97% of businesses targeted by email-based phishing attacks in past year

Nearly all businesses (97%) have been targeted by email-based phishing attacks in the past year and two-thirds have suffered a ransomware attack – that’s according to a stark new report by leading cybersecurity provider, Mimecast, which has revealed the scale of the cybersecurity threat facing businesses today.

  • 10 months ago Posted in

Mimecast’s Q3 2023 threat intelligence taken from analysis of more than a billion emails per day on behalf of more than 42,000 customers, as well as external intelligence from the cyber community at large. Because email is the channel through which most cyber threats launch, Mimecast sees many new threats before they become widely known.

Mimecast’s Q3 Threat Intelligence report reveals:

• The number of impersonation attempts and malicious links sent to each user increased by double digits — 12% and 22% respectively. Impersonation attacks have become more sophisticated and opportunistic.

• Impersonation attacks are a key tactic of state-linked groups seeking to establish initial access into targeted networks, and the cyber component of Russia’s invasion of Ukraine likely contributed to the increase in impersonation attacks.

• Medium-sized companies specifically have seen an uptick in threats per user in the third quarter, as attackers see mid-sized companies as a profitable combination of vulnerability and potential cash value.

• Several cybercriminal groups made notable strategic shifts in the quarter.

• Ransomware group CI0p used the previously undisclosed threat of the MOVEit managed file-transfer platform to compromise hundreds of businesses. With many of the victims providing services to client organisations, the impact of data breaches led to more than 2,300 organisations being affected.

• Human resource firms, information technology software and services, and financial services (especially banking)

• The vast majority (76%) of security teams at organizations worldwide expect to have an attack with serious consequences using email as a vector.

• Attackers are moving faster than platforms. The Known Exploited Vulnerabilities (KEV) Catalog, for example, documents which vulnerabilities attackers have already exploited, with 188 vulnerabilities from 2021, 120 from 2022, and 78 from 2023 exploited by attackers to date. Only a handful of vulnerabilities, however, account for most email attacks, making threat intelligence a key to knowing which exploits are most common and to helping harden the network and users against them.

• Attackers are increasingly using major providers’ cloud services to launch attacks, with an increasing amount of spam and phishing coming from public domains, such as gmail.com and outlook.com. Mimecast blocks thousands of malicious email messages targeting Microsoft 365 accounts every day utilizing their own services, such as Microsoft Dynamics 365 Customer Voice.

• Collaboration platforms like Microsoft Teams and Slack also seeing increase in attacks.

Internal security operations teams work smarter, not harder with cybersecurity automation that...
ESET has published its Threat Report for the first half of 2024, providing new insights into the...
Approximately 80% of businesses are confident in adhering to NIS2, yet 66% will miss the compliance...
Providing clients with integrated AI-powered cybersecurity solutions and insights to help enhance...
Companies say they’re prioritizing cybersecurity, but lags in skills development, financial...
The new release deploys advanced AI for fast and accurate application discovery, provides clear...
Adversaries are taking advantage of weak security fundamentals and a lack of countermeasures to...
The technique leverages quantum properties of light to guarantee security while preserving the...