How and Why Cyberattacks are Increasing_

    Cyberattacks have evolved into a full-scale industry, with criminal gangs and state-backed hackers targeting databases through ransomware, data leaks, and stolen access.

    Sweden has become a prime target, leading the Nordic region in ransomware cases due to its tech sector, geopolitical tensions, and military industry.

    This is part 2 of a 3-part series on database protection:

    Part 1: Recent Data breaches in SwedenPart 2: Cyberattacks increasing (current article)Part 3: Data protection strategies

    The Current Threat Landscape

    The Swedish Civil Contingencies Agency (MSB) has classified the current cyber threat level as severe (level 4), citing major risks to businesses, individuals, and national security.

    The nature of cyberattacks, becoming a full-scaled industry, has increased the number of antagonists targeting databases. Threat actors range from cybercriminal gangs to state-sponsored hackers, all seeking to steal, destroy, or leak sensitive data for profit or espionage.

    What Are The Threats?

    Ransomware

    Ransomware groups are among the most aggressive antagonists today. Modern ransomware attacks often involve double extortion – not only locking files but also exfiltrating data and threatening to publish it if the ransom isn't paid. As of 2023, an estimated 72% of companies have been affected by ransomware, with an average incident cost of $4.35 million.

    Data Leaks

    Data leaks are either a result of ransomware (when victims don't pay) or standalone breaches. Antagonists steal sensitive information and release it publicly or sell it on the dark web. According to Splunk's report, 52% of organizations reported at least one data breach in the past two years.

    Access Brokers

    Initial Access Brokers (IABs) specialize in breaching systems to obtain administrator credentials, then selling that access to the highest bidder (often ransomware gangs). They're like black-market locksmiths: they crack a company's defenses and hand over the "keys" to criminal clients.

    Why is Sweden Being Targeted?

    Sweden has experienced a wave of cyberattacks, leading the Nordic region in ransomware cases – nearly 50% of Nordic ransomware incidents in a recent period targeted Swedish organizations.

    According to assessments cited by the Swedish Civil Contingencies Agency (MSB) and intelligence services, the overall antagonist threat picture has become more serious and complex. All of the mentioned cases reached a risk level of 4, where the risk of physical harm is great due to the sheer amount of personal data being leaked.

    *Source: MSB

    The reasons for why Sweden is such a tempting target is manifold, where we are facing unique threats that put us in a proverbial danger zone. The combination of international tensions (such as Sweden's NATO accession process and involvement in sanctions) and active cybercriminal ecosystems means Swedish organizations should prepare for being prime targets.

    Many unicorn companies:

    Sweden has one of the biggest number of unicorn companies per capita in the world (companies valued over 1 billion dollars), for example Spotify, Klarna, and Northvolt, making us a very fruitful target for cyberattacks.

    Military equipment production:

    Sweden is a big producer of military equipment, for example Gripen, making us a big target for espionage to try and find out our military secrets.

    Geopolitics:

    Sweden has gotten a target on its back the last few years due to different reasons, e.g. the burnings of the Koran where we have received a tremendous amount of backlash.

    The Landscape is Changing

    As a database automation and security innovator, we at DB24 have a front-row view of emerging trends. The threat landscape of tomorrow is taking shape today, and our perspective – reinforced by findings in the State of Security 2024 report – is that organizations must prepare for a rapidly changing game. To help you prepare for the future, and understand what's coming, here is our outlook on how the IT-landscape and cyberattacks will evolve, what the coming years hold, and why significantly bigger investments in security (and automation) are needed.

    Key Insights

    • Cyberattacks are becoming more precise, scalable, and destructive
    • Many still believe "It won't happen to us" – a dangerous mindset
    • AI is being leveraged by both attackers and defenders
    • 96% of organizations plan to increase cybersecurity spending
    • Bigger investments in IT-safety are urgently needed

    The Threat is Changing (and Improving)

    Cyberattacks are no longer simple data thefts or one-off breaches. Attackers are refining their tactics, making them more precise, scalable, and destructive. The days of crude phishing emails and basic malware are fading – today's threats are multi-layered, leveraging automation, AI, and deep reconnaissance to infiltrate systems undetected.

    Data leaks are becoming more targeted, with criminals manipulating stolen data to cause reputational and financial damage. Ransomware operations have evolved into full-fledged businesses, complete with customer support, affiliate programs, and even "trial attacks" to prove credibility.

    The big question is whether our security measures can keep pace. With attackers constantly improving, organizations must shift from reactive defense to proactive protection. The longer we lag behind, the greater the gap grows.

    We Are Naive

    Too many still believe, "It won't happen to us." – a very dangerous mindset to have in these trying times. No company, institution, or individual is too small or insignificant to be targeted. Cybercriminals don't discriminate – they attack indiscriminately, exploiting vulnerabilities wherever they find them.

    Attackers use automation to scan for weak points at scale, leveraging AI to identify and exploit vulnerabilities faster than defenders can respond. The result? Organizations falling further behind, struggling to close the widening gap. We must stop assuming that being low-profile or well-intentioned makes us safe. Attackers don't care about fairness or ethics – they care about opportunity.

    AI is in The Spotlight

    No discussion about the future of the "database war" can ignore the elephant in the room:

    Artificial Intelligence. The antagonists are already leveraging AI and machine learning to enhance their attacks, from AI-crafted phishing emails to malware that adapts on the fly. Security teams find themselves in a race to harness generative AI for defense as well – it's literally a scenario of defenders vs. attackers vying for an AI edge:

    • Defenders: Machine learning models can detect anomalies in database access patterns that humans might miss. AI can also automate routine tasks (like user access reviews or configuration checks), freeing up human experts to focus on complex problems. In fact, according to the State of Security 2024, 91% of leading organizations report their security teams are using generative AI tools in some capacity.
    • Attackers: We are already seeing deepfake phishing, where AI mimics a CEO's voice or writing style to trick an employee, and malware that uses AI to dynamically evade detection. The security community's biggest reported fear is precisely this misuse – "AI-powered attacks" topping the list of concerns. There's also the issue that at least one-third of organizations have rushed into AI without proper policies or understanding of the risks. This could lead to new vulnerabilities (for example, sensitive data leakage through AI systems, or over-reliance on AI decisions).

    Our recommendation
    for AI

    AI is a driving force for innovation, however our recommendation is to keep AI far away from your actual data and platforms. Rulebased tools with predictability is per Q1 2025 still the best option. On data platforms we want robustness and predictability.

    There's a Need for Bigger Investments in IT-Safety

    One clear message emerges from all of the above: we need to invest more in cybersecurity across the board.

    Many firms have under-invested in database security, treating it as a low priority until a breach occurs. Encouragingly, awareness is translating into action – nearly 96% of organizations surveyed by Splunk say they plan to increase their cybersecurity spending in the next one to two years. This is a positive trend, but the question is where those investments should go.

    Organizations must prioritize proactive cybersecurity measures instead of relying solely on post-incident recovery. Investments should focus on:

    Preventative and Automated Controls

    Security should be built into systems, not just added after a breach. Implement automated controls that continuously monitor and protect your database environment.

    Modernizing Data Platforms

    Implement advanced encryption, monitoring, and inventory tools. Modern platforms provide better security capabilities and compliance features.

    Training and Retaining Skilled Security Staff

    Ensure teams are well-equipped to handle evolving threats, or partner with external experts if necessary. The skills gap is real and must be addressed.

    Infrastructure Upgrades

    Replace outdated databases and systems that can't be properly secured. Legacy systems are often the weakest link in your security chain.

    Reducing Reliance on Insurance Alone

    Cyber insurance is not a substitute for strong security measures. Prevention is always better and more cost-effective than recovery.

    Strengthen Your Databases Protection Today with DB24

    We founded DB24 with the belief that many database disasters (breaches, downtime, data loss) can be prevented by eliminating human error and catching issues early – through intelligent automation. By automating routine DBA tasks and continuously monitoring the database environment, DB24 frees up your team and ensures nothing slips through the cracks.

    Don't wait for the next breach to take action. See how our platform can secure your databases against the evolving threat landscape and keep your data safe for years to come.