Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

09:35 AM
Jeffrey Burt
Jeffrey Burt
Jeffrey Burt

Carbon Black: Cyber Attacks Could Jump 60% During Holidays

Spear-phishing campaigns are the most common form of attack as shoppers go to the stores and online and employees hit the road, according to a survey from Carbon Black.

Companies can expect as much as a 60% percent increase in cyber attacks as this year's holiday shopping season gets underway, according to researchers with Carbon Black's Threat Analysis Unit.

In a report released on Cyber Monday, the "Carbon Black Holiday Threat Report," the researchers noted that the number of attacks jumped 57.5% from 2016 to 2017, and businesses can expect a similar jump this year, with many of attacks coming through spear-phishing campaigns that take advantage of commodity malware. Attacks in recent years targeting top-tier retailers -- and often through supply chain partners -- have led to the stealing of millions of customer records and credit card numbers, with companies having to pay the costs of major breaches.

(Source: iStock)
(Source: iStock)

"During the holiday season, there is often a ton of noise in the online world and attackers do everything they can to take advantage of that," Tom Kellermann, chief cybersecurity officer at Carbon Black, wrote in the report. "This applies not only to consumers who shop online, but also to businesses as well, many of which are understaffed and, in the case of retailers, approaching the busiest time of the year."

The holiday season, which essentially kicks off with Thanksgiving, is a focus of both cybersecurity vendors and the cybercriminals that are trying to take advantage of the huge increase of online and in-store shopping that occurs during the relatively short amount of time as well as the travel that happens both for Thanksgiving as well as Christmas. (See Employees Traveling This Holiday? Don't Forget Good Security Practices.)

In their report, the Carbon Black researchers said that after Thanksgiving, cybersecurity alerts last year jumped on both Black Friday -- the day after Thanksgiving -- and Cyber Monday, the first Monday after the holiday. That said, the highest spike in activity came in the days after Christmas, when consumers are out in the stores or online taking advantage of post-holiday shopping deals.

(Source: Carbon Black)\r\n
(Source: Carbon Black)\r\n

In an email to Security Now, Kellermann wrote there are multiple reasons for the sharp rise in cybercrime activity around the holiday season beyond the amount of money exchanging hands.

"Cybercriminals are always evolving," he said. "When it comes to increased cybercrime around the holidays, a number of factors are at play. For one, with attack kits readily and cheaply available on the dark web, the barrier to entry has never been lower. As a result, there are more criminals looking to make a quick buck. Second, criminals' attack arsenal is expanding. Yes, spear phishing attacks continue to be successful, but attackers are refining their craft by incorporating AI [artificial intelligence], using watering holes and targeting mobile applications."

As mentioned, spear-phishing campaigns remain the most common forms of attacks. That includes not only attacks on supply chain partners, but employees who travel for the holidays often take work with them, making them targets for spear-phishing efforts that promise such enticements as low airfares and deals on gift cards. Gift cards seem to be a particularly attractive avenue for cybercriminals even outside of the holiday season, as researchers at Kaspersky Lab noted in a report this summer. (See Kaspersky: There's No Such Thing as a Free Gift Card Code.)

Threat actors also will use fake package tracking emails as a way of getting users to expose their systems to malware, according to Carbon Black. Users who are excited about getting a holiday package may miss something simple in the email, such as having the email domain read "afedex.com" rather than "fedex.com."

The researchers also noted that many companies that aren't the size of an Amazon or Microsoft may be further hindered by being understaffed, particularly with people taking time off during the holidays. Given that, executives need to create a culture throughout their companies where employees are well aware of cybersecurity and Internet safety. In the case of spear-phishing emails, it means being diligent in examining emails for such tell-tale signs as poor grammar, misspelled words and unorthodox URLs as well as ensuring that the sender is someone they know and that the sender's email is legitimate.

It also means determining the motivation for the email, such as being skeptical of requests for personal or financial information, "especially in business settings where attackers are keen to use spoofed emails from executives to target lower-level employees," the Carbon Black analysts wrote. In addition, being cautious about attachments -- particularly from unknown individuals -- is key, they wrote.

"At Carbon Black, we like to say we have cybersecurity in our DNA," Kellermann told Security Now. "That's not always the case, though, for a mid-level accounting firm or, say, a hospital that's had limited exposure to cyber risk. If there is a silver lining to the slew of attacks we read about in the news, it's that awareness of cybersecurity issues has never been higher. For many organizations, this is seeping into their culture. Business leaders are seeing the profound effect a breach can have and they are driving awareness campaigns and mandatory education for employees. These programs are probably not as ubiquitous as we'd like but I think we're making good progress. A little education can go a long way."

Related posts:

— Jeffrey Burt is a long-time tech journalist whose work has appeared in such publications as eWEEK, The Next Platform and Channelnomics.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Data Breaches Affect the Enterprise
Data breaches continue to cause negative outcomes for companies worldwide. However, many organizations report that major impacts have declined significantly compared with a year ago, suggesting that many have gotten better at containing breach fallout. Download Dark Reading's Report "How Data Breaches Affect the Enterprise" to delve more into this timely topic.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-11-29
A vulnerability found in udisks2. This flaw allows an attacker to input a specially crafted image file/USB leading to kernel panic. The highest threat from this vulnerability is to system availability.
PUBLISHED: 2021-11-29
Some Huawei products use the OpenHpi software for hardware management. A function that parses data returned by OpenHpi contains an out-of-bounds read vulnerability that could lead to a denial of service. Affected product versions include: eCNS280_TD V100R005C10; eSE620X vESS V100R001C10SPC200, V100R...
PUBLISHED: 2021-11-29
An unspecified version of tripexpress is affected by a path manipulation vulnerability in file system/helpers/dompdf/load_font.php. The variable src is coming from $_SERVER["argv"] then there is a path manipulation vulnerability.
PUBLISHED: 2021-11-29
An unspecified version of youtube-php-mirroring is affected by a Cross Site Scripting (XSS) vulnerability in file ytproxy/index.php.
PUBLISHED: 2021-11-29
vesta 0.9.8-24 is affected by a file inclusion vulnerability in file web/add/user/index.php.