Darktrace released three
new cyber-threat trend reports revealing 2022 attack data observed across its
global customer fleet. The industry reports pertain to the energy, healthcare,
and retail sectors respectively.
"These
industry-specific reports are the first of their kind released by Darktrace,
representing an important effort to surface the data underpinning the rapidly
evolving threat landscape that we are defending against," commented Toby Lewis,
Global Head of Threat Analysis, Darktrace.
"The
trends reveal crucial sector-specific challenges, from the tendency for hackers
to siphon off the energy sector's resources in the form of crypto-jacking,
through to the invaluable nature of patient data which leads to data
exfiltration in the healthcare sector," commented Lewis. "The surge in
credential-based attacks across the retail sector reflects the fact that
identity theft will be a key trend for 2023, increasing the need for AI-based
behavioral analytics for understanding employee actions in rich context and
authenticating the actions taken using certain credentials."
Energy Sector: Key Findings
Against
the backdrop of a global energy crisis, Darktrace's energy sector report
reveals that illegal crypto-mining threats, whereby bad actors steal energy and
processing power from other devices and networks, are on the rise across the
industry. Notable findings include:
-
High-priority crypto-mining
accounted for 13 times more of all observed cyber incidents in the U.K. energy
sector in 2022 compared to 2021
-
High-priority crypto-mining
accounted for 3 times more of all observed cyber incidents in the U.S. energy
sector in 2022 compared to 2021
The
report divulges two real-world crypto-mining threat finds from a European and
U.S. energy organization respectively, which were both stopped by Darktrace's
AI technology. In the former case, attackers were caught attempting to mass
pool crypto-mining capabilities using 5 internal servers at the organization.
Retail Sector: Key Findings
As
online shopping remains popular, Darktrace's retail sector report reveals that
over the course of 2022, criminals increasingly turned toward credential theft,
spoofing and stuffing to target this multi-billion-dollar industry's online
infrastructure. Notably:
-
Credential theft, spoofing and
stuffing accounted for over 170% more of all observed cyber incidents in the
U.S. retail sector in 2022 compared to 2021
-
Credential theft, spoofing and
stuffing accounted for over 14% more of all observed cyber incidents in the
U.K. retail sector in 2022 compared to 2021
-
Credential theft, spoofing and
stuffing accounted for over 70% more of all observed cyber incidents in the
Australian retail sector in 2022 compared to 2021
One
threat find in the report from August 2022 details the discovery of a
never-before-seen attack tool lying dormant inside a well-known U.K. automotive
retailer. Months before Darktrace had been adopted by the retailer, one of its
devices had become infected with novel malware that lay dormant, establishing a
foothold and waiting for the right time to launch an attack. After deployment,
Darktrace AI caught the malware when it made multiple authentication attempts
using spoofed credentials for one of the organization's security managers. If
successful, the attack could have undermined the organization's entire security
posture, allowing malicious software to gain control of the company's
infrastructure from within.
Healthcare Sector: Key
Findings
Often
viewed as a ‘soft target' for cyber-criminals, hospitals and other healthcare
organizations are extremely rich data sources from which attackers can make a
profit by selling patient information such as medical records, credit cards or
banking details. Darktrace's healthcare report notably revealed:
-
Data exfiltration was one of the top
3 observed threats faced by healthcare providers globally, with organizations
in the U.K. and Australia suffering an increased volume in 2022
-
The most common attack type observed
across healthcare globally in 2022 was suspicious network scanning, a form of
intelligence gathering which often constitutes the initial phase of a
cyber-attack
The
report details a real-world sophisticated threat faced by a U.S. healthcare
provider in which a malicious PowerShell script was discovered to be deployed
on one of the organization's internal servers, an attempt to give bad actors
remote control over the target network. The threat was autonomously thwarted by
Darktrace's RESPOND technology before attackers could do harm.