Most common forms of cyberattacks last year

New research from BlackBerry Limited shows hackers use different strategies and attack types, depending on the industry they’re targeting.

For example, criminals targeting the technology and software industry are most concerned with stealing intellectual property. To that end, a quarter of attacks (26 percent) were ransom based.

Healthcare organizations also encountered a high proportion of ransomware, as a result of the valuable data they hold. When attacking service providers, on the other hand, hackers are prone to using end customers to increase malicious distribution. Remote management tools like Go2Assist or NinjaRMM are often harnessed by attackers. The report also found hackers are employing new technologies. APT group OceanLotus, for example, deployed new backdoors, targeting multinational automotive manufacturers.

“New techniques to obscure malicious payloads and distribute attacks across multiple organizations paid off for threat actors in 2019,” said Eric Cornelius, Chief Technology Officer at BlackBerry Cylance. “With the increasing ease of access to attack toolkits combined with the explosion of endpoints connected to organizations’ networks, the global threat landscape for emerging threats will only continue to escalate in 2020.”

Get In Touch

Share On Social Media

Other Recent Blog Articles

Small Business HR & Payroll Made Easy (and Safeguarding Your Company from Phishing Attacks)

December 27, 2024

In this episode of Breaking Down I.T. with Steve, we welcome back Erik Swanson from Cardinal Services. Erik specializes in bringing the power of big-company HR, payroll, and benefits solutions…

Read More

Krispy Kreme Gets a Bad Taste: Cyberattack Bites into Donut Giant

December 19, 2024

Krispy Kreme Hit by Cyberattack: A Wake-Up Call for Businesses Donut lovers beware: your online Krispy Kreme orders might be on hold thanks to a recent cyberattack. The company reported…

Read More

Don’t Get Hooked: Protecting Yourself from Phishing and Spam

December 13, 2024

In this week’s episode of “Breaking Down I.T. with Steve,” we’re diving headfirst into the murky waters of unwanted emails: spam and phishing. We’ll dissect these two cyber threats, exploring…

Read More