the inputs to these models content.
to induce unintended and potentially
harmful behaviors. This threat is particularly Prompt Hacking Techniques and Risks
pronounced in applications that host
LLMs locally, rather than relying on APIs One common prompt hacking technique
from established providers like OpenAI or involves crafting inputs that bypass the
Anthropic. model’s intended constraints, such as the
“grandmother exploit,” where attackers
manipulate the model into providing
disallowed information by framing the
request in a specific context.
Locally hosted LLMs may
proprietary data or personally identifiable
lack the comprehensive
Attackers may use prompt injection attacks information (PII) that the model has been
safety measures and
to override system prompts or extract trained on.
robust security features
confidential data that the model has been • Manipulate decision-making processes:
implemented by these
exposed to during training. In applications Influencing the outputs of the LLM in
providers, making them
like chatbots, virtual assistants, or interactive ways that could affect business decisions,
more susceptible to
voice response (IVR) systems, attackers customer interactions, or automated
exploitation.
with knowledge of the underlying LLM can systems.
manipulate prompts to:
Vulnerabilities in Locally Hosted LLMs The risks associated with LLM prompt
• Inject malicious content: Causing hacking are significant, as successful
When organizations incorporate LLMs the LLM to generate harmful or attacks can compromise data integrity,
directly into their environments, they assume inappropriate responses that could confidentiality, and system availability.
the responsibility for implementing security damage the organization’s reputation or Organizations relying on LLMs for critical
measures to protect against prompt hacking lead to legal issues. functions may face severe consequences,
and other attacks. Many locally hosted LLMs • Exfiltrate data: Extracting sensitive including data breaches, financial losses,
may not have sufficient safeguards against information from the model, such as and erosion of customer trust.
adversarial inputs, leaving them vulnerable.
ANTICIPATED ATTACK 4:
INFLUENCE OF ADVERSARIAL LLMS ENHANCING
ATTACK CAPABILITIES
Attackers are increasingly leveraging generated malware and exploits can adapt, Furthermore, the availability of adversarial
adversarial Large Language Models (LLMs) obfuscate, and mutate to avoid detection LLMs lowers the barrier for novice malicious
to significantly enhance their cyberattack by conventional antivirus software and actors. Individuals with limited technical
capabilities, posing new challenges to Endpoint Detection and Response (EDR) expertise can now execute complex
cybersecurity defenses. These malicious systems. cyberattacks by simply interacting with these
LLMs—such as WormGPT, FraudGPT, malicious AI models. This democratization
WolfGPT, and XXXGPT—are designed to of advanced attack capabilities leads to an
generate sophisticated and tailored cyber increase in the volume and sophistication
threats with minimal effort. By utilizing these The polymorphic nature of cyber threats, as more threat actors can
advanced models, attackers can create of AIcrafted code means launch attacks that previously required
highly effective malware, craft convincing that signature-based specialized skills.
phishing emails, and automate the detection methods are less
development of exploits. effective, as each iteration
can appear unique while
One of the key concerns is the evasion maintaining its malicious
of traditional security measures. AI- functionality.
Quantum computing is set to revolutionize Current encryption methods, both symmetric encryption by effectively halving
the world of information technology by asymmetric algorithms like RSA and the key length.
introducing computational power that symmetric algorithms such as Triple DES (3-
vastly exceeds current capabilities. With an DES) and certain key lengths of AES (like 64- In such a scenario, we face a situation
exponential increase in processing speed— bit AES), rely on the computational difficulty where the integrity of the sender in any
sometimes described in astronomical terms of specific mathematical problems. Classical communication cannot be trusted. Intruders
like 2 to power of 3 to the power of 1000 computers find it infeasible to solve these equipped with quantum computers could
—quantum computers can tackle complex problems within a reasonable timeframe, easily break encryption keys and algorithms,
problems that are practically unsolvable by which is why these encryption methods are enabling them to conduct man-in-the-
classical computers. considered secure. middle attacks. They could intercept,
decrypt, and even alter messages without
However quantum computing holds the the sender or receiver being aware,
potential to break existing encryption compromising the confidentiality and
The introduction of algorithms and keys that safeguard our integrity of the communication.
quantum computing digital communications. Algorithms
poses a critical threat like Shor’s algorithm can factor large
to all applications and numbers and compute discrete logarithms
communication channels exponentially faster than classical
that rely on public key algorithms. This capability effectively
infrastructure, digital renders asymmetric encryption vulnerable.
certificates, and key Similarly, Grover’s algorithm can speed up
exchange protocols. the brute-force search process, weakening
ANTICIPATED ATTACK 6:
CRYPTO: A NEW FRONTIER FOR CYBER THREATS
Cryptocurrency has significantly altered Additionally, a new breed of malware This trend has led to the development of
the cyber threat landscape, empowering has emerged that goes beyond the an entire ecosystem designed to support
intruders in ways that previous technologies traditional goal of harvesting Personally these illicit transactions. Services and
could not. Initially, the cyber perpetrators Identifiable Information (PII). These platforms have emerged to facilitate the
utilized Bitcoin for illicit transactions sophisticated malware programs scan exchange, laundering, and obfuscation of
due to its widespread acceptance. infected environments not just for sensitive cryptocurrency funds, making it easier for
However, they’ve since migrated to other data but specifically for the presence of intruders to monetize their activities without
cryptocurrencies like Monero (XMR), cryptocurrency wallets or the keys that leaving a traceable trail.
which offer enhanced privacy and non- secure them. By extracting these keys,
traceability. Monero’s advanced encryption intruders can gain unauthorized access to
techniques obscure transaction details, victims’ crypto assets, leading to significant
making it exceptionally challenging for law financial losses.
enforcement agencies to trace funds and
identify the individuals involved.
PEOPLE
(Awareness, Training, and Culture)
ENHANCING PROCESS
(Policies, Procedures, and Governance)
RESILIENCE •
•
Accelerate Vulnerability Assessments Time Frame
Develop Comprehensive Incident Response Playbooks
ACROSS KEY • Integrate Threat Intelligence into Monitoring Processes
DOMAINS
• Defense-in-depth program
• Zero Trust Architecture (ZTA) Implementation
TECHNOLOGY
(Tools, Systems, and Solutions)
A strong and adaptable cybersecurity posture begins with people. Organizations must
foster a culture where cybersecurity awareness is continuous, leadership-driven, and
embedded across all levels.
Effective cybersecurity relies on processes that not only anticipate threats but also
build resilience through continuous monitoring, adaptive defense strategies, and
structured responses.
In today’s rapidly evolving threat landscape, No single solution can fully protect against The traditional network perimeter is no
waiting for quarterly or annual vulnerability modern cyber threats. Defense-in-Depth longer sufficient as remote work, cloud
assessments is no longer sufficient. offers a layered strategy where multiple services, and mobile devices expand the
Conducting daily or weekly assessments controls—firewalls, intrusion prevention, attack surface. Zero Trust Architecture (ZTA)
using automated solutions is essential to and endpoint detection—work in tandem enforces continuous authentication, granular
identify and mitigate weaknesses before to detect, delay, or mitigate attacks. access control, and micro-segmentation to
attackers exploit them. The time between This holistic framework extends beyond safeguard sensitive assets. By assuming that
vulnerability disclosure and exploitation technology, incorporating policies and no user or device can be implicitly trusted,
has drastically shortened, making real- procedures that reinforce organizational ZTA reduces lateral movement and limits
time scanning a critical component of resilience. Endpoint Detection and the damage potential of compromised
organizational security. Automated tools Response (EDR) tools play a pivotal role credentials or insider threats.
ensure systems are continuously monitored, in addressing AI-driven and customized
allowing teams to prioritize remediation and malware threats, bridging the gap left by Proactive processes form the backbone
close security gaps swiftly. traditional antivirus solutions. This layered of a resilient cybersecurity strategy. By
approach creates redundancies, ensuring accelerating assessments, embedding
that even if one control fails, others remain intelligence, deploying layered defenses,
Threat Intelligence Integration active to contain breaches. and implementing Zero Trust, organizations
can build robust frameworks that withstand
As adversaries grow more sophisticated, evolving threats.
the integration of threat intelligence into Comprehensive Incident
monitoring processes is crucial. Threat Response Playbooks
actors often share tools and vulnerabilities,
necessitating collective action and Preparedness is critical. Standardized
intelligence sharing. Organizations must playbooks for responding to diverse cyber
incorporate reputable threat feeds (such as incidents ensure that teams act quickly,
from CERT-In) into their security frameworks uniformly for the type of incident and
to proactively detect attack patterns. This decisively. These playbooks guide analysis,
intelligence-driven approach enables faster containment, and mitigation, reducing the
response times and anticipates threats chance of oversight during critical moments.
based on evolving tactics, strengthening By establishing predefined response
defenses across the board. By fostering protocols, organizations can streamline
collaboration between vendors, enterprises, investigations, minimizing operational
and industry peers, organizations create disruptions and financial losses.
a unified defense that mirrors the
interconnected strategies used by threat
actors.
Accelerate Patching of Network Application and API Security Securing AI-Native Applications
Devices
APIs represent a critical attack vector, APIs within AI-native applications are often
Network devices are prime targets for especially in AI-native and payments overlooked during development. API
attackers, with vulnerabilities in firewalls ecosystems. To mitigate threats: security testing must be embedded early
and VPNs surging by 229% in the past year. • Secure APIs with strong authentication in the Software Development Lifecycle
Zero-day exploits are being weaponized (OAuth, JWT, API keys) and enforce IP (SDLC) to uncover hidden vulnerabilities.
faster, with some attacks launched within whitelisting. By expanding Dynamic Application Security
hours of disclosure. To stay ahead, • Use server-to-server validation to Testing (DAST) to cover API endpoints,
organizations must aggressively patch safeguard sensitive transactions, avoiding organizations address gaps that traditional
network devices on a continuous basis, browser redirects. scanning might miss. Proactive testing
reducing exposure and closing critical • Implement CORS (Cross-Origin against OWASP Top 10 API vulnerabilities
gaps before exploitation occurs. This Resource Sharing) restrictions to prevent ensures AI systems are protected at scale.
proactive stance is essential to safeguard unauthorized domains from accessing
infrastructure from evolving AI-powered APIs. Through a layered technological defense,
attack techniques. organizations can reduce exploitable
By locking down API access and restricting weaknesses, safeguard sensitive operations,
sensitive documentation, organizations can and stay resilient in the face of rapidly
AI-Driven Anomaly Detection and reduce risks of API-driven data breaches and evolving cyber threats.
Dark Web Monitoring unauthorized system interactions.
The journey to secure this ecosystem is far The road ahead will undoubtedly be filled
from over. Threats are constantly evolving, with challenges, but with the right insights,
and as technology advances, so do the preparation, and dedication, it’s a road we
tactics and motives of those seeking to can navigate together. Here’s to building a
disrupt it. The digital payments sector, with safer and more secure future for all.
its immense value and increasing reliance on
ACKNOWLEDGEMENTS
We express our deepest gratitude to our Team for the Indian Financial Sector) and
customers and partners, whose trust and CERT-In (Indian Computer emergency
collaboration are the cornerstone of our Response Team), whose contributions have
efforts. Engaging with them not only helps been instrumental in the creation of this
us exchange knowledge but also drives our report. Their ability to synthesize findings,
continuous growth and learning. Together, provide insights, and bring this analysis to
we share a vision of building a more secure life underscores the incredible talent, depth
and resilient digital ecosystem. and dedication within the respective teams.
https://www.sharefile.com/resource/blogs/cybersecurity-trends
https://www.beyondtrust.com/blog/entry/beyondtrust-cybersecurity-trend-predictions
https://blog.shi.com/cybersecurity/are-you-protected-2025s-top-cybersecurity-trends-and-strategies-to-follow-now/
https://medium.com/@DataFlowX/the-future-of-cybersecurity-predictions-and-trends-for-2025-21e95173d1e9
https://www.pwc.com/gx/en/tmt/5g/pwc-securing-5gs-future.pdf
https://www.sharefile.com/resource/blogs/cybersecurity-trends
https://www.beyondtrust.com/blog/entry/beyondtrust-cybersecurity-trend-predictions
https://blog.checkpoint.com/security/2025-cyber-security-predictions-the-rise-of-ai-driven-attacks-quantum-threats-and-social-media-
exploitation/
https://www.weforum.org/stories/2024/10/cyber-resilience-emerging-technology-ai-cybersecurity/
https://www.forbes.com/councils/forbestechcouncil/2024/07/11/the-future-of-cybersecurity-emerging-threats-and-how-to-combat-them/
https://blog.checkpoint.com/research/ransomwares-evolving-threat-the-rise-of-ransomhub-decline-of-lockbit-and-the-new-era-of-data-
extortion/
https://www.scworld.com/news/north-korean-nation-state-threat-actor-using-play-ransomware
https://www.datacenterknowledge.com/data-storage/evolving-ransomware-threats-why-offline-storage-is-essential-for-modern-data-
protection
https://www.scmr.com/article/regulations-are-forcing-organizations-to-address-software-supply-chain-security/procurement
https://cybersecurityventures.com/software-supply-chain-attacks-to-cost-the-world-60-billion-by-2025/
https://www.scmr.com/article/supply-chain-cyberattacks
https://venturebeat.com/security/forresters-ciso-budget-priorities-for-2025-focus-on-api-supply-chain-security/
https://cybersecurity-magazine.com/why-are-supply-chain-attacks-increasing/
https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/supply-chain-attacks-cyber-threat.html
https://fintechmagazine.com/articles/why-the-finance-sector-grapples-with-software-security-debt
https://hbr.org/2024/10/phishing-attacks-are-evolving-heres-how-to-resist-them
https://flashpoint.io/blog/russian-apt-groups-cyber-threats/
https://www.thisdaylive.com/index.php/2024/09/26/top-vulnerabilities-in-iot-devices-what-hackers-target-how-to-defend-against-them/
https://www.zscaler.com/press/zscaler-threatlabz-finds-400-increase-iot-and-ot-malware-attacks-year-over-year-underscoring
https://www.paymentsjournal.com/asia-overtakes-north-america-as-leading-crypto-development-hub/
https://www.statista.com/statistics/1393453/crypto-payments-global-market-size/
https://www.darkreading.com/cyberattacks-data-breaches/cryptocurrency-attacks-quadrupled-cybercriminals-cash-in
https://www.thomsonreuters.com/en-us/posts/government/identity-theft-drivers/
https://venturebeat.com/security/how-ai-driven-identity-attacks-are-defining-the-new-threatscape/
https://www.scworld.com/resource/why-identity-has-become-a-trojan-horse-and-what-to-do-about-it
https://www.techbusinessnews.com.au/blog/ai-driven-cyber attacks-the-alarming-surge/
https://www.londondaily.news/unlocking-the-potential-of-5g-technology-opportunities-and-challenges-ahead/
https://www.techradar.com/pro/the-rise-of-identity-related-cyberattacks-costs-challenges-and-the-role-of-ai
https://www.techmagic.co/blog/ai-in-cybersecurity
https://www.micromindercs.com/blog/ai-threat-intelligence-empowering-cybersecurity
https://securityintelligence.com/articles/3-proven-use-cases-for-ai-preventative-cybersecurity/
https://www.intelligentcio.com/eu/2024/04/22/the-role-of-cybersecurity-in-securing-critical-infrastructure/
CERT-In
CERT-In is the national agency for responding to computer security incidents as and
when they occur. In the Information Technology Amendment Act 2008,CERT-In has
been designated to serve as the national agency to perform the following functions
in the area of cyber security:
CSIRT-Fin
Computer Security Incident Response Team in Finance sector (CSIRT-Fin) , is a
nodal sectoral CSIRT which provides Incident Prevention and Response services
as well as Security Quality Management Services to the entities of the Indian
financial sector. It manages cyber incidents and coordinate responses across
banking, securities market infrastructure, insurance, and pension funds entities.
It carries out the following roles related to the cyber security in financial sector: