Who Are the CyberSecurity “Bad Guys” of 2022?

by | Best-Practice, Security

Here is what you need to know… 

Most people don’t know that cybersecurity “bad guys” even exist. But, like being in a prairie town in the old west, you may be taken by surprise if you don’t know the local outlaws and bandits that you should be on the lookout for. 

Let us introduce some of the CyberSecurity Bad Guys of 2022. 

The names of cybersecurity bad guys may not be familiar to you. While you may know the names of human bad guy legends like Bonnie & Clyde, John Dillinger, and Al Capone, or fictitious ones like Voldemort or Darth Vader, have you heard of these: ILoveYou/Love Bug, Code Red, MEliSSA, Stuxnet, MyDoom, CryptoLocker, Storm Worm or Wanna Cry? Collectively, the damage from this group, the deadliest computer viruses of all time, was in excess of $300 BILLION dollars. 

Most of the viruses and malware we named above have lost much of their threat- modern antivirus is aware of those brands of nasty software and is decent at scanning for signs of them on your computer. But much like the internet as a whole, the threats are constantly changing, both in name and in scale. 

So should you have worries about any of these bad guys, particularly on ways to keep them from affecting you in the first place, call us:  Cyber Ascend Technologies, serving Scotts Valley, Santa Cruz, Capitola, Soquel, Aptos, Watsonville, and all over the Monterey Bay. We’re happy to give you advice and tools you can use to protect yourself from some of these internet bandits out to steal your data. 

Here are the top six cybersecurity “bad guys” of 2022: 

  1. Clop Ransomware
    Ransomware is malware that locks down all your files and your system. It requires you to pay a fee to the hackers to release you. Clop is the latest 2022 ransomware and targets Windows users. It disables several Windows 10 security applications so it can easily go after your data. 
  2. Zeus Gameover
    This is trojan malware. It is disguised as something legitimate and goes after bank account information to steal all your funds. When it does, the information is untraceable and unretrievable. 
  3. COVID-19 News Malware Attacks
    This has been centralized mostly in Japan, but like COVID, is spreading worldwide. Hackers send out emails that seem to be legitimate news about the pandemic. You are asked to click a link to learn more. What you learn is to never click on unverified links. It steals your personal information. 
  4. Fleeceware
    These are fake apps that Android users have downloaded (over 600 million to be exact). The apps continue to charge the user money, even after being deleted.5.
  5.  Internet of Things (IoT) Device Attacks
    Part of the miracle of technology is also its downfall. Many common items in our lives are becoming “smart.” They are linkable to our computers and our internet. These can be speakers, video cams, mics, and more. The problem is that these devices are not built to be loaded with proper security and have given hackers an entrance onto your network. 
  6. You
    Say what? Yes. Humans are the weakest link in the cybersecurity landscape. Most of the threats you and your team are under are done through downloading something bad, opening a malware file, clicking the wrong link and entering your personal information or passwords, or scanning a malware QR code. The cybercriminals are psyching you out into opening the things they want you to. Their deception is the easiest way for them to get access to and gain your personal information.

 Cybersecurity, Who Are the CyberSecurity “Bad Guys” of 2022?


We have some experience protecting people like you from the bad guys.  Here are the three pillars of your protection: 

  • First, we recommend having an expert analyze your environment and devise a disaster recovery plan. Implementing cloud services is often a key component of these strategies. Cloud backups, applications, and file systems are some of the best protection in case you get encrypted or breached. Having mirrored backups of your workstation and applications, your email system, and files can be a lifesaver in case an accident happens. 
  • Second, it is crucial you give your team instruction on what links, files, or emails they should not open, scan or click. Should ransomware or malware cripple your network, the whole system can become completely inaccessible. Teaching your employees and coworkers what to avoid can save you a crisis in the future. 
  • Third, place any smart home or IoT devices on a separate network so that their weaknesses do not pose a threat to your main data. This is important both at home and at the office.  

Preparation is your most valuable weapon. Don’t wait until you encounter a “bad guy” to create your recovery plan. Call us now at Cyber Ascend Technologies, and we will make sure the only technology bad guys you need fear are in your favorite sci-fi movies. 

Disclaimer: By providing links to other sites, cyastech.com does not guarantee, approve, or endorse the information or products available on these sites.
Share This