Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

09:35 AM
Jeffrey Burt
Jeffrey Burt
Jeffrey Burt

Carbon Black: Cyber Attacks Could Jump 60% During Holidays

Spear-phishing campaigns are the most common form of attack as shoppers go to the stores and online and employees hit the road, according to a survey from Carbon Black.

Companies can expect as much as a 60% percent increase in cyber attacks as this year's holiday shopping season gets underway, according to researchers with Carbon Black's Threat Analysis Unit.

In a report released on Cyber Monday, the "Carbon Black Holiday Threat Report," the researchers noted that the number of attacks jumped 57.5% from 2016 to 2017, and businesses can expect a similar jump this year, with many of attacks coming through spear-phishing campaigns that take advantage of commodity malware. Attacks in recent years targeting top-tier retailers -- and often through supply chain partners -- have led to the stealing of millions of customer records and credit card numbers, with companies having to pay the costs of major breaches.

"During the holiday season, there is often a ton of noise in the online world and attackers do everything they can to take advantage of that," Tom Kellermann, chief cybersecurity officer at Carbon Black, wrote in the report. "This applies not only to consumers who shop online, but also to businesses as well, many of which are understaffed and, in the case of retailers, approaching the busiest time of the year."

The holiday season, which essentially kicks off with Thanksgiving, is a focus of both cybersecurity vendors and the cybercriminals that are trying to take advantage of the huge increase of online and in-store shopping that occurs during the relatively short amount of time as well as the travel that happens both for Thanksgiving as well as Christmas. (See Employees Traveling This Holiday? Don't Forget Good Security Practices.)

In their report, the Carbon Black researchers said that after Thanksgiving, cybersecurity alerts last year jumped on both Black Friday -- the day after Thanksgiving -- and Cyber Monday, the first Monday after the holiday. That said, the highest spike in activity came in the days after Christmas, when consumers are out in the stores or online taking advantage of post-holiday shopping deals.

In an email to Security Now, Kellermann wrote there are multiple reasons for the sharp rise in cybercrime activity around the holiday season beyond the amount of money exchanging hands.

"Cybercriminals are always evolving," he said. "When it comes to increased cybercrime around the holidays, a number of factors are at play. For one, with attack kits readily and cheaply available on the dark web, the barrier to entry has never been lower. As a result, there are more criminals looking to make a quick buck. Second, criminals' attack arsenal is expanding. Yes, spear phishing attacks continue to be successful, but attackers are refining their craft by incorporating AI [artificial intelligence], using watering holes and targeting mobile applications."

As mentioned, spear-phishing campaigns remain the most common forms of attacks. That includes not only attacks on supply chain partners, but employees who travel for the holidays often take work with them, making them targets for spear-phishing efforts that promise such enticements as low airfares and deals on gift cards. Gift cards seem to be a particularly attractive avenue for cybercriminals even outside of the holiday season, as researchers at Kaspersky Lab noted in a report this summer. (See Kaspersky: There's No Such Thing as a Free Gift Card Code.)

Threat actors also will use fake package tracking emails as a way of getting users to expose their systems to malware, according to Carbon Black. Users who are excited about getting a holiday package may miss something simple in the email, such as having the email domain read "afedex.com" rather than "fedex.com."

The researchers also noted that many companies that aren't the size of an Amazon or Microsoft may be further hindered by being understaffed, particularly with people taking time off during the holidays. Given that, executives need to create a culture throughout their companies where employees are well aware of cybersecurity and Internet safety. In the case of spear-phishing emails, it means being diligent in examining emails for such tell-tale signs as poor grammar, misspelled words and unorthodox URLs as well as ensuring that the sender is someone they know and that the sender's email is legitimate.

It also means determining the motivation for the email, such as being skeptical of requests for personal or financial information, "especially in business settings where attackers are keen to use spoofed emails from executives to target lower-level employees," the Carbon Black analysts wrote. In addition, being cautious about attachments -- particularly from unknown individuals -- is key, they wrote.

"At Carbon Black, we like to say we have cybersecurity in our DNA," Kellermann told Security Now. "That's not always the case, though, for a mid-level accounting firm or, say, a hospital that's had limited exposure to cyber risk. If there is a silver lining to the slew of attacks we read about in the news, it's that awareness of cybersecurity issues has never been higher. For many organizations, this is seeping into their culture. Business leaders are seeing the profound effect a breach can have and they are driving awareness campaigns and mandatory education for employees. These programs are probably not as ubiquitous as we'd like but I think we're making good progress. A little education can go a long way."

Related posts:

— Jeffrey Burt is a long-time tech journalist whose work has appeared in such publications as eWEEK, The Next Platform and Channelnomics.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Lock-Pickers Face an Uncertain Future Online
Seth Rosenblatt, Contributing Writer,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-12
A local, arbitrary code execution vulnerability exists in the SplitCompat.install endpoint in Android's Play Core Library versions prior to 1.7.2. A malicious attacker could create an apk which targets a specific application, and if a victim were to install this apk, the attacker could perform a dir...
PUBLISHED: 2020-08-11
A Cross-Site Request Forgery (CSRF) vulnerability was discovered in the System Management Interface Web component of Avaya Aura Communication Manager and Avaya Aura Messaging. This vulnerability could allow an unauthenticated remote attacker to perform Web administration actions with the privileged ...
PUBLISHED: 2020-08-11
An issue was discovered in certain configurations of GNOME gnome-shell through 3.36.4. When logging out of an account, the password box from the login dialog reappears with the password still visible. If the user had decided to have the password shown in cleartext at login time, it is then visible f...
PUBLISHED: 2020-08-11
django-celery-results through 1.2.1 stores task results in the database. Among the data it stores are the variables passed into the tasks. The variables may contain sensitive cleartext information that does not belong unencrypted in the database.
PUBLISHED: 2020-08-11
There is a possible out of bounds read due to an incorrect bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-152225183