97% of businesses targeted by email-based phishing attacks in past year

Nearly all businesses (97%) have been targeted by email-based phishing attacks in the past year and two-thirds have suffered a ransomware attack – that’s according to a stark new report by leading cybersecurity provider, Mimecast, which has revealed the scale of the cybersecurity threat facing businesses today.

  • 1 year ago Posted in

Mimecast’s Q3 2023 threat intelligence taken from analysis of more than a billion emails per day on behalf of more than 42,000 customers, as well as external intelligence from the cyber community at large. Because email is the channel through which most cyber threats launch, Mimecast sees many new threats before they become widely known.

Mimecast’s Q3 Threat Intelligence report reveals:

• The number of impersonation attempts and malicious links sent to each user increased by double digits — 12% and 22% respectively. Impersonation attacks have become more sophisticated and opportunistic.

• Impersonation attacks are a key tactic of state-linked groups seeking to establish initial access into targeted networks, and the cyber component of Russia’s invasion of Ukraine likely contributed to the increase in impersonation attacks.

• Medium-sized companies specifically have seen an uptick in threats per user in the third quarter, as attackers see mid-sized companies as a profitable combination of vulnerability and potential cash value.

• Several cybercriminal groups made notable strategic shifts in the quarter.

• Ransomware group CI0p used the previously undisclosed threat of the MOVEit managed file-transfer platform to compromise hundreds of businesses. With many of the victims providing services to client organisations, the impact of data breaches led to more than 2,300 organisations being affected.

• Human resource firms, information technology software and services, and financial services (especially banking)

• The vast majority (76%) of security teams at organizations worldwide expect to have an attack with serious consequences using email as a vector.

• Attackers are moving faster than platforms. The Known Exploited Vulnerabilities (KEV) Catalog, for example, documents which vulnerabilities attackers have already exploited, with 188 vulnerabilities from 2021, 120 from 2022, and 78 from 2023 exploited by attackers to date. Only a handful of vulnerabilities, however, account for most email attacks, making threat intelligence a key to knowing which exploits are most common and to helping harden the network and users against them.

• Attackers are increasingly using major providers’ cloud services to launch attacks, with an increasing amount of spam and phishing coming from public domains, such as gmail.com and outlook.com. Mimecast blocks thousands of malicious email messages targeting Microsoft 365 accounts every day utilizing their own services, such as Microsoft Dynamics 365 Customer Voice.

• Collaboration platforms like Microsoft Teams and Slack also seeing increase in attacks.

Predictive maintenance and forecasting for security and failures will be a growing area for MSPs...
Venafi has published the findings of its latest research report: The Impact of Machine Identities...
Arctic Wolf to enhance its Security Operations Aurora Platform with best-in-class endpoint...
Nearly 50% of organisations have experienced a security breach in the last two years.
New study by Splunk shows that a significant number of UK CISOs are stressed, tired, and aren’t...
HP Wolf Security Study highlights cybersecurity challenges facing organizations across the...
Internal test shows estimated scanning speeds of 75,000 backups within 60 seconds.
Deployment allows Korea Hydro and Nuclear Plant (KHNP) to leverage quantum-safe MACsec technology...