2022 Cyber Predictions: Large-scale Attack Delivered Through Open-source Software Is Coming

This is part of our 2022 cybersecurity predictions series.


Cybercriminal groups old and new inundated the security landscape with one major attack after another in 2021. To give some realistic expectations of what’s to come for the industry in 2022, we heard from executives at SIEM solutions and Security Operations Center service provider LogRhythm.


James Carder, Chief Security Officer & Vice President of Labs

A leading country producing semiconductor chips will have its supply-chain compromised, resulting in major shortages of critical materials


As we have seen with the pandemic, cybercriminals will take advantage of periods of societal disruption to manipulate companies and governments for financial gain. The global chip shortage, which shows no sign of slowing down as some experts estimate it could last through the end of 2022, is another period of disruption that hackers will soon exploit. As countries seek to ramp up production, one country will be caught attempting to corner the market by using fraudulent methods to gain access to the production and supply of the leading chip-producing countries. This will result in shortages of critical supplies, as well as soaring prices for basic goods.


The supply chain of a major vaccine manufacturer will be halted by ransomware


In 2021, ransomware attacks crippled Colonial Pipeline and JBS. In 2022, cybercriminals will set their sights on carrying out a ransomware attack against one of the pharmaceutical companies producing the COVID-19 vaccine. This will interrupt the production of critical booster shots and keep many other lifesaving drugs from reaching patients. The resulting fallout will fan the flame for foreign and domestic vaccine disinformation campaigns.


Cybercriminals will leverage API vulnerabilities to breach multiple company networks at once

Cyberattackers commonly use lateral movement techniques to move through an organization’s network after carrying out the initial breach. We have already seen the Russia-linked REvil ransomware-as-a-service group leverage Kaseya’s network management and remote-control software to move not only within Kaseya’s network but extend its reach to its customers. In 2022, we will see hackers seek to up-level the lateral movement concept for internal networks and apply it to an entire partner network using misconfigured APIs, which serve as a doorway from the internet into a company’s environment.

Hackers will blackmail Olympic athletes during the Beijing Olympics


Hackers will breach various athletes’ accounts and find incriminating email exchanges regarding the use of performance-enhancing drugs and insight into the individual’s personal life. This will result in athletes being blackmailed into helping hackers carry out cyberattacks on their home countries or face the release of incriminating evidence.


Matt Sanders, Director of Security


There will be a successful large-scale attack delivered through open-source software.


Malicious actors have repeatedly demonstrated their technological aptitude at infiltrating and compromising organizations. Those same skills will be increasingly applied to the open-source software ecosystem (which welcomes all contributors), where attackers can intentionally introduce vulnerable code to widely used open-source software components. This would allow cybercriminals to exploit vulnerabilities on a massive scale, targeting companies that have built products using open-source technology without reviewing the code before copying and pasting it into their platforms. Such attacks can be extremely difficult to detect. It is likely that several instances of such attacks are already present in widely used open-source software today, which may be found in the year to come.

###