CS Nov-Dec 2020
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
hacking surge<br />
technical expertise to develop the malware<br />
and manage the DDoS attack process."<br />
However, the world of technology has<br />
'progressed' and it is entirely possible to<br />
purchase a DDoS attack from the 'Dark web'.<br />
"One simply has to make contact with one of<br />
the numerous vendors of the services and<br />
specify the target, the magnitude and<br />
duration of the attack, pay the required fee<br />
(usually in crypto-currency) and then one sits<br />
back and observes as the crime unfolds," he<br />
adds. "The DDoS attack will have an associated<br />
service level agreement, but quite how the SLA<br />
is enforced in the event of a disagreement is<br />
currently an opaque area!"<br />
This "commoditisation of cybercrime" now<br />
extends beyond DDoS attacks, states Brear,<br />
and it is possible to purchase ransomware<br />
attacks, targeted hacks, bespoke malware,<br />
phishing email templates, industrial espionage<br />
services, and lists of potential targets for<br />
frauds and extortion attempts. "The other<br />
consequence of the commoditisation of<br />
cybercrime is that traditional criminals can<br />
purchase the required technical solutions to<br />
combine with their criminal prowess, and<br />
produce ever more inventive methods to<br />
defraud and attack people and organisations."<br />
Action Fraud, the UK's dedicated resource<br />
for reporting fraud and cyber-crime, estimated<br />
that UK citizens have already lost around<br />
£16 million from online scams and frauds in<br />
the earlier stages of the UK lockdown. "Also,<br />
the illegal takeover, or compromise, of cloudbased<br />
email accounts is approaching epidemic<br />
proportions and shows no signs of abating<br />
anytime soon," Brear warns.<br />
"Despite the focus on disruption to business<br />
operations created by the Covid-19 crisis, the<br />
traditional challenges created by cybercrime<br />
have not diminished and organisations need<br />
to have in place appropriate protective<br />
measures, security response plans and<br />
business continuity arrangements to maintain<br />
their critical services and functions." What is<br />
clear from these findings is that the range of<br />
threats that organisations face is increasing<br />
and now, more than ever, it's essential that<br />
companies have the right cyber resilience<br />
strategies in place to counteract this growing<br />
threat - which has only been amplified by the<br />
coronavirus pandemic and remote working.<br />
This is supported by another report, published<br />
by cyber security specialist firm Mimecast,<br />
titled 'State of Email Security', which has<br />
detailed some of threats facing businesses<br />
today. The report surveyed 1,025 global IT<br />
decision makers. Some of key findings include:<br />
60% of IT professionals surveyed believed<br />
it's inevitable or likely they will suffer from<br />
an email-borne attack in the coming year<br />
72% of respondents reported an increase<br />
in phishing on their organisations and,<br />
due to the global pandemic, threat actors<br />
are broadly using impersonation and<br />
BEC to steal from unsuspecting users.<br />
Mimecast has found that impersonation<br />
fraud attempts jumped by a staggering<br />
30% from January to April <strong>2020</strong><br />
47% of IT professionals surveyed in the UK<br />
say the volume of email-based spoofing of<br />
customers, vendors or business partners,<br />
using their brand to trick an organisation<br />
into giving cybercriminals money, sensitive<br />
intellectual property or login credentials<br />
has increased over the past year<br />
51% of IT professionals surveyed in the UK<br />
say the volume of email-based spoofing<br />
of well-known internet brands (Microsoft,<br />
PayPal etc), asking employees for money,<br />
sensitive intellectual property or login<br />
credentials, has increased in the last year.<br />
TIMES ARE CHANGING<br />
This research comes at a time when<br />
organisations across the globe have been<br />
forced to adopt remote work policies for<br />
employees in response to the coronavirus<br />
pandemic. Threat actors have seized this<br />
opportunity and evolved the ways they are<br />
targeting their victims. Domain-spoofing and<br />
email-spoofing have become mainstream<br />
attack vectors, according to the report. Nearly<br />
half of organisations (49%) surveyed report<br />
anticipating an increase in web or email<br />
spoofing and brand exploitation in the next<br />
12 months, and it is a rising concern. In fact,<br />
84% of respondents felt concerned about<br />
an email domain, web domain, brand<br />
exploitation or site spoofing attack. It is critical<br />
for organisations to look beyond their email<br />
perimeters to determine how cyber threat<br />
actors may be using and damaging their<br />
brands online.<br />
Similar to years past, impersonation attacks,<br />
phishing attempts and ransomware continue<br />
to be a major problem, according to the<br />
research. Seventy-two per cent of report<br />
participants said phishing attacks remained<br />
flat or increased in the previous 12 months<br />
and 74% reported the same of impersonation<br />
attacks. This indicates that phishing is<br />
potentially becoming more difficult to stop<br />
or prevent, due to more advanced tactics such<br />
as spear-phishing.<br />
Ransomware also continues to wreak havoc,<br />
as just over half of respondents (51%) said<br />
that ransomware attacks impacted their<br />
organisation, citing data loss, downtime,<br />
financial loss and loss of reputation or trust<br />
among customers.<br />
The State of Email Security <strong>2020</strong> report also<br />
shines a light on the urgent need for a more<br />
cyber-aware workforce. Encouragingly, 97%<br />
of the respondents' organisations offered<br />
security awareness training at varying<br />
frequencies and formats. However, 60% of<br />
those surveyed reported having been hit by<br />
malicious activity spread from employee to<br />
employee, pointing to the fact that the format<br />
or frequency of these trainings could be the<br />
problem. With frequent, consistent, engaging<br />
content that humanises security, security<br />
awareness training is an effective way to<br />
reduce risk inside the network and<br />
organisation.<br />
While threat actors are visibly gaining in<br />
sophistication and evolving, their tactics in<br />
www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards <strong>Nov</strong>/<strong>Dec</strong> <strong>2020</strong> computing security<br />
27