Did you know that Microsoft was one of the most impersonated brands during phishing attacks in 2020? Microsoft 365’s user base grew to 258 million in 2020, higher than expected growth driven by the COVID-19 pandemic. And the tech giant has consistently remained at the top of Vade Secure’s Phishers’ Favorites quarterly reports, holding the #1 spot for four quarters. Moreover, Microsoft is not only the phishers’ favorite, but generally a popular attack target.
A global wave of cyberattacks and data breaches began in January 2021 after four zero-day exploits were discovered in on-premises Microsoft Exchange Servers, giving attackers full access to user emails and passwords on affected servers, administrator privileges on the servers, and access to connected devices on the same network. It was estimated that 250,000 servers fell victim to the attacks. On March 12, 2021, Microsoft announced the discovery of "a new family of ransomware" being deployed to servers, encrypting all files, making the server inoperable and demanding payment to reverse the damage. Keep up to date and read this article for more important cybersecurity findings you can´t afford to miss.
Changes in Cybersecurity Attack Motives and Methods
In the cybersecurity industry, we are seeing a change in the way that hacks are being performed. A recent set of attacks against critical infrastructure entities reveal new motives and methods. The attackers were not out to steal data but were looking to disrupt services and they used a new attack vector that has not been seen before. Instead of attacking their primary targets directly, they attacked less secure vendors that those targets use, as the following examples show:
New Successful Cyberattacks and Threats Methods
Recent trends have arisen as side effects of the global pandemic. Cybersecurity statistics reveal a huge increase in hacked and breached data from sources that were recently introduced in the workplace, like mobile and IoT devices. On top of this, COVID-19 has created ramped up remote workforces, making inroads for cyberattacks. Additionally, recent security research suggests most companies have unprotected data and poor cybersecurity practices in place, making them vulnerable to data loss. Let´s have a look at the latest developments to keep you alert:
Data breaches can be far more than a temporary terror — they may change the course of your life. Whether you are offline or online, hackers can get to you through the internet, Bluetooth, text messages, or the online services that you use. Without proper attention to detail, a small vulnerability can cause a massive data breach.