We're building value and opportunity by investing in cybersecurity, analytics, digital solutions, engineering and science, and consulting. Our culture of innovation empowers employees as creative thinkers, bringing unparalleled value for our clients and for any problem we try to tackle.
Empower People to Change the World®
Learn how we’re driving empowerment, innovation, and resilience to shape our vision for the future through a focus on environmental, social, and governance (ESG) practices that matter most.
Our 29,200 engineers, scientists, software developers, technologists, and consultants live to solve problems that matter. We’re proud of the diversity throughout our organization, from our most junior ranks to our board of directors and leadership team.
Cyber attacks like the global WannaCry outbreak and the million-dollar CoinDash breach made headlines in 2017. How will 2018 be different? We asked our most experienced threat intelligence analysts to compile a threat forecast to watch for in the year ahead. Here are the top emerging trends and predictions
Tailored to your business, Booz Allen’s Cyber Threat Intelligence service enables better defenses and reduces strategic surprise within your leadership team. You get deep insight into the threats facing your organization, intelligence about the adversary’s tools and tactics, and increased awareness of the specific threats facing the industry at large. Booz Allen Cyber Threat Intelligence blends actionable intelligence into your business and operational priorities to deliver a highly tailored intelligence capability, covering the entire cyber threat landscape. We’re leveraging talent to give you the visibility you need.
1. Infiltrating Large Supply Chains through Small Vendors
By infiltrating vendor software that’s used in larger supply chains, criminals could compromise tens of thousands of enterprises simultaneously. Even major forces within the tech industry could become susceptible to breach.
2. Targeting Manufacturers through Industrial Control Systems
Manufacturers rely on a variety of industrial control systems to run their complex operations. Attacks on these systems cause extended operational halts to production and physical damage, and can even jeopardize the safety of employees and customers.
3. Attacking Third-Party Software Tools
As more developers rely on "plug and play" software kits and libraries, they are more likely to become the target of attacks. And because third-party software is used in so many different applications, breaches would be hard to patch quickly without service disruptions.
4. Skirting Sanctions with Cryptocurrencies
The rise of digital currencies like Bitcoin, Monero, and Zcash have opened a window for governments to circumvent sanctions by establishing their own exchanges or coin-shuffling services. With the right technology, nations could siphon off massive amounts of money.
5. Compromising Political Elections
Wide variation in security standards and the high cost of buying new, more secure devices make this a vulnerable target for mischief-makers in the new year.
6. Using Ransomware as a Foreign Policy Tool
With the ability to disrupt the day-to-day activities of major government agencies, ransomware attacks in the healthcare and social security sectors are likely. Countries in South America and South Asia are most likely to be severely affected.
7. Leveraging Hackers-for-Hire
While a deficit of homegrown cyber talent prevented Persian Gulf states from forming offensive forces in the past, a massive injection of capacity in the form of foreign contractors could reshape conflicts in the region.
8. Sowing Institutional Distrusts
As Americans become more aware of misinformation spread online, they have become more skeptical of information sources. Cybercriminals and hacktivists will likely work to take advantage of this social trend stoking the fires of distrust in media outlets.
9. Putting Journalists and their Sources in the Crosshairs
Hackers may work to uncover the identities of sensitive sources in order to extort media outlets for ransom. Breaching media company networks could also provide them with insider information about upcoming negative press before it goes to print.