Skip to content

Cyber Insurance News

The Leading Source for Cybersecurity Insurance News, Insights and Data

OpenText Report Reveals Cybercrime’s Shift: Nation-States Join Forces with Criminal Gangs

Posted on September 27, 2024September 27, 2024 By Martin Hinton

Nations have long been accused of preparing to fight the last war instead of the next, a lesson military strategists like General Douglas MacArthur famously warned about. But in the past and today’s hyper-connected world, the less glamorous yet essential logistical elements—such as the ability to safeguard supply chains—often determine success. The COVID-19 pandemic brought this reality into sharp focus, exposing the vulnerabilities of global supply chains. As it turns out, the smooth and secure flow of goods, services, and information is just as vital in a military campaign as in times of peace. In this increasingly digital age, logistics aren’t just about moving troops or materials—they are now about defending the invisible but critical infrastructure that keeps societies functioning. And, as OpenText’s 2024 Threat Hunter Perspective reveals, nation-states and cybercrime rings have begun targeting these systems, posing threats to global supply chains and geopolitical stability.

OpenText’s 2024 Threat Hunter Perspective highlights alarming trends in the cyber threat landscape based on insights from cybersecurity experts monitoring millions of endpoints. A central finding is the growing collaboration between nation-states and organized cybercrime rings, which now coordinate attacks to maximize impact, especially on critical supply chains and geopolitical targets. With the global cost of cybercrime expected to reach $9.5 trillion in 2024 and escalate to $10.5 trillion by 2025, enterprises and CISOs must brace for a wave of increasingly sophisticated threats.

Our takeaways are as follows; you can get the whole report here.

A New Era of Cyber Threats

One of the signature shifts in the modern threat landscape is the tight coordination between nation-states and cybercriminal organizations. These partnerships allow simultaneous attacks on the same targets, compounding the damage. Russia and China are leading this charge. Russia, for example, often collaborates with groups like Killnet, Lokibot, and Amadey to enhance the effectiveness of its cyber operations, while China leverages groups such as Storm0558 and Red Relay to further its geopolitical aims, particularly in regions like the South China Sea.

“Nation-states are not slowing down, and with key global events like the U.S. presidential election approaching, organizations need to be on high alert,” said Muhi Majzoub, OpenText’s Executive Vice President and Chief Product Officer. “Our intelligence shows that adversaries are utilizing more sophisticated evasion techniques, and cyber defenses need to evolve just as quickly.”

For CISOs, the question has shifted from if an attack will occur to when and how. Understanding who is behind these attacks and their motives are essential to developing a robust defense. Enterprises must prepare for a wide range of threats, from ransomware and data breaches to sophisticated nation-state campaigns targeting supply chains.

Supply Chains: The New Cyber Battleground

The report highlights how global supply chains are becoming a prime target for nation-state attackers. These attacks are designed not just to disrupt individual companies but entire systems. By attacking transportation networks, shipping ports, or even national rail systems, attackers can disrupt military aid deliveries or economic flows, causing significant downstream effects. One notable case cited in the report involves Russian cyberattacks aimed at disrupting Western supply routes supporting Ukraine, using a mix of ransomware and DDoS attacks to target logistics providers and infrastructure.

This convergence of physical and cyber warfare tactics echoes the lessons of military history, where logistics often prove decisive. Just as getting supplies to the frontlines was crucial in traditional military campaigns, securing digital supply chains is essential in the modern age. Yet, as the report underscores, this critical part of global security often goes underprotected.

Timing is Everything

Cyber attackers are increasingly adept at choosing the most vulnerable moments to strike. Adversaries frequently time their attacks around significant events, such as national elections, major holidays, or business milestones. According to the report, Russian attackers tend to follow a Monday-to-Friday schedule, with increased activity within 48 hours of any geopolitical announcement or shift. Meanwhile, China’s cyber operations are less predictable but often concentrate data exfiltration activities around weekends or major global events, further reducing the chance of detection.

For example, after Finland’s 2023 ratification of its NATO membership, a surge of Russian cyberattacks targeted the nation’s critical infrastructure, timed around national election dates and military exercises. These cyber campaigns aimed not only to disrupt daily life but to intimidate and undermine Finland’s role in the geopolitical arena.

The Top Threats of 2024

OpenText’s report identifies the top 15 cyber threats for 2024, with tools such as Killnet (used in DDoS attacks) and Cobalt Strike (a penetration testing tool frequently hijacked by malicious actors) ranking high on the list. Threats from malware-as-a-service gangs, including Lokibot and Amadey, are also rising. These actors leverage sophisticated technologies to conduct cyber espionage, disrupt operations, and steal sensitive data.

Another disturbing trend is the rise of disinformation and misinformation campaigns, often executed using advanced artificial intelligence (AI) technologies. The report highlights how AI-driven deepfake videos and misinformation campaigns can strain public trust and disrupt government services. In one instance, a state-sponsored disinformation campaign overwhelmed a government portal, manually uploading false data to interfere with public services, while cybercriminals used AI to conceal data exfiltration activities.

Predictions for Fall 2024 – U.S Presidential Election

The report predicts that the 2024 U.S. presidential election will be a hotbed for cyber activity. Nation-states are expected to leverage the polarized political climate to launch misinformation campaigns, obstruct access to information, and undermine confidence in the electoral process. The cyber arms race is also expected to escalate, with nation-states hoarding zero-day vulnerabilities to unleash during periods of conflict or political unrest.

The report also warns of rising cyber threats from non-state actors, such as terrorist organizations, who are increasingly adopting sophisticated cyber tactics to attack critical infrastructure, including healthcare, energy, and transportation systems.

Defending Against Tomorrow’s Threats

In response to these growing threats, OpenText provides several key recommendations for CISOs and enterprises. One crucial lesson is the importance of getting back to basics: ensuring endpoint protection, deploying multi-factor authentication (MFA), and maintaining regular patch management. Additionally, organizations are encouraged to invest in advanced technologies, such as signal analysis and AI-driven threat detection, to stay ahead of sophisticated attackers.

“Organizations need to make the job of adversaries as difficult as possible,” said Grayson Milbourne, OpenText’s Security Intelligence Director. “Many breaches occur because of failures to follow simple security practices, like not using MFA or neglecting patch management.”

Collaboration across the cybersecurity community is also critical. By sharing intelligence and best practices, organizations and governments can mount a stronger defense against the growing threat of nation-state and cybercrime ring collaborations.

Other News: SecurityScorecard Report Highlights Escalating Supply Chain Cyber Risks for Global 2000(Opens in a new browser tab)

Cybersecurity, Cybersecurity Report Tags:cyber insurance, Cybercrime, global supply chain, nation state cyber crime, nation-state cybercrime, OpenText, OpenText’s 2024 Threat Hunter Perspective, supply chain cyber crime, Supply Chain Cyber Risk, supply chain hack

Post navigation

Previous Post: The Grand Jury Says: Get Cyber Insurance
Next Post: EXL Reports its New Insurance AI LLM is 30% Cheaper and More Accurate than Generic AIs — and Compliant

Related Posts

  • Beware of Cyber Scrooges: Festive Fortifications Against Holiday Cybersecurity Scams and Theft Cybersecurity
  • 2025 Cybersecurity Trends – AI Risks and Soaring Attack Costs Cyber Insurance Reports
  • Netwrix Reports Sharp Increase in Cyberattacks and Consequent Business Losses Cybersecurity
  • CyberCube Enters Dutch Market with Partnership for Enhanced Cyber Risk Services Cybersecurity
  • 183 Million Records Exposed: Key Insights from the 2025 Healthcare Cybersecurity Report Cyber Insurance for Healthcare
  • 97% Used to Be a Good Grade—But Not for Retailers Facing Data Breaches Cybersecurity

Get the Cyber Insurance Newsletter

Receive weekly updates on the top news on cyber insurance.

Cyber Insurance News

Cyber Insurance News
In this clip from our latest podcast, Martin Hinton and William Altman dive into the long-term consequences of data breaches — especially those affecting K–12 students. Highlighting the PowerSchool breach, which exposed 60 million student records, they explore how leaked personal data like mental health history may resurface decades later, leaving individuals vulnerable to fraud, identity abuse, and digital exploitation.

Altman warns that while credit monitoring may address financial risk, it fails to protect against deeper psychological and reputational harm. This conversation is a must-hear for educators, parents, and policymakers thinking beyond immediate breach responses.

🔗 Learn more at www.cybcube.com/
#Cybersecurity #StudentPrivacy #DataBreach #PowerSchool #CyberRisk #IdentityTheft #DigitalSafety #CyberInsurance
Education Cybersecurity Exposed: Long-Term Impact of K–12 Cybersecurity Breaches
The threat of cybersecurity breaches in 2025 and the long-term damage of a cyberattack. In this episode of the Cyber Insurance News Podcast, Executive Editor Martin Hinton interviews William Altman, Head of Cyber Threat Intelligence at CyberCube. They explore the evolving world of cybersecurity and cyber insurance. The episode dives into why small businesses are highly vulnerable, how AI is both a weapon and a shield in cyber defense and the critical gaps in threat intelligence. They also discuss basic measures even the smallest business can take to protect themselves from a cybersecurity breach. 

A spotlight is cast on the education sector, where underfunded cybersecurity programs have made schools a prime target for threat actors. These cybersecurity breaches can have a lasting impact. One alarming breach compromised 60 million K-12 student records, revealing sensitive data like mental health histories, data that can't be “reset” like a credit card. This breach raises urgent concerns about the long-term impacts of cybercrime on students' privacy, identity, and future safety, far beyond the limits of traditional credit monitoring.

They also explore the security posture of the financial sector, the power of identity and privileged access management, and the real-world impact of software vulnerabilities.

🔐 KEY TOPICS:

Cybersecurity strategies for small businesses

The widening cyber insurance protection gap

How AI is used in phishing and threat reconnaissance

Managing software vulnerabilities and patch cycles

Cybersecurity in education and financial sectors

Global threat intelligence trends

📌 Takeaways:

MFA significantly reduces attack success rates.

Small businesses and schools are increasingly at risk.

Sensitive student data breaches have lifelong consequences.

AI is making phishing more personalized and efficient.

MSPs can be critical vulnerabilities in your cyber chain.

💡 Essential Cybersecurity Resources for SMBs:

🔗 NIST Cybersecurity Framework

🔗 CIS Critical Security Controls

👉 Subscribe for more expert interviews and visit @cybercube4461 for more insights. 

#cybersecuritybreaches2025 #cybersecuritybreaches #cyberinsurance #AIinCybersecurity #studentdatabreach #smallbusinesssecurity #educationcybersecurity #dataprotection #CyberCube #MFA #cyberrisk

Chapters
00:00 Introduction to Cyber Threat Intelligence
02:58 Understanding the Cyber Insurance Landscape
05:55  The Vulnerability of Small Businesses
08:54 Practical Cybersecurity Measures for Small Businesses
12:04 The Role of Education in Cybersecurity
18:07  The Long-Term Impact of Data Breaches
27:01 Cybersecurity in the Financial Sector
29:01 The Risks of Common Technologies in Finance
31:15 AI: The Double-Edged Sword in Cybersecurity
35:40 The Evolving Threat Landscape with AI
39:11 Global Cybersecurity: Regulations Matter
42:15 Cybersecurity Essentials for Small Businesses
Cybersecurity Breaches 2025: Small Business, AI & Education Breaches.
In the wake of the Harrods hack and cyberattacks impacting other retailers, the alarming state of UK cybersecurity will be revealed in 2024. From cyberattacks hitting major UK retailers like Co-op and Harrods to small businesses struggling without protection, the message is clear—cybercrime is a national threat.

New research by Pen Underwriting reveals that while 90% of UK and Irish businesses feel secure, only 47% have dedicated cyber insurance. Even more shocking—only 18% of businesses earning under £1 million are covered. The cost isn’t just financial—real people suffer, like the couple who lost their wedding cake due to a ransomware attack.

Watch now to understand:

Why UK businesses are dangerously unprepared

How cyberattacks are more common than fires or theft

The key role of employee training, data backups, and multi-factor authentication (MFA)

Why cyber insurance is no longer optional

Visit www.cyberinsurancenews.org for the latest cyber insurance and cybersecurity updates.

#UKCybersecurity #CyberInsurance #SmallBusinessSecurity #CyberCrime
Harrods hack UK Cybersecurity Crisis: Shocking Stats, Real Victims & Business Risks. #cybersecurity
Load More... Subscribe

Categories

  • 8-K
  • AI & Cyber Insurance
  • AI & Cybersecurity
  • Critical Infrastructure cyber insurance and security
  • Cyber Cat Bonds/Cyber Catastrophe Bonds
  • Cyber Insurance
  • Cyber Insurance APAC
  • Cyber Insurance Best Practices
  • Cyber Insurance Captive
  • Cyber Insurance Carriers & Brokers
  • Cyber Insurance Claims
  • Cyber Insurance EU
  • Cyber Insurance Financial Institutions
  • Cyber Insurance for Government
  • Cyber Insurance for Healthcare
  • Cyber Insurance for Schools
  • Cyber Insurance for SMEs/SMBs
  • Cyber Insurance For Startups
  • Cyber Insurance for Utilities
  • Cyber Insurance Geographic Markets
  • Cyber Insurance Industry Groups
  • Cyber Insurance Investments and M&A
  • Cyber Insurance Jobs
  • Cyber Insurance Laws & Regulations
  • Cyber Insurance Litigation
  • Cyber Insurance Market Size
  • Cyber Insurance MENA
  • Cyber Insurance News & Information Podcst
  • Cyber Insurance People
  • Cyber Insurance Policies & Strategies
  • Cyber Insurance Premiums
  • Cyber Insurance Reports
  • Cyber Insurance Settlements
  • Cyber Insurance Sunday – Upload
  • Cyber Insurance Systemic Risks
  • Cyber Insurance Tech
  • Cyber Insurance Threats
  • Cyber Insurance UK
  • Cyber Insurance Underwriting
  • Cyber Insurance Wholesaler
  • Cyber Regulations
  • Cyber War Exclusions
  • Cybersecurity
  • Cybersecurity and Credit Ratings
  • Cybersecurity for SMBs
  • Cybersecurity in Education
  • Cybersecurity Investment
  • cybersecurity jobs
  • cybersecurity M&A
  • Cybersecurity people
  • Cybersecurity Report
  • Cybersecurity Training
  • Department of Homeland Security
  • EU Cybersecurity
  • Insurance Linked Securities/ILS
  • Insurance Loss Warranty contract/ILW
  • Managed Service Providers
  • National Association of Insurance Commissioners' (NAIC) model cybersecurity law
  • Non-criminal Claims/Non-Malicious Claims
  • Opinion/Commentary
  • Personal Cyber Insurance
  • Personal CyberSecurity
  • Ransomware Insurance
  • Reinsurance
  • Risk Modeling
  • SEC Cyber Disclosure Rule
  • Small Business
  • Supply Chain Cybersecurity And Insurance

Send Ideas, Requests & Comments




    Tags

    AI Artificial Intelligence At-Bay Beazley CFC Chubb Cloud Security Coalition Corvus Cowbell Cowbell Cyber crowdstrike cyber attack Cybercrime cyber crime CyberCube cyber insurace cyberinsurance cyber insurance cyber insurance for small businesses Cyber Insurance Market Cyber liability Insruance cyber liability insurance cyberliabilityinsurance Cyber Resilience Cyber Risk Cyber Risk Management cyber security Cybersecurity cybersecurity insurance Cyber threats Data Breach Howden Lloyds Marsh Microsoft personal cyber insurance phishing Ransomware Ransomware Insurance reinsurance Resilience Risk Management SecurityScorecard small business
    • Cyber Insurance Books
    • Cyber Insurance Reports & Documents
    • Cyber Insurance Acronyms/Terms
    • Cyber Insurance Companies: Carriers, Brokers & Vendors
    • Industry Response: Potential Federal Insurance Response to Catastrophic Cyber Incidents
    • Ransomware Insurance
    • How Much Is Cyber Insurance?
    • Considerations for Buying Cyber Insurance
    • Cyber Liability Insurance Near Me
    • Cyber Insurance Quote
    • Newsletter
    • Legal Analysis & Full Text of 2023 SEC Rule: Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure
    • Glossary
    • About Cyber Insurance News
    • Privacy Policy

    • AXIS Capital Bolsters Cyber Insurance Leadership with Appointment of Simon Dejung as Chief Underwriting Officer Cyber Insurance
    • Cyber Insurance Premium Increases Significantly Outpace Other Categories, Q2 Data Indicates  Cyber Insurance Premiums
    • C-suite Cybersecurity Gap Leaves Businesses Exposed Cyber Insurance
    • Corvus Names New President As Sector Demands Increasingly Deep Combos of Insurance/Tech Skills Cyber Insurance People
    • New Biden Cybersecurity Plan Will Push Regulations, Address 3rd Party Liability: WaPo  Cyber Insurance
    • CrowdStrike Outage Spurs Cyber Insurance Market Response: A Reporting Roundup Cyber Insurance
    • Arch Insurance Bolsters Cyber Team Cyber Insurance
    • Local Governments Struggle with Hikes in Cyber Insurance Premiums  Cyber Insurance Best Practices

    Related Cybersecurity Sites

    http://www.whatiscyberliability.com

    https://www.whatiscyberinsurance.com

    http://www.ddosattacktutorial.com

    http://www.ransomwareremovaltool.com

    Our Privacy Policy: https://cyberinsurancenews.org/privacy-policy/

    Copyright © 2024 Cyber Insurance News.

    Powered by PressBook Premium theme