Supply chain attacks, ransomware and data extortion rife

eCrime attacks make up 79% of all intrusions uncovered #data theft #e-crime #threat actors

CrowdStrike has released its 2021 Global Threat Report, highlighting key issues relating to the global threat landscape and offering best practices for organisations looking to amplify their cybersecurity maturity in 2021.

The findings suggest supply chain attacks, ransomware, data extortion and nation-state threats prove to be more prolific than ever. On the heels of unprecedented growth in eCrime, CrowdStrike has introduced a new eCrime index (ECX) in this year’s report. The ECX displays the strength, volume and sophistication of the cybercriminal market, and is updated weekly in real-time, based on 18 indicators of criminal activity.

The 2021 Global Threat Report highlights that eCrime attacks made up 79% of all intrusions (via hands-on-keyboard activity) uncovered by CrowdStrike Falcon OverWatch, the organisation’s team of threat hunters. Among a popular vector for cyber criminals is the supply chain, as it allows malicious actors to propagate multiple downstream targets from a single intrusion.

The report also spotlights how nation-state adversaries infiltrated networks to steal valuable data seeking COVID-19 vaccine research, whereby threat actors have improved strategies to evade detection and camouflage in networks, many times deceiving their targets.

Says Adam Meyers, senior vice president of intelligence at CrowdStrike: “There is a human being behind every attack, and cyber actors are getting bolder and more astute day-to-day. As such, it’s critical to employ comprehensive cloud-native technology for increased visibility and prevention capabilities, including threat intelligence and expert threat hunting to stay one step ahead of modern-day attacks. “Additionally, today’s rapidly changing remote work environment highlights that identity protection is central to the defence of any enterprise’s infrastructure. Organisations must take decisive action to control access and protect data in order to outmanoeuvre adversaries.”