Home Blog The Evolution of Cyber Threats: Past, Present and Future

The Evolution of Cyber Threats: Past, Present and Future

July 03, 2024
Professional IT Programer Working in Data Center on Desktop Computer with Three Displays.

The world has witnessed a cybersecurity evolution over the past few decades. Gone are the days when the biggest concern was computer viruses. Today, sophisticated cyber attacks involving phishing, malware, machine learning (ML)  and artificial intelligence (AI) put individuals, corporations and governments alike at constant risk.

This article explores the evolution of cybersecurity from the early days to the present and considers what the future may hold.

A History of Cyber Threats

1980s

The 1980s saw the first real malicious software (malware) threats. Following the formation of the internet in 1983 and its adoption by computer networks, hackers had a wide field to explore and exploit.1

The first cyberattack to gain significant media attention was the "Morris" worm of 1988.2 This worm, which initially started as a harmless experiment to gauge the size of the internet, infected more than 6,000 computers while causing damages ranging from $100,000 to millions of dollars. In the aftermath of this attack, cybersecurity professionals developed antivirus software and companies started investing in firewalls and password management programs.

1990s to Early 2000s

As the internet became more widespread in the 1990s and early 2000s, cyber threats grew in sophistication. Criminals developed malware that could steal personal and financial information. One notable attack during this period was the “ILOVEYOU” worm, which first appeared on May 4, 2000 and infected more than 50 million computers.3 The virus spread worldwide through an email with the subject line “ILOVEYOU.” The email prompted the reader to open an attachment to read the rest of the message. If a user opened the attachment, the virus would spread to every contact in that person’s address book. The virus caused massive destruction, forcing the Pentagon, Ford, AT&T and multiple U.S. Army bases offline.4 The total damages were about $15 billion worldwide.3

In 2003, following the cyber threats in this period, the U.S. Department of Homeland Security formed the National Cyber Security Division.1 This was the first official government body dedicated to cybersecurity.

Mid-2000s to 2010s

In the mid-2000s, there was an evolution from hit-and-run strikes to advanced persistent threats (APTs).5 Cybercriminals used careful strategic plans and extensive campaigns to invade networks, access confidential information and sustain long-term attacks.

A good example of an APT attack was “Operation Aurora” in 2010.6 These attackers gained access to sensitive data from Google and other private companies by taking advantage of their software systems’ vulnerabilities. The attacks were so severe that, in 2022, Google released a YouTube series detailing the events of Operation Aurora.7

The frequency of ransomware attacks rose in the 2010s. For these attacks, cybercriminals use malware to lock a victim’s files and then demand a ransom payment to unlock them. These attacks result in massive financial losses and disruptions for individuals and organizations. For example, the 2017 “WannaCry” ransomware attack spread to 200,000-plus computers in more than 150 countries, costing about $4 billion.8

2020

As the COVID-19 pandemic took hold and it seemed that the entire world went online, ransomware, phishing attacks and data breaches took a further toll on 2020.9 Between the start of February and the end of April alone, cyber attacks against the financial sector increased 238% worldwide.10

On April 23, 2020, the World Health Organization (WHO) reported a disturbing leak of email addresses and passwords. A group of elite hackers had apparently conducted a large phishing campaign, resulting in the theft of 450 active login credentials from WHO staff. The hackers went on to steal nearly 25,000 private email addresses from agencies such as the Center for Disease Control and Prevention (CDC), the National Institutes of Health (NIH) and the Bill and Melinda Gates Foundation.9

Clearly, even organizations with the size, renown and resources of government agencies are still vulnerable to cyber attacks. In 2020, Software AG was the second-largest software vendor in Germany and the seventh-largest in Europe. In October of that year, a ransomware attack resulted in the theft of roughly one terabyte of its data. Having stolen the company’s information, hackers then locked its IT infrastructure and threatened to publicize sensitive data, pending delivery of a $23 million ransom.9

Present-Day Cyber Threats

With cybercrime projected to cost businesses $15.63 trillion by 2029, cybersecurity professionals are on the lookout for several common types of cyber threats.11

Advanced Ransomware Attacks

While ransomware attacks aren’t new, they’ve grown in complexity in recent years. Today, there are even ransomware-as-a-service providers renting out their programs to other cybercriminals in exchange for a percentage of the profits.12 This business model has led to an increase in the number of ransomware attacks worldwide. According to Statista, 72.7% of organizations worldwide were affected by ransomware attacks in 2023, compared to 55.1% in 2018.13

Third-Party Exposure

As more companies engage with third parties such as contractors and vendors, cybercriminals are getting around sophisticated security systems by hacking the less guarded networks of these third parties. For instance, in 2021, hackers infiltrated the networks of Facebook, Instagram and LinkedIn by breaching a third-party contractor (employed by the three companies) named Socialarks. The cybercriminals leaked personal data from more than 214 million social media users during the attack.14

Compromise of Financial Data

The more we store our financial records online, the more important it becomes to protect them. Credit card numbers, bank account PINs, phone numbers, investment accounts and other personal identifiable information (PII) are regularly hacked and used for criminal gains, exacting high costs of time, money and effort as people who were targeted work to restore their financial credibility and their privacy.

State-Sponsored Attacks

Today, nations are using their own cyber skills to attack the critical infrastructure of other governments. Common systems under attack include power grids and transportation systems. Typically, nation-state-associated threat actors launch these attacks to steal intellectual property, military intelligence and other types of sensitive information managed by governmental organizations.

IoT Device Attacks

Internet of Things (IoT) devices, such as smart home assistants and Wi-Fi routers, often store sensitive information such as passwords and log-in details, making them attractive targets for cybercriminals. Hackers abuse the constant connectedness of these devices by installing malware, which they use to launch distributed denial-of-service (DDoS) attacks.15 These attacks compromise the devices by flooding them with traffic, after which the cybercriminals can gain access to the entire system.

Future Cyber Threats

In the coming years, the cyber-threat landscape will continue to evolve and become increasingly complex. Newer technologies such as AI and machine learning have a lot of benefits, but they also bring new trends to the cyber-attack landscape. Cybercriminals will continuously leverage AI to carry out their attacks and try to outpace existing security measures. Expected cyber-trends include:

  • 5G and edge computing risks: The continued rollout of 5G networks and adoption of edge computing devices will create further vulnerabilities that cybercriminals are likely to exploit16
  • Quantum computing threats: Quantum computing poses a danger to current encryption technologies and may even render them obsolete; we may see a growing need for new quantum-resistant encryption methods to overcome security challenges17
  • Biometric data security challenges: As the use of biometric data becomes more prevalent in security systems, bad actors may breach such databases; this can permanently compromise the data and pave the way to widespread identity theft18 

Expand Your Cyber-Threat Intelligence

The demand for expert cybersecurity professionals is at an all-time high. As new technologies emerge and threats become more sophisticated, the demand will continue to grow.

With an online Master of Science in Cybersecurity from Yeshiva University, you can stay on top of the latest cybersecurity trends and develop the knowledge and skills you need to prevent and mitigate emerging cyber threats. Led by a faculty of expert practitioners from top organizations, this highly rated, flexible online program instills practical expertise and offers the hands-on experience you need to perform in the real world—all while you balance your studies with your personal and professional commitments.

You can make a difference in keeping your community safer, but only if you take action. Contact an admissions outreach advisor today.

Sources
  1. Retrieved on April 15, 2024, from futureoftech.org/cybersecurity/2-history-of-cybersecurity/
  2. Retrieved on April 15, 2024, from fbi.gov/news/stories/morris-worm-30-years-since-first-major-attack-on-internet-110218
  3. Retrieved on April 15, 2024, from goldskysecurity.com/the-history-and-impact-of-the-iloveyou-virus/
  4. Retrieved on April 15, 2024, from edition.cnn.com/2020/05/01/tech/iloveyou-virus-computer-security-intl-hnk/index.html
  5. Retrieved on April 15, 2024, from techtarget.com/searchsecurity/definition/advanced-persistent-threat-APT
  6. Retrieved on April 15, 2024, from cfr.org/cyber-operations/operation-aurora
  7. Retrieved on April 15, 2024, from youtu.be/przDcQe6n5o?si=X6ByFHqcMBTfzXcU
  8. Retrieved on April 15, 2024, from symantec-enterprise-blogs.security.com/blogs/feature-stories/wannacry-lessons-learned-1-year-later
  9. Retrieved on April 15, 2024, from techopedia.com/top-5-cyber-threats-from-2020/2/34392
  10. Retrieved on April 15, 2024, from spglobal.com/marketintelligence/en/news-insights/latest-news-headlines/cyberattacks-rise-in-pandemic-s-perfect-storm-8212-reminding-banks-of-risks-ahead-59064396
  11. Retrieved on April 15, 2024, from statista.com/forecasts/1280009/cost-cybercrime-worldwide
  12. Retrieved on April 15, 2024, from ibm.com/topics/ransomware-as-a-service
  13. Retrieved on April 15, 2024, from statista.com/statistics/204457/businesses-ransomware-attack-rate/
  14. Retrieved on April 15, 2024, from cisomag.com/unprotected-server-exposes-scraped-data-of-214-mn-social-media-users/
  15. Retrieved on April 15, 2024, from thehackernews.com/2023/09/ddos-20-iot-sparks-new-ddos-alert.html
  16. Retrieved on April 15, 2024, from cisa.gov/news-events/alerts/2022/12/13/nsa-cisa-and-odni-release-guidance-potential-threats-5g-network
  17. Retrieved on April 15, 2024, from americanscientist.org/article/is-quantum-computing-a-cybersecurity-threat
  18. Retrieved on April 15, 2024, from ovic.vic.gov.au/privacy/resources-for-organisations/biometrics-and-privacy-issues-and-challenges