26.11.2020 Views

CS Nov-Dec 2020

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

hacking surge<br />

technical expertise to develop the malware<br />

and manage the DDoS attack process."<br />

However, the world of technology has<br />

'progressed' and it is entirely possible to<br />

purchase a DDoS attack from the 'Dark web'.<br />

"One simply has to make contact with one of<br />

the numerous vendors of the services and<br />

specify the target, the magnitude and<br />

duration of the attack, pay the required fee<br />

(usually in crypto-currency) and then one sits<br />

back and observes as the crime unfolds," he<br />

adds. "The DDoS attack will have an associated<br />

service level agreement, but quite how the SLA<br />

is enforced in the event of a disagreement is<br />

currently an opaque area!"<br />

This "commoditisation of cybercrime" now<br />

extends beyond DDoS attacks, states Brear,<br />

and it is possible to purchase ransomware<br />

attacks, targeted hacks, bespoke malware,<br />

phishing email templates, industrial espionage<br />

services, and lists of potential targets for<br />

frauds and extortion attempts. "The other<br />

consequence of the commoditisation of<br />

cybercrime is that traditional criminals can<br />

purchase the required technical solutions to<br />

combine with their criminal prowess, and<br />

produce ever more inventive methods to<br />

defraud and attack people and organisations."<br />

Action Fraud, the UK's dedicated resource<br />

for reporting fraud and cyber-crime, estimated<br />

that UK citizens have already lost around<br />

£16 million from online scams and frauds in<br />

the earlier stages of the UK lockdown. "Also,<br />

the illegal takeover, or compromise, of cloudbased<br />

email accounts is approaching epidemic<br />

proportions and shows no signs of abating<br />

anytime soon," Brear warns.<br />

"Despite the focus on disruption to business<br />

operations created by the Covid-19 crisis, the<br />

traditional challenges created by cybercrime<br />

have not diminished and organisations need<br />

to have in place appropriate protective<br />

measures, security response plans and<br />

business continuity arrangements to maintain<br />

their critical services and functions." What is<br />

clear from these findings is that the range of<br />

threats that organisations face is increasing<br />

and now, more than ever, it's essential that<br />

companies have the right cyber resilience<br />

strategies in place to counteract this growing<br />

threat - which has only been amplified by the<br />

coronavirus pandemic and remote working.<br />

This is supported by another report, published<br />

by cyber security specialist firm Mimecast,<br />

titled 'State of Email Security', which has<br />

detailed some of threats facing businesses<br />

today. The report surveyed 1,025 global IT<br />

decision makers. Some of key findings include:<br />

60% of IT professionals surveyed believed<br />

it's inevitable or likely they will suffer from<br />

an email-borne attack in the coming year<br />

72% of respondents reported an increase<br />

in phishing on their organisations and,<br />

due to the global pandemic, threat actors<br />

are broadly using impersonation and<br />

BEC to steal from unsuspecting users.<br />

Mimecast has found that impersonation<br />

fraud attempts jumped by a staggering<br />

30% from January to April <strong>2020</strong><br />

47% of IT professionals surveyed in the UK<br />

say the volume of email-based spoofing of<br />

customers, vendors or business partners,<br />

using their brand to trick an organisation<br />

into giving cybercriminals money, sensitive<br />

intellectual property or login credentials<br />

has increased over the past year<br />

51% of IT professionals surveyed in the UK<br />

say the volume of email-based spoofing<br />

of well-known internet brands (Microsoft,<br />

PayPal etc), asking employees for money,<br />

sensitive intellectual property or login<br />

credentials, has increased in the last year.<br />

TIMES ARE CHANGING<br />

This research comes at a time when<br />

organisations across the globe have been<br />

forced to adopt remote work policies for<br />

employees in response to the coronavirus<br />

pandemic. Threat actors have seized this<br />

opportunity and evolved the ways they are<br />

targeting their victims. Domain-spoofing and<br />

email-spoofing have become mainstream<br />

attack vectors, according to the report. Nearly<br />

half of organisations (49%) surveyed report<br />

anticipating an increase in web or email<br />

spoofing and brand exploitation in the next<br />

12 months, and it is a rising concern. In fact,<br />

84% of respondents felt concerned about<br />

an email domain, web domain, brand<br />

exploitation or site spoofing attack. It is critical<br />

for organisations to look beyond their email<br />

perimeters to determine how cyber threat<br />

actors may be using and damaging their<br />

brands online.<br />

Similar to years past, impersonation attacks,<br />

phishing attempts and ransomware continue<br />

to be a major problem, according to the<br />

research. Seventy-two per cent of report<br />

participants said phishing attacks remained<br />

flat or increased in the previous 12 months<br />

and 74% reported the same of impersonation<br />

attacks. This indicates that phishing is<br />

potentially becoming more difficult to stop<br />

or prevent, due to more advanced tactics such<br />

as spear-phishing.<br />

Ransomware also continues to wreak havoc,<br />

as just over half of respondents (51%) said<br />

that ransomware attacks impacted their<br />

organisation, citing data loss, downtime,<br />

financial loss and loss of reputation or trust<br />

among customers.<br />

The State of Email Security <strong>2020</strong> report also<br />

shines a light on the urgent need for a more<br />

cyber-aware workforce. Encouragingly, 97%<br />

of the respondents' organisations offered<br />

security awareness training at varying<br />

frequencies and formats. However, 60% of<br />

those surveyed reported having been hit by<br />

malicious activity spread from employee to<br />

employee, pointing to the fact that the format<br />

or frequency of these trainings could be the<br />

problem. With frequent, consistent, engaging<br />

content that humanises security, security<br />

awareness training is an effective way to<br />

reduce risk inside the network and<br />

organisation.<br />

While threat actors are visibly gaining in<br />

sophistication and evolving, their tactics in<br />

www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards <strong>Nov</strong>/<strong>Dec</strong> <strong>2020</strong> computing security<br />

27

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!