Study: Cyber ​​Attackers Most Active During Holiday Season

Share post

As a Barracuda analysis shows, the severity of security threats increases during the holiday season from cyber attackers. One in five cyber threats between June and September 2022 presented an increased risk, compared to just one in 80 in January of the year.

The latest threat intelligence, coming from Barracuda's XDR platform and 24/7 Security Operations Center, shows how threat severity has evolved in 2022. In January 2022, only about 1,25 percent of threat alerts were serious enough to warrant a security alert to the customer.

June to September more potential dangers

🔎 Security threats increased during the holiday season (Image: BarracudaMSP).

However, of the alerts analyzed by Barracuda threat researchers between June and September, 20 percent were severe enough to alert the customer to the potential threat and prompt them to take corrective action.

The three most detected threats between June and September:

1. Successful login to Microsoft 365 from a suspicious country – “high risk”

These types of attacks accounted for 40 percent of all threats analyzed between June and September. Countries that trigger an automatic security alert include Russia, China, Iran and Nigeria. "High risk" threats are events that have the potential to cause severe damage to the customer environment and require immediate action. A successful intrusion into a Microsoft 365 account is particularly risky as it gives an attacker potential access to any networked and integrated resources that the attack target has stored on the platform.

2. Communication to an IP address known to threat intelligence - "medium risk"

This type of attack, which accounted for 15 percent of all attacks, involves any attempt at malicious communication from a device on the network to a website or a known command and control server and similar. A "moderate risk" requires remedial action, but as a single event does not usually result in a significant impact.

3. Brute-force authentication attempt by the user – “medium risk”

🔎 In the summer months alone, almost 500.000 alarms were analyzed (Image: BarracudaMSP).

These automated attacks, which accounted for 10 percent of all attacks, attempt to penetrate an organization's defenses simply by trying as many name/password combinations as possible.

Cyber ​​attackers target companies and IT security teams when resources may not be available, such as on weekends, overnight, or during holiday periods. The analysis results above show that companies should plan for this in their security strategy for upcoming holiday seasons.

To counter this risk, companies should take the following security measures

  • Enable multi-factor authentication (MFA) for all applications and systems.
  • Ensuring that all critical systems are backed up.
  • Implementing a robust security solution that includes email protection and endpoint detection and response (EDR).
  • Visibility across the entire IT infrastructure.
  • A XNUMX/XNUMX Security Operations Center (SOC) to monitor, detect and respond to cyber threats, either in-house or through a trusted service provider.

 

More at BarracudaMSP.com

 


About Barracuda MSP

To thrive in today's ever-evolving cyber threat landscape, managed service providers must run their business as a security-centric enterprise. Barracuda MSP enables IT managed service providers to easily scale their business with a combination of multi-layered security and data protection solutions, award-winning support, and MSP-friendly prices. Barracuda MSP's industry-leading IT security solutions are trusted by nearly 5.000 IT service providers worldwide.


 

Matching articles on the topic

Sophisticated Phishing-as-a-Service (PhaaS) platform

Security researchers have uncovered a sophisticated Phishing-as-a-Service (PhaaS) platform that poses a serious threat to organizations around the world. The threat actor ➡ Read more

PDFs: The Trojan Horses of Hackers

Cybercriminals are increasingly using the popular PDF file format to hide malicious code. Recent IT forensics findings underscore this: 68 ➡ Read more

Maximum IT security for OT systems

OT systems are rarely attacked directly. However, gaps and vulnerabilities in traditional IT make OT systems more vulnerable to attacks. ➡ Read more

IT resilience: cybersecurity at the storage level

More data security features for greater IT resilience at the storage level: Cyber ​​security managers can pursue a proactive data security approach at the storage level with highly secure NetApp storage and thus ➡ Read more

Algorithms for post-quantum cryptography

A provider of IT security solutions introduces Quantum Protect, a post-quantum cryptography application suite for its u.trust General Purpose Hardware Security Modules (HSMs) ➡ Read more

Power grid threat: security gaps in solar systems

A cybersecurity solutions provider published its research report “SUN:DOWN – Destabilizing the Grid via Orchestrated Exploitation of Solar Power Systems”, which ➡ Read more

Cloud and SaaS security is inadequate

A recent study shows that companies' security strategies are failing to keep pace with the rapid adoption of cloud-native technologies. 28 ➡ Read more

OT environments: Detect and assess threats

Enterprises with limited resources can identify, assess, and make informed decisions about threats in OT environments with a comprehensive endpoint protection solution. ➡ Read more