+44 (0)203 88 020 88

Menu

Search

Cyber Security News & Articles

 

Cyber Security
News & Articles

Trusted Cyber Security Experts
25+ Years Industry Experience
Ethical, Professional & Pragmatic

The Current and Future Trends in Cyber Crime

The release of the 2022 Falcon OverWatch Threat Hunting Report from CrowdStrike has revealed the recent trends in cyber crime from July 2021 to June 2022. According to the report, the number of cyber crime campaigns has increased by 50% with financial crime accounting for 43% of all attacks.  

According to CrowdStrike’s analysis cyber crime over the last 12 months can be categorised into: 

eCrime (43%), performed by financially motivated attackers,  

Targeted (18%), which are specifically destructive attacks that include espionage,  

Hacktivist (1%), which is cause-driven to gain publicity for a movement, and  

Unattributed (38%), where data to categorise the attacks is not sufficient.  

While the proportions of attack types, such as targeted victims vs financially motivated attackers, remain incredibly similar between 2021 and 2022, the total number of attack campaigns have increased by 50% in this one year. 

 

The top 3 industries most targeted by cyber crime remain the same in 2022 as they were in 2021, with technology companies in first place, followed by telecommunications organisations in second place, then manufacturing in third. Interestingly, the academic and healthcare sectors have been targeted more than the financial sector this year, which is a change from 2021. Retail, the government, pharmaceutical companies and the media are all also rated in the top 10 industries targeted globally. However, the industry breakdown changes when specific types of attacks are considered. For eCrime, technology is still the most targeted sector, making up 21% of attacks, however telecommunications do not appear in the top 5 industries targeted by eCrime. Telecommunications instead make up 37% of targeted intrusions, where technology takes second place, representing 14% of these types of attacks. 

 

Most attacks used stolen credentials rather than malware to gain network access. 

 

Of all the threats detected by OverWatch between July 2021 and June 2022, 71% were found to be malware-free, which reflects a continued trend away from the use of malware in attacks. The most common forms of attack instead take advantage of valid accounts, in cases of stolen credentials being used to access environments. This emphasises the need for individuals and organisations to enforce strict policies when it comes to the creation, use, and removal of user accounts. Multi-factor authentication (MFA) should be used as a standard on all user accounts with any privilege level to reduce the impact of credential harvesting by malicious actors. Highly privileged administrator accounts should only be used when necessary for a task, and not for other daily work activities.  

 

Exploit of public-facing applications, command and scripting interpreters, Windows command shell, and remote desktop protocol are all also highly exploited areas for initial access, execution, persistence, privilege escalation, and lateral movement. The speed in which attackers can utilise these steps and move through a victim’s environment is recorded as being an average of 1 hour 24 minutes. In 30% of cases, lateral movement by attackers within victim environments was possible in just 30 minutes. Segregation of networks and other environments can help organisations prevent the movement of criminals from one host to another, thereby reducing the area of compromise. The principle of least privilege where users have access to just enough of the network to do their job and no more should also be used for further protection. 

 

The number of zero-days and disclosed CVEs has continued to rise this year, and exploits have been discovered in the wild increasingly soon after initial disclosure. Although patching is very often the immediate result for vulnerabilities, CrowdStrike claim that many legacy vulnerabilities remain unpatched due to a continuous cycle of newly discovered vulnerabilities needing short term fixes, so there is not an opportunity to apply long term solutions. By the start of June 2022, over 10,000 new vulnerabilities had been reported, which is approximately half the total reported number for all of 2021. It is therefore very likely that the trend of an increasing number of vulnerabilities reported compared to any previous year will continue in the latter half of 2022.  

 

Over the 12-month period covered in this report, attacks in cloud-based environments have increased. Two examples found in this research were attacks on Amazon Web Services (AWS) in Q4 of 2021 and Microsoft 365 Azure environments in Q1 of 2022. OverWatch suggest that as cloud workloads increase, criminals will continue to increasingly target these environments, for “intellectual property theft, data extortion, ransomware or simple destruction”. If this trend continues, then the future of cyber crime will be found in the cloud, and as a threat hunting company, they are also targeting their future resources to identifying these cloud-based threats.  

 

Organisations can take steps to protect their cloud environments now to prevent future threats. Account hardening introduces tighter controls and allows for the organisation to manage access to cloud environments more securely. MFA should always be used when accessing cloud services, for accounts with any privilege levels including basic user accounts. Whatever access controls are put in place should be monitored regularly to ensure they are fit for purpose and continue to provide a sufficient level of protection. Organisations should also be proactive in their security, and not assume that the default security settings put in place by cloud service providers are suitable for their business needs. Instead, the available security controls should be investigated, and the most appropriate set up for the organisation should be implemented.  

 

 

Subscribe to our monthly newsletter today

If you’d like to stay up-to-date with the latest cyber security news and articles from our technical team, you can sign up to our monthly newsletter. 

We hate spam as much as you do, so we promise not to bombard you with emails. We’ll send you a single, curated email each month that contains all of our cyber security news and articles for that month.

Why Choose SecureTeam?

CREST
CCS
ISO9001
ISO27001
CE-PLUS

Customer Testimonials

“We were very impressed with the service, I will say, the vulnerability found was one our previous organisation had not picked up, which does make you wonder if anything else was missed.”

Aim Ltd Chief Technology Officer (CTO)

"Within a very tight timescale, SecureTeam managed to deliver a highly professional service efficiently. The team helped the process with regular updates and escalation where necessary. Would highly recommend"

IoT Solutions Group Limited Chief Technology Officer (CTO) & Founder

“First class service as ever. We learn something new each year! Thank you to all your team.”

Royal Haskoning DHV Service Delivery Manager

“We’ve worked with SecureTeam for a few years to conduct our testing. The team make it easy to deal with them; they are attentive and explain detailed reports in a jargon-free way that allows the less technical people to understand. I wouldn’t work with anyone else for our cyber security.”

Capital Asset Management Head of Operations

“SecureTeam provided Derbyshire's Education Data Hub with an approachable and professional service to ensure our schools were able to successfully certify for Cyber Essentials. The team provided a smooth end-to-end service and were always on hand to offer advice when necessary.”

Derbyshire County Council Team Manager Education Data Hub

“A very efficient, professional, and friendly delivery of our testing and the results. You delivered exactly what we asked for in the timeframe we needed it, while maintaining quality and integrity. A great job, done well.”

AMX Solutions IT Project Officer

“We were very pleased with the work and report provided. It was easy to translate the provided details into some actionable tasks on our end so that was great. We always appreciate the ongoing support.”

Innovez Ltd Support Officer

Get in touch today

If you’d like to see how SecureTeam can take your cybersecurity posture to the next level, we’d love to hear from you, learn about your requirements and then send you a free quotation for our services.

Our customers love our fast-turnaround, “no-nonsense” quotations – not to mention that we hate high-pressure sales tactics as much as you do.

We know that every organisation is unique, so our detailed scoping process ensures that we provide you with an accurate quotation for our services, which we trust you’ll find highly competitive.

Get in touch with us today and a member of our team will be in touch to provide you with a quotation. 

0

No products in the basket.

No products in the basket.