Most common forms of cyberattacks last year
New research from BlackBerry Limited shows hackers use different strategies and attack types, depending on the industry they’re targeting.
For example, criminals targeting the technology and software industry are most concerned with stealing intellectual property. To that end, a quarter of attacks (26 percent) were ransom based.
Healthcare organizations also encountered a high proportion of ransomware, as a result of the valuable data they hold. When attacking service providers, on the other hand, hackers are prone to using end customers to increase malicious distribution. Remote management tools like Go2Assist or NinjaRMM are often harnessed by attackers. The report also found hackers are employing new technologies. APT group OceanLotus, for example, deployed new backdoors, targeting multinational automotive manufacturers.
“New techniques to obscure malicious payloads and distribute attacks across multiple organizations paid off for threat actors in 2019,” said Eric Cornelius, Chief Technology Officer at BlackBerry Cylance. “With the increasing ease of access to attack toolkits combined with the explosion of endpoints connected to organizations’ networks, the global threat landscape for emerging threats will only continue to escalate in 2020.”
Get In Touch
Share On Social Media
Other Recent Blog Articles
Small Business HR & Payroll Made Easy (and Safeguarding Your Company from Phishing Attacks)
In this episode of Breaking Down I.T. with Steve, we welcome back Erik Swanson from Cardinal Services. Erik specializes in bringing the power of big-company HR, payroll, and benefits solutions…
Read MoreKrispy Kreme Gets a Bad Taste: Cyberattack Bites into Donut Giant
Krispy Kreme Hit by Cyberattack: A Wake-Up Call for Businesses Donut lovers beware: your online Krispy Kreme orders might be on hold thanks to a recent cyberattack. The company reported…
Read MoreDon’t Get Hooked: Protecting Yourself from Phishing and Spam
In this week’s episode of “Breaking Down I.T. with Steve,” we’re diving headfirst into the murky waters of unwanted emails: spam and phishing. We’ll dissect these two cyber threats, exploring…
Read More