Cyber attacks on manufacturing up 300% in a year
NTT also found that application-specific and web-application attacks accounted for two-thirds of all cyber crime
The company’s 2021 Global Threat Intelligence Report (GTIR) revealed that the manufacturing, health care, and finance industries saw 300%, 200%, and 53% increases in worldwide attacks, respectively. These top three sectors accounted for a combined 62% of all attacks in 2020, up from just 11% in 2019.
The shift to remote working and workers accessing company infrastructure through client portals has also resulted in application-specific and web application attacks spiking. These have accounted for 67% of all attacks, more than doubling in the past two years.
Health care was the worst-hit sector, with 97% of all hostile activity targeted at the industry being web application or application-specific attacks.
The report found that business and professional services were the most attacked industries in the Americas, accounting for 26% of all attacks. The US accounted for two of the highest rates of reconnaissance activity of any country analyzed, with 64% of all hostile action targeting the technology industry as some form of surveillance. In education, 58% of all hostile activity was reconnaissance.
Kazu Yozawa, CEO of NTT’s Security division, said that last year his company predicted a surge in targeted, opportunistic attacks and unfortunately, this has proven all too true.
“While these industries have done their best to maintain essential services throughout disruptive times, the fall in security standards when companies need them most is alarming. As services continue to move online and become increasingly digital to account for the new normal, organizations must be extra vigilant in upholding and maintaining best practices in their security,” he said.
Rodney Joffe, SVP and Fellow at Neustar told IT Pro it’s clear that cyber criminals have wasted no time taking advantage of this expanded threat landscape, attacking both the “front end” of applications — the APIs — as well as the applications behind them.
Security awareness training strategies for account takeover protection
Why you need an inside-the-perimeter strategy for internal threatsDownload now
“Many of these attacks are opportunistic, a result of bot-driven reconnaissance or the “vertical cascade” method. In other, rarer cases, attacks are more targeted, involving hackers spending time to find a vulnerability in an organization’s web presence and exploiting it to steal customer or patient information, intellectual property, or finance credentials,” Joffe said.
The report also found that crypto-miners have replaced spyware as the world’s most common malware, but the use of certain malware variants against specific industries continues to evolve. crypto miners accounted for 41% of all detected malware in 2020. XMRig coin miner was the most common variant, representing nearly 82% of all coinminer activity.
How virtual desktop infrastructure enables digital transformation
Challenges and benefits of VDIFree download
The Okta digital trust index
Exploring the human edge of trustFree download
Optimising workload placement in your hybrid cloud
Deliver increased IT agility with the cloudFree Download
Modernise endpoint protection and leave your legacy challenges behind
The risk of keeping your legacy endpoint security toolsDownload now