Security experts face record cyber threats

Organisations seek new ways to protect their expanding attack surface, maintain stability.

New research from Trend Micro warns of spiraling risk to digital infrastructure and remote workers as threat actors increase their rate of attack on organizations and individuals.

“Attackers are always working to increase their profit, whether through quantity or efficiency attacks,” said Jon Clay, vice president of threat intelligence at Trend Micro. “The breadth of our global threat intelligence allows us to identify shifts in how malicious actors target their victims across the world. Our latest research shows that while Trend Micro threat detections rose 42% year-on-year in 2021 to over 94 billion, they shrank in some areas as attacks became more precisely targeted.”

Ransomware attackers are shifting their focus to critical businesses and industries more likely to pay, and double extortion tactics ensure that they are able to profit. Ransomware-as-a-service offerings have opened the market to attackers with limited technical knowledge – but also given rise to more specialization, such as initial access brokers who are now an essential part of the cybercrime supply chain.

Threat actors are also getting better at exploiting human error to compromise cloud infrastructure and remote workers. Trend Micro Cloud App Security (CAS) detected and prevented 25.7 million email threats in 2021 compared to 16.7 million in 2020, with the volume of blocked phishing attempts nearly doubling over the period. Research shows home workers are often prone to take more risks than those in the office, which makes phishing a particular risk.

In the cloud, incorrectly configured systems continue to plague organizations. AWS Key Management Service (AWS KMS) and Amazon Elastic Container Service (Amazon ECS) have some of the highest misconfiguration rates among AWS services. Trend Micro also found that Docker REST APIs are frequently misconfigured, exposing them to attacks from groups like TeamTNT that deploy crypto-mining malware on affected systems.

Business email compromise (BEC) saw detections drop 11%. However, CAS blocked a higher percentage of advanced BEC emails, which could be detected only by comparing the writing style of the attacker with that of the intended sender. These attacks comprised 47% of all BEC attempts in 2021 versus 23% in 2020.

While 2021 was a record year for new vulnerabilities, Trend Micro research shows that 22% of the exploits sold in the cybercrime underground last year were over three years old. Patching old vulnerabilities remains an essential task alongside monitoring for new threats to prevent cyber-attacks and ensure strong security posture.

Arqit introduces Encryption Intelligence, targeting efficient migration to post-quantum...
A recent global study by Dynatrace highlights observability as crucial for successfully scaling...
AlgoSec's latest release, A33.20, aims to enhance network security operations by providing improved...
NCC Group partners with Delinea to provide cloud-native PAM solutions, helping organisations manage...
New research reveals UK businesses' evolving approach to resilience, highlighting reliance on AI...
Netskope's report highlights the communication gaps faced by I&O leaders in enhancing AI...
Deutsche Telekom Security leverages Akamai's Security Certified Service Provider initiative to...
Autonomous intelligence is changing how enterprises operate, influencing digital processes and...