Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Breaches increase 4-fold in Europe because of Hackers targeting home remote-workers

Breaches increase 4-fold in Europe because of Hackers targeting home remote-workers

A report has shown that the Coronavirus lock-down has now caused hackers to target newly remote workers as a way into corporate networks.

The Coronavirus lock-down has now seen the total number of compromised organisations across Europe & the US nearly to quadruple, as more & more employees begin to work from their homes.

Finland

Figures released by Arctic Security, which is based in Finland, show a stark increase in compromised networks by nearly 300% in 9 European countries, & also in the US. This totally reflects the timing of the ‘stay at home’ orders & the newly remote working workforce.

It was discovered that the number of compromised networks was under 4,000 in Jan. but then it increased to over 12,000 by Mar. Italy, it seems, had the largest number of compromised networks in Jan. & February, but this was later totally overtaken by the UK in Mar. because the lock-down came into force there.

Team Cymru

Arctic used the network-level data that came from the US-based ‘Team Cymru’ in order to produce this study, & said that the increases have obviously taken place, in part, because of the increase in staff remotely working, & using VPNs in order to connect with their own organisations’ networks.

“One cannot say with certainty what causes organisations to get compromised while most workers are working from home. However, it seems that the connections normally blocked by on-premises security solutions do not work as well, when people are using a VPN to connect into their employers’ networks. When employees are in the office, it seems as though the corporate firewalls function like dams blocking malware-infected machines trying to connect out to the Internet either for command & control or to further compromise other vulnerable machines on the Internet,” the report went on to say.

Digging a Ditch

“However, when you rely on a VPN, it’s like digging a ditch to the side of that dam,” cautioned Lari Huttunen, who is a Senior Analyst at Arctic Security.

Faiz Shuja, Co-Founder\CEO SIRP Labs explained that, to carry the analogy further, as the ‘tsunami’ of security threats increases, new tools will then be needed in order to manage the fast-rising volume of alert data.

SOAR

“Many SOC teams rely on Security Orchestration and Response (SOAR) platforms to provide them with actionable information. However, these tools often fall short by failing to incorporate sufficient threat intelligence & context tied to the organisation’s risk. What they are asking for is something that gives them a clear view of the nature and severity of alerts. Helped by this intelligence they are then better able to make informed decisions about incident response priorities,” he further explained.

Graphs

Martin Jartelius, who is Chief Security Officer at Outpost24, observed that looking at the graphs & what they are actually indicating here is important. Scanning\looking around, has now increased. So, the number of individuals or systems engaged in research, or in checking for targets, has increased. The potential reason for this being that the time now available for amateur security-interested individuals has now itself increased.

Botnets

“If we look at units connected to botnets or to known commands and controls & what we actually see is a decrease from Feb. to March. There is more looking but not more hacking, to rephrase. The graph is a tad hard to determine with regard to exploitation, & whether this was successful or not, but based on no increase in C&C and botnet activity this does not look to indicate massive exploitation. The data of course is interesting, if nothing else it is a clear indication that a long-term financial crisis following the current pandemic can result in opening a cyber ‘Pandora’s Box’ as more skilled individuals lose meaningful employment,” he further outlined.

Both interesting & worrying trends.

 

SHARE ARTICLE