Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

09:35 AM
Jeffrey Burt
Jeffrey Burt
Jeffrey Burt

Carbon Black: Cyber Attacks Could Jump 60% During Holidays

Spear-phishing campaigns are the most common form of attack as shoppers go to the stores and online and employees hit the road, according to a survey from Carbon Black.

Companies can expect as much as a 60% percent increase in cyber attacks as this year's holiday shopping season gets underway, according to researchers with Carbon Black's Threat Analysis Unit.

In a report released on Cyber Monday, the "Carbon Black Holiday Threat Report," the researchers noted that the number of attacks jumped 57.5% from 2016 to 2017, and businesses can expect a similar jump this year, with many of attacks coming through spear-phishing campaigns that take advantage of commodity malware. Attacks in recent years targeting top-tier retailers -- and often through supply chain partners -- have led to the stealing of millions of customer records and credit card numbers, with companies having to pay the costs of major breaches.

(Source: iStock)
(Source: iStock)

"During the holiday season, there is often a ton of noise in the online world and attackers do everything they can to take advantage of that," Tom Kellermann, chief cybersecurity officer at Carbon Black, wrote in the report. "This applies not only to consumers who shop online, but also to businesses as well, many of which are understaffed and, in the case of retailers, approaching the busiest time of the year."

The holiday season, which essentially kicks off with Thanksgiving, is a focus of both cybersecurity vendors and the cybercriminals that are trying to take advantage of the huge increase of online and in-store shopping that occurs during the relatively short amount of time as well as the travel that happens both for Thanksgiving as well as Christmas. (See Employees Traveling This Holiday? Don't Forget Good Security Practices.)

In their report, the Carbon Black researchers said that after Thanksgiving, cybersecurity alerts last year jumped on both Black Friday -- the day after Thanksgiving -- and Cyber Monday, the first Monday after the holiday. That said, the highest spike in activity came in the days after Christmas, when consumers are out in the stores or online taking advantage of post-holiday shopping deals.

(Source: Carbon Black)\r\n
(Source: Carbon Black)\r\n

In an email to Security Now, Kellermann wrote there are multiple reasons for the sharp rise in cybercrime activity around the holiday season beyond the amount of money exchanging hands.

"Cybercriminals are always evolving," he said. "When it comes to increased cybercrime around the holidays, a number of factors are at play. For one, with attack kits readily and cheaply available on the dark web, the barrier to entry has never been lower. As a result, there are more criminals looking to make a quick buck. Second, criminals' attack arsenal is expanding. Yes, spear phishing attacks continue to be successful, but attackers are refining their craft by incorporating AI [artificial intelligence], using watering holes and targeting mobile applications."

As mentioned, spear-phishing campaigns remain the most common forms of attacks. That includes not only attacks on supply chain partners, but employees who travel for the holidays often take work with them, making them targets for spear-phishing efforts that promise such enticements as low airfares and deals on gift cards. Gift cards seem to be a particularly attractive avenue for cybercriminals even outside of the holiday season, as researchers at Kaspersky Lab noted in a report this summer. (See Kaspersky: There's No Such Thing as a Free Gift Card Code.)

Threat actors also will use fake package tracking emails as a way of getting users to expose their systems to malware, according to Carbon Black. Users who are excited about getting a holiday package may miss something simple in the email, such as having the email domain read "afedex.com" rather than "fedex.com."

The researchers also noted that many companies that aren't the size of an Amazon or Microsoft may be further hindered by being understaffed, particularly with people taking time off during the holidays. Given that, executives need to create a culture throughout their companies where employees are well aware of cybersecurity and Internet safety. In the case of spear-phishing emails, it means being diligent in examining emails for such tell-tale signs as poor grammar, misspelled words and unorthodox URLs as well as ensuring that the sender is someone they know and that the sender's email is legitimate.

It also means determining the motivation for the email, such as being skeptical of requests for personal or financial information, "especially in business settings where attackers are keen to use spoofed emails from executives to target lower-level employees," the Carbon Black analysts wrote. In addition, being cautious about attachments -- particularly from unknown individuals -- is key, they wrote.

"At Carbon Black, we like to say we have cybersecurity in our DNA," Kellermann told Security Now. "That's not always the case, though, for a mid-level accounting firm or, say, a hospital that's had limited exposure to cyber risk. If there is a silver lining to the slew of attacks we read about in the news, it's that awareness of cybersecurity issues has never been higher. For many organizations, this is seeping into their culture. Business leaders are seeing the profound effect a breach can have and they are driving awareness campaigns and mandatory education for employees. These programs are probably not as ubiquitous as we'd like but I think we're making good progress. A little education can go a long way."

Related posts:

— Jeffrey Burt is a long-time tech journalist whose work has appeared in such publications as eWEEK, The Next Platform and Channelnomics.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-11
In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)
PUBLISHED: 2021-05-11
A flaw was found in the hivex library in versions before 1.3.20. It is caused due to a lack of bounds check within the hivex_open function. An attacker could input a specially crafted Windows Registry (hive) file which would cause hivex to read memory beyond its normal bounds or cause the program to...
PUBLISHED: 2021-05-11
A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick. The highest threat from this vulnerability is to ...
PUBLISHED: 2021-05-11
A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero ConvertXYZToJzazbz() of MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. The highest threat from this...
PUBLISHED: 2021-05-11
A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero in sRGBTransformImage() in the MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker processed by an application using ImageMagick. The highest threat from t...