Cybersecurity Leaders—Buckle Up for a Rough Ride (Because It’s Going to Get Worse)
Published August 21, 2024
By: Mike Sanchez
2024 marks a surge in disruptive online activity and data breaches. Cybersecurity leaders must stay ahead of threat intelligence and prioritize security to navigate this rough ride.
Cybersecurity Leaders Rough Ride

2024 may go down as one of the most active years we’ve seen in recent history in terms of the amount of disruptive online activity and data breach attacks. We are not even halfway through the year and have already seen a laundry list of massive data breaches across numerous industries.  

  • In January, we started off the new year with one of the largest data breaches ever seen, dubbed by some the “Mother of All Breaches” (or MOAB). This breach involved a staggering 12 terabytes (TB) of data consisting of 26 billion user data records stolen from LinkedIn, X (formerly Twitter), Weibo, Tencent, and other online platforms. 
  • February didn’t turn out much better. In that month, UnitedHealth Group experienced a serious outage and data breach after they were hit by the notorious “Blackcat” ransomware gang (also known as “ALPHV” or “Noberus”).  
  • Fast forward to late April, when US health insurance giant Kaiser Permanente had to notify millions of current and former members that they had suffered a data breach after finding that “certain online technologies, previously installed on its websites and mobile applications, transmitted personal information to third-party vendors.” This information included member names and IP addresses, as well as information about whether members were signed into a Kaiser Permanente account or service and how they “interacted with and navigated through the website and mobile applications, and search terms used in the health encyclopedia.” 
  • In mid-May, we’ve seen yet another serious healthcare-focused cyberattack involving the Ascension health system. Operating 140 hospitals in 19 states, the US health system giant was forced to divert ambulances, postpone patients’ medical tests, and even had to block online access to patient records in response. As a result, their operations were seriously affected, as was the health and well-being of many Ascension patients. 

As already stated, 2024 so far has seen organizations around the world hit with serious data breaches and cyberattacks. Unfortunately, it looks like we only have more of this to look forward to in the remainder of the year—but what are the exact threats you should expect to see, and more importantly, what can be done about them?  

UDT’s elite cybersecurity team has been actively monitoring the situation. We have gathered our insights here so you know what to look out for and how to protect yourself and your organization in the coming months. Let’s dig in. 

 

The Current Threat Landscape: Top Attack Vectors Right Now 

Here at UDT, members of our UDTSecure™ Cybersecurity and Threat Intelligence (CTI) Team have observed a significant uptick in attack vectors focused on disrupting services, compromising data, extracting data for extortion purposes, and ultimately causing chaos during the upcoming election season.  

We want to make sure the public at large knows to be especially vigilant for the following threats, each of which has been personally flagged by our CTI Team: 

  • Exploitation of firewall vulnerabilities; 
  • Exploitation of VPN infrastructures, often using previously stolen credentials; 
  • Increases in phishing and vishing (voice phishing, now often using AI to replicate voices) to gain credentials, steal funds, and/or deliver malicious payloads; 
  • DDoS attacks meant to disrupt services and to make the victim restart their systems so a pre-delivered malicious payload script can be launched. 

 

Who’s On The Hit List? Education & Public Entities 

My team has already observed hackers and cybercriminals employing the above attack vectors across multiple industries; however, many of these bad actors appear to be focusing their attacks on two of the most vulnerable target sectors—education and public entities (city, municipality, and state agencies).  

In the education sector specifically, hackers are attacking individual schools because there is a lot of interconnectivity between a school infrastructure into a city network, for instance, and they are often unprotected or, at best, poorly protected from common attack vectors. The same unfortunately tends to go for public entities: there is usually little to no network segmentation within public networks, which allows a bad actor who gains unauthorized access to Network A to then be enabled to traverse across other interconnected networks. 

Another compounding factor in this current surge of cyberattacks is that 2024 is an election year. Our threat intelligence—combined with attacks we’ve personally observed—has identified that the primary groups of cybercriminals tend to be made up of well-organized “Hacktivists” and state-sponsored cybercriminals from China, Eastern Europe, Russia, and North Korea. The latter group is known to be rewarded for carrying out attacks that disrupt or influence the US government, its infrastructure, and its democratic processes. 

 

How to Protect Your Organization From Attack 

To keep individuals, businesses, schools, and governmental organizations safe during this period of higher-than-normal cyber risks, UDT’s CTI Team recommends taking the following actions, which may seem obvious but are often overlooked: 

  1. Web Application Penetration Testing (or “pen testing”) Due to the increased frequency of API exploitation we are seeing, we highly recommend performing pen testing of all web applications—especially those accessible through the internet—to spot vulnerabilities before bad actors have a chance to take advantage of them. 
  2. GEO Configuration Settings – Review the “GEO” blocking configuration settings for your firewalls and email platforms. Identify which countries these platforms are allowing telemetry data to come in or transmit to. We often see these settings go unreviewed periodically. 
  3. Increased Security Training & Education No amount of technology can offer complete protection of an organization’s data if its people are not properly trained. This means more than just the old method of having them “watch a video and take a quiz.” Every organization should be conducting real-world training by employing proven methods, such as sending out test phishing emails once a quarter instead of annually to see which employees click links, download attachments, or enter credentials, as they will require more training. Better to have them get caught up by a fake phishing email than a real one. 

 

Things Are Bad (and Will Get Worse)… But We Can Survive This 

No doubt, 2024 is going to be a very rough year for cybersecurity; however, there have been surges in cyberattacks in years past and we have survived them, some better than others. While the game has changed a bit with the rise of artificial intelligence (AI) and the increased presence of state-sponsored hackers, understanding which threats can impact your organization and fortifying the resiliency of mission-critical systems will make it harder for any organization to fall victim to a cyberattack during the next 8-12 months. If you can stay ahead of threat intelligence and prioritize your security posture, then you will be well on your way to avoiding headlines as the next big cybersecurity story of 2024. Stay safe out there!

MIke Sanchez

Take The Quiz—What’s Your Security Risk Level?

New to cybersecurity or trying to improve your security posture? Take our brief quiz to understand how your organization might score when it comes to risk—and what to do about it. 

Accomplish More With UDT

Get your custom solution in cybersecurity, Lifecycle Services, digital transformation and managed IT services. Connect with our team today.

Related Posts 

Managed IT Services Myths
September 24, 2025
5 Myths About Managed IT Services (And How They’re Holding Your Business Back)
Think Managed IT Services are too costly or only for big companies? Bust the top 5 myths and learn how …

Vista previa del contenido

BY:

cloud for government
September 10, 2025
Federated Cloud in Government: A Scalable, Compliant Approach for State & Local IT
Federated cloud for government offers secure, compliant, and scalable IT solutions. Learn how agencies modernize, cut costs, and improve resilience. …

Vista previa del contenido

BY:

03.12.2025_Blog-Image-Protecting-Public-Services-The-Importance-of-RMM-for-Government-IT
March 12, 2025
Protecting Public Services: The Importance of RMM for Government IT
Managed IT services for government use RMM to detect issues, prevent downtime, and enhance security. Learn how RMM keeps public …

Vista previa del contenido

BY:

02.19.2025_Blog-Image-Protecting-Public-Systems-Why-PMaaS-is-Essential-for-Government-IT
February 19, 2025
Protecting Public Systems: Why PMaaS is Essential for Government IT
Government IT security is crucial. Learn how PMaaS protects public systems from cyberattacks and ensures compliance with security regulations. …

Vista previa del contenido

BY:

11.13.2024_Blog-Image-How-AI-is-Shaping-the-Future-of-State-Local-Government
November 13, 2024
How AI Is Shaping the Future of State & Local Government
Discover how AI in government is revolutionizing state and local operations, from enhancing communication to streamlining processes and improving public …

Vista previa del contenido

BY:

Cybersecurity Leaders Rough Ride
August 21, 2024
Cybersecurity Leaders—Buckle Up for a Rough Ride (Because It’s Going to Get Worse)
2024 marks a surge in disruptive online activity and data breaches. Cybersecurity leaders must stay ahead of threat intelligence and …

Vista previa del contenido

BY:

Join our newsletter for the latest
UDT Insights delivered straight to your inbox.

Experiencing a security breach?

Get immediate assistance from our security operations center! Take the following recommended actions NOW while we get on the case:

RECOMMENDED IMMEDIATE NEXT ACTIONS

  1. Determine which systems were impacted and immediately isolate them. Take the network offline at the switch level or physically unplug the systems from the wired or wireless network.
  2. Immediately take backups offline to preserve them. Scan backups with anti-virus and malware tools to ensure they’re not infected
  3. Initiate an immediate password reset on affected user accounts with new passwords that are no less than 14 characters in length. Do this for Senior Management accounts as well.

UDT is committed to your success. We’ll connect you with the right IT solutions for your unique needs and challenges. 



* Indicates a required field

Just one more step

Please fill out the following form,