The Recycler
  • Biuromax Masthead web banner March 2024
  • G&G Masthead August 2024
  • Katun Masthead Nov 2024
  • Ambiente 2025 Masthead

Cyber-attacks: Is it your fault?

September 30, 2019

Proofpoint’s annual Human Factor report shares details of top cybercriminal trends and reveals that more than 99 Percent of cyber-attacks need humans to click.

Proofpoint, Inc., a cybersecurity and compliance company, announced its annual Human Factor report findings, which highlight the ways in which cybercriminals target people, rather than systems and infrastructure, to install malware, initiate fraudulent transactions, steal data, and more.

The report, based on an 18-month analysis of data collected across Proofpoint’s global customer base, spotlights attack trends to help organisations and users stay safe.

“Cybercriminals are aggressively targeting people because sending fraudulent emails, stealing credentials, and uploading malicious attachments to cloud applications is easier and far more profitable than creating an expensive, time-consuming exploit that has a high probability of failure,” said Kevin Epstein, Vice President of Threat Operations for Proofpoint. “More than 99 percent of cyberattacks rely on human interaction to work—making individual users the last line of defence. To significantly reduce risk, organisations need a holistic people-centric cybersecurity approach that includes effective security awareness training and layered defences that provide visibility into their most attacked users.”

The report findings include:

  • More than 99 percent of threats observed required human interaction to execute – enabling a macro, opening a file, following a link, or opening a document – signifying the importance of social engineering to enable successful attacks.
  • Microsoft lures remain a staple. Nearly one in four phishing emails sent in 2018 were associated with Microsoft products. 2019 saw a shift towards cloud storage, DocuSign, and Microsoft cloud service phishing in terms of effectiveness. The top phishing lures were focused on credential theft, creating feedback loops that potentially inform future attacks, lateral movement, internal phishing, and more.
  • Threat actors are refining their tools and techniques in search of financial gain and information theft. While one-to-one attacks and one-to-many attacks were more common when impostor attacks first began to emerge, threat actors are finding success in attacks using more than five identities against more than five individuals in targeted organisations.
  • The top malware families over the past 18 months have consistently included banking Trojans, information stealers, RATs, and other non-destructive strains designed to remain resident on infected devices and continuously steal data that can potentially provide future utility to threat actors.

Categories : Around the Industry

Tags : Business Cybersecurity Security

  • Cartridge Web Nov Web Banner
  • TN Core Nov Web advert
  • G&G web advert October 2024
  • Apex Web ad Nov 2024
  • Ink Tank No Web advert
  • IR Italiana Web ad January 2021
  • Biuromax Nov 2024 Web Ad
  • GM Technology Nov Web Ad
  • Static Control June 2022 Big & Bold Ad
  • denner UK Web Banner Jul 2024
  • ITP Web ad January 2021
  • PCL Nov Web advert
  • Mito Web banner June 2024
  • Zhono Web ad March 2024
  • HYB Web banner Jan 2024
  • Denner Feb 2024 Web Ad
  • CET Web ad December 2023
  • PCL Nov Web advert
  • Zhono Web ad March 2024
  • ITP Web ad January 2021
  • Mito Web banner June 2024
  • denner UK Web Banner Jul 2024
  • HYB Web banner Jan 2024
  • Denner Feb 2024 Web Ad
  • CET Web ad December 2023
  • HYB Web banner Jan 2024
  • ITP Web ad January 2021
  • Mito Web banner June 2024
  • PCL Nov Web advert
  • Zhono Web ad March 2024
  • denner UK Web Banner Jul 2024
  • CET Web ad December 2023
  • Denner Feb 2024 Web Ad

The Recycler, Wittas House, Two Rivers, Station Lane, Witney, OX28 4BH, United Kingdom | Tel: +44 (0) 1993 899800 | Fax : +44 (0) 1993 226899
©2006-2023 The Recycler - Terms & Conditions - Privacy Policy including cookie use

Web design Dorset | Websites by Mark