Cyber attacks on manufacturing up 300% in a year

NTT also found that application-specific and web-application attacks accounted for two-thirds of all cyber crime

Hackers have taken advantage of the coronavirus crisis to launch cyber attacks against essential industries, according to NTT’s latest report.

The company’s 2021 Global Threat Intelligence Report (GTIR) revealed that the manufacturing, health care, and finance industries saw 300%, 200%, and 53% increases in worldwide attacks, respectively. These top three sectors accounted for a combined 62% of all attacks in 2020, up from just 11% in 2019.

The shift to remote working and workers accessing company infrastructure through client portals has also resulted in application-specific and web application attacks spiking. These have accounted for 67% of all attacks, more than doubling in the past two years.

Health care was the worst-hit sector, with 97% of all hostile activity targeted at the industry being web application or application-specific attacks.

The report found that business and professional services were the most attacked industries in the Americas, accounting for 26% of all attacks. The US accounted for two of the highest rates of reconnaissance activity of any country analyzed, with 64% of all hostile action targeting the technology industry as some form of surveillance. In education, 58% of all hostile activity was reconnaissance.

Kazu Yozawa, CEO of NTT’s Security division, said that last year his company predicted a surge in targeted, opportunistic attacks and unfortunately, this has proven all too true. 

“While these industries have done their best to maintain essential services throughout disruptive times, the fall in security standards when companies need them most is alarming. As services continue to move online and become increasingly digital to account for the new normal, organizations must be extra vigilant in upholding and maintaining best practices in their security,” he said.

Rodney Joffe, SVP and Fellow at Neustar told IT Pro it’s clear that cyber criminals have wasted no time taking advantage of this expanded threat landscape, attacking both the “front end” of applications — the APIs — as well as the applications behind them. 

Related Resource

Security awareness training strategies for account takeover protection

Why you need an inside-the-perimeter strategy for internal threats

Security awareness training strategies for account takeover protection - whitepaper from MimecastDownload now

“Many of these attacks are opportunistic, a result of bot-driven reconnaissance or the “vertical cascade” method. In other, rarer cases, attacks are more targeted, involving hackers spending time to find a vulnerability in an organization’s web presence and exploiting it to steal customer or patient information, intellectual property, or finance credentials,” Joffe said.

The report also found that crypto-miners have replaced spyware as the world’s most common malware, but the use of certain malware variants against specific industries continues to evolve. crypto miners accounted for 41% of all detected malware in 2020. XMRig coin miner was the most common variant, representing nearly 82% of all coinminer activity.

Featured Resources

The definitive guide to warehouse efficiency

Get your free guide to creating efficiencies in the warehouse

Free download

The total economic impact™ of Datto

Cost savings and business benefits of using Datto Integrated Solutions

Download now

Three-step guide to modern customer experience

Support the critical role CX plays in your business

Free download

Ransomware report

The global state of the channel

Download now

Recommended

What is a web filter?
cyber security

What is a web filter?

24 Sep 2021
100 million IoT devices affected by zero-day flaw
Internet of Things (IoT)

100 million IoT devices affected by zero-day flaw

24 Sep 2021
Malware developers create malformed code signatures to avoid detection
malware

Malware developers create malformed code signatures to avoid detection

24 Sep 2021
HP Wolf Security: Threat insights report
Whitepaper

HP Wolf Security: Threat insights report

24 Sep 2021

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

17 Sep 2021
What are the pros and cons of AI?
machine learning

What are the pros and cons of AI?

8 Sep 2021
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

17 Sep 2021