No immunity from cyber attacks, shows Check Point Research‘s cyber security report

0

Check Point Research, the Threat Intelligence arm of Check Point Software Technologies has published its 2020 Cyber Security Report. The Report highlights the main tactics cyber-criminals are using to attack organizations worldwide across all industries, and gives cyber security professionals and C-Level executives the information they need to protect their organizations from today’s fifth-generation cyber-attacks and threats.

The 2020 Security Report reveals the key attack vectors and techniques observed by Check Point researchers during the past year. Highlights include:

Cryptominers still dominate malware landscape – Even though cryptomining declined during 2019, linked to cryptocurrencies’ fall in value and the closure of the Coinhive operation in March, 38% of companies globally were impacted by crypto-miners in 2019, up from 37% in 2018. This is because the use of crypto-miners remains a low-risk, high-reward activity for criminals

  • Botnet armies surge in size – 28% of organizations globally were hit by botnet activity, an increase of over 50% compared with 2018. Emotet was the most common bot malware used, primarily because of its versatility in enabling malware and spam distribution services. Other botnet actions such as sextortion email activity and DDoS attacks also rose sharply in 2019.
  • Targeted ransomware hits hard – While the number of impacted organizations is relatively low, the severity of the attack is much higher – as seen in 2019’s damaging attacks against U.S. city administrations. Criminals are choosing their ransomware targets carefully, with the aim of extorting the maximum revenue possible.
  • Mobile attacks decline – 27% of organizations worldwide were impacted by cyber-attacks that involved mobile devices in 2019, down from 33% in 2018. While the mobile threat landscape is maturing, organizations are also increasingly aware of the threat, and are deploying more protection on mobiles
  • The year Magecart attacks became an epidemic – These attacks which inject malicious code into e-commerce websites to steal customers’ payment data hit hundreds of sites in 2019, from hotel chains to from commerce giants to SMBs, across all platforms.
  • Rise in cloud attacks – Currently more than 90% of enterprises use cloud services and yet 67% of security teams complain about the lack of visibility into their cloud infrastructure, security, and compliance. The magnitude of cloud attacks and breaches has continued to grow in 2019. Misconfiguration of cloud resources is still the number one cause for cloud attacks, but now we also witness an increasing number of attacks aimed directly at cloud service providers.

“2019 presented a complex threat landscape where nation states, cybercrime organizations and private contractors accelerated the cyber arms race, elevating each other’s capabilities at an alarming pace, and this will continue into 2020,” said Lotem Finkelsteen, Threat Intelligence Group Manager, Check Point Software Technologies.

He added, “Even if an organization is equipped with the most comprehensive, state-of-the-art security products, the risk of being breached cannot be completely eliminated. Beyond detection and remediation, organizations need to adopt a proactive plan to stay ahead of cybercriminals and prevent attacks. Detecting and automatically blocking the attack at an early stage can prevent damage. Check Point’s 2020 Security Report shares what organizations need to look out for, and how they can win the war against cyber attacks through key best practices.”

LEAVE A REPLY

Please enter your comment!
Please enter your name here