Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

11/26/2018
09:35 AM
Jeffrey Burt
Jeffrey Burt
Jeffrey Burt
50%
50%

Carbon Black: Cyber Attacks Could Jump 60% During Holidays

Spear-phishing campaigns are the most common form of attack as shoppers go to the stores and online and employees hit the road, according to a survey from Carbon Black.

Companies can expect as much as a 60% percent increase in cyber attacks as this year's holiday shopping season gets underway, according to researchers with Carbon Black's Threat Analysis Unit.

In a report released on Cyber Monday, the "Carbon Black Holiday Threat Report," the researchers noted that the number of attacks jumped 57.5% from 2016 to 2017, and businesses can expect a similar jump this year, with many of attacks coming through spear-phishing campaigns that take advantage of commodity malware. Attacks in recent years targeting top-tier retailers -- and often through supply chain partners -- have led to the stealing of millions of customer records and credit card numbers, with companies having to pay the costs of major breaches.

"During the holiday season, there is often a ton of noise in the online world and attackers do everything they can to take advantage of that," Tom Kellermann, chief cybersecurity officer at Carbon Black, wrote in the report. "This applies not only to consumers who shop online, but also to businesses as well, many of which are understaffed and, in the case of retailers, approaching the busiest time of the year."

The holiday season, which essentially kicks off with Thanksgiving, is a focus of both cybersecurity vendors and the cybercriminals that are trying to take advantage of the huge increase of online and in-store shopping that occurs during the relatively short amount of time as well as the travel that happens both for Thanksgiving as well as Christmas. (See Employees Traveling This Holiday? Don't Forget Good Security Practices.)

In their report, the Carbon Black researchers said that after Thanksgiving, cybersecurity alerts last year jumped on both Black Friday -- the day after Thanksgiving -- and Cyber Monday, the first Monday after the holiday. That said, the highest spike in activity came in the days after Christmas, when consumers are out in the stores or online taking advantage of post-holiday shopping deals.

In an email to Security Now, Kellermann wrote there are multiple reasons for the sharp rise in cybercrime activity around the holiday season beyond the amount of money exchanging hands.

"Cybercriminals are always evolving," he said. "When it comes to increased cybercrime around the holidays, a number of factors are at play. For one, with attack kits readily and cheaply available on the dark web, the barrier to entry has never been lower. As a result, there are more criminals looking to make a quick buck. Second, criminals' attack arsenal is expanding. Yes, spear phishing attacks continue to be successful, but attackers are refining their craft by incorporating AI [artificial intelligence], using watering holes and targeting mobile applications."

As mentioned, spear-phishing campaigns remain the most common forms of attacks. That includes not only attacks on supply chain partners, but employees who travel for the holidays often take work with them, making them targets for spear-phishing efforts that promise such enticements as low airfares and deals on gift cards. Gift cards seem to be a particularly attractive avenue for cybercriminals even outside of the holiday season, as researchers at Kaspersky Lab noted in a report this summer. (See Kaspersky: There's No Such Thing as a Free Gift Card Code.)

Threat actors also will use fake package tracking emails as a way of getting users to expose their systems to malware, according to Carbon Black. Users who are excited about getting a holiday package may miss something simple in the email, such as having the email domain read "afedex.com" rather than "fedex.com."

The researchers also noted that many companies that aren't the size of an Amazon or Microsoft may be further hindered by being understaffed, particularly with people taking time off during the holidays. Given that, executives need to create a culture throughout their companies where employees are well aware of cybersecurity and Internet safety. In the case of spear-phishing emails, it means being diligent in examining emails for such tell-tale signs as poor grammar, misspelled words and unorthodox URLs as well as ensuring that the sender is someone they know and that the sender's email is legitimate.

It also means determining the motivation for the email, such as being skeptical of requests for personal or financial information, "especially in business settings where attackers are keen to use spoofed emails from executives to target lower-level employees," the Carbon Black analysts wrote. In addition, being cautious about attachments -- particularly from unknown individuals -- is key, they wrote.

"At Carbon Black, we like to say we have cybersecurity in our DNA," Kellermann told Security Now. "That's not always the case, though, for a mid-level accounting firm or, say, a hospital that's had limited exposure to cyber risk. If there is a silver lining to the slew of attacks we read about in the news, it's that awareness of cybersecurity issues has never been higher. For many organizations, this is seeping into their culture. Business leaders are seeing the profound effect a breach can have and they are driving awareness campaigns and mandatory education for employees. These programs are probably not as ubiquitous as we'd like but I think we're making good progress. A little education can go a long way."

Related posts:

— Jeffrey Burt is a long-time tech journalist whose work has appeared in such publications as eWEEK, The Next Platform and Channelnomics.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20934
PUBLISHED: 2020-11-28
An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.
CVE-2020-29368
PUBLISHED: 2020-11-28
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
CVE-2020-29369
PUBLISHED: 2020-11-28
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
CVE-2020-29370
PUBLISHED: 2020-11-28
An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
CVE-2020-29371
PUBLISHED: 2020-11-28
An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.