Virtualization Technology News and Information
Kaspersky finds one in 10 cybersecurity incidents investigated within organizations considered severe

According to anonymized metadata voluntarily provided by Kaspersky MDR customers, one-in-10 (9%) prevented cybersecurity incidents could cause major disruption or unauthorized access to the customer's assets. The vast majority of incidents (72%) were of medium severity meaning that if these threats had not been detected by the service, they would have affected the performance of the assets or could lead to single data misuse cases.

Cyberattacks are growing in complexity and employing evasive techniques to avoid detection by security solutions. Detection and prevention of such threats requires seasoned threat hunters who can spot suspicious actions before they cause damage to a company. Kaspersky analyzed anonymized customers' cases identified via the Kaspersky MDR service in Q4 2020 to see how widespread and severe resolved incidents were. 

The research revealed that almost every industry, with the exception of mass media and transportation, saw high severity incidents during the analyzed period. Most often critical incidents affected organizations from the public sector (41% of all high severity incidents were detected in this industry), IT (15%) and financial (13%) verticals.

Almost a third (30%) of these critical incidents were human-driven targeted attacks and nearly a quarter (23%) of high severity incidents were classified as high impact malware outbreaks, including ransomware. In 9% of cases, cybercriminals gained access to a company's IT infrastructure using social engineering techniques.

Kaspersky experts also noted that current APTs were typically detected together with artifacts of previous advanced attacks, suggesting that if an organization responds to a sophisticated threat, it's often attacked again and likely by the same actor. In addition, organizations experiencing APTs experts often discovered signs of simulation of adversarial behavior such as red teaming or an assessment of a company's operational security capabilities through a sophisticated attack simulation.

"Our study found that targeted attacks are rather common with more than one quarter (27%) of organizations facing them," comments Gleb Gritsai, head of security services at Kaspersky. "The good news is that organizations that are likely to experience such incidents know about this risk and are prepared for them. These organizations employ services that help them assess their defensive capabilities, such as red teaming, as well as seek help from experts who can stop criminals."

To protect your organization from APTs and other advanced attacks, Kaspersky recommends the following:

  • Dedicated services can help against high-profile threats. The Kaspersky Managed Detection and Response service can help identify and stop attacks in their early stages, before the attackers achieve their goal
  • Use a dedicated set for effective endpoint protection, threat detection and response products to timely detect and remediate even new and evasive threats. Kaspersky Optimum Framework includes the essential set of endpoint protection empowered with EDR and MDR.

  • Provide your SOC team with access to the latest threat intelligence and regularly upskill them with professional training.

  • Provide your staff with basic cybersecurity hygiene training, as many targeted attacks start with phishing or other social engineering techniques.

The full report is available at the following link.

Published Wednesday, July 21, 2021 9:07 AM by David Marshall
Filed under: ,
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
<July 2021>