KELA's Cybercrime Report 2024: Rising Threats and Future Predictions

KELA's State of Cybercrime 2024: A Comprehensive Overview



The global cyber landscape has undergone significant changes in recent years, and KELA, a leading entity in cyber intelligence, has just released its annual State of Cybercrime 2024 report. This document not only summarizes the major cyber threats observed over the past year but also provides expert predictions for what businesses and organizations can expect in 2025.

The Proliferation of Cybercrime



One of the standout findings of this year's report is the alarming rise in the sophistication of cybercriminal techniques. Attackers are increasingly forming collaborations, utilizing artificial intelligence, and implementing new monetization strategies, which are challenging traditional security frameworks. David Carmiel, CEO of KELA, noted, “The surge in infostealers and ransomware, along with the increasing use of AI-driven threats, highlights the urgent need for organizations to rethink their security postures.”

Infostealers and Ransomware: A Growing Concern



Infostealer malware continues to threaten organizations, serving as a primary avenue for initial access. In 2024, KELA tracked over 4.3 million infected systems globally, leading to a staggering 330 million compromised credentials. Cybercriminals exploit these stolen credentials to launch intricate ransomware campaigns and execute large-scale data breaches. The report indicates that more than 5,230 victims faced these ransomware attacks throughout the year. Notably, the group known as RansomHub has now overtaken LockBit in terms of notorious activity levels, showcasing the dynamic nature of cyber threats.

While encryption remains a tactic, cybercriminals are increasingly leaning towards data extortion methods that complicate recovery for their victims.

The Intersection of Cybercrime and Geopolitics



Another significant trend highlighted in KELA's report is the merging boundaries between state-sponsored actors, hacktivists, and traditional cybercriminal factions. With over 200 new hacktivist groups emerging, more than 3,500 distributed denial-of-service (DDoS) attacks were launched, often catalyzed by geopolitical upheavals. These intersections render it challenging for businesses to track and counteract threats effectively, resulting in blurred lines of responsibility and accountability.

Furthermore, AI-related cyber threats have intensified in 2024. Cybercriminals are employing techniques to compromise large language models (LLMs), hijacking credentials for AI services, and manipulating deepfake technologies to orchestrate fraud and social influence campaigns.

Moving Towards Strategic Security Approaches



Carmiel emphasizes the necessity for organizations to transition from a reactionary approach to a proactive, intelligence-driven strategy. “Cybercriminals are becoming more strategic, enhancing automation and targeting supply chains while exploiting new vulnerabilities at a fast rate,” he stated. To combat these evolving threats and bolster defenses, organizations are advised to adopt a more anticipatory strategy backed by KELA's intelligence capabilities that provide actionable insights.

With the State of Cybercrime 2024 report now accessible for download, businesses and security teams can equip themselves with essential information on emerging threats, defensive tactics, and expert forecasts for the cybersecurity framework in the forthcoming year. KELA aims to assist organizations in staying ahead of adversaries by facilitating an advanced understanding of cyber dynamics.

For more details and to access the report, visit KELA Cyber.

  • ---

About KELA


KELA specializes in Intelligence-Driven Threat Exposure Management, offering cutting-edge solutions that empower organizations to identify, track, and mitigate external threats. Through its proprietary Cyber Threat Intelligence Platform, KELA delivers real-time insights into cybercriminal behavior across the Deep and Dark Web, allowing companies to reduce risks proactively at any scale.

For media inquiries or interview requests, please contact:
Ben Kapon
Email: [email protected]

Topics Business Technology)

【About Using Articles】

You can freely use the title and article content by linking to the page where the article is posted.
※ Images cannot be used.

【About Links】

Links are free to use.