Sticky Report

2022 BrightCloud® Threat Report: The year of innovation for cybercrime

  • 28 March 2022
  • 90 replies
  • 2919 views
2022 BrightCloud® Threat Report: The year of innovation for cybercrime
Userlevel 7
Badge +20
  • Sr. Security Analyst & Community Manager
  • 541 replies

Our latest BrightCloud®️ Threat Report is finally here! This year, our findings show us that cybercriminals are improving their efforts to evade detection. 2021 was the year where everything security-related that could go wrong did go wrong. We witnessed unprecedented attacks on the supply chain around the world. Despite American and Russian coordinated efforts to take down Emotet, REvil, and Conti, cybercriminals found avenues to resurrect themselves and carry out their lethal efforts.

The normalization of remote and hybrid work continued to shift the way bad actors pursue lucrative avenues for exploitation. We also witnessed cybercriminals strategically releasing their executed attacks during specific times of the year.

Our report is full of great insights. Some key findings include:

  • The Middle East, Asia, and Africa were the regions with the highest percentage of infections.
  • 53% of consumer PCs were infected more than once, and 19% infected more than 5 times.
  • Apple was most often impersonated company in phishing attacks.
  • Of all the places where malware could hide on business PCs, it uses %temp% more than half the time.

“With the introduction of Windows 11, bad actors won’t think twice about engaging in new and dangerous exploits that leverage new features not previously available.”

- Grayson Milbourne | Security Intelligence Director

  • During 2021, 82% of ransomware attacks targeted organizations with less than 1,000 employees. The smallest organizations, with 100 employees or less, comprised 44% of ransomware victims.
  • The year-end average for ransomware payments in 2021 more than doubled the 2020 average, hitting $322,168.

By combining layers, like inspecting all incoming emails, keeping PCs fully patched, using antivirus software and endpoint protection tools on all PCs and educating users on how to avoid phishing attacks and other forms of social engineering, you can make it less likely that attacks will succeed.

  • In 2021, we discovered over 4 million new high-risk URLs in 2021, almost 66% of them involved in phishing.
  • Bad actors like to time their phishing attacks. In the month of May alone, we witnessed a 770% increase in phishing activity.

To thwart these types of phishing attacks, users need to be trained to recognize shortened URLs and to find out where they redirect before clicking on them.

Last year was marked by innovation across the threat landscape. In this year’s full report, we delve into the developments affecting businesses large and small.

Download the report and discover for yourself our complete analysis and predictions powered by our BrightCloud®️ Threat Intelligence.

Be sure to sign up for our Webinar to learn more and win prizes

 


90 replies

I strongly agree with this part. With a layered approach and proper user training, it is possible to drastically reduce the chance of attacks being successful.

For me it was that the education/training of users is a constant requirement for any business wishing to limit these types of attacks.

Userlevel 7
Badge +4

You’re right there @MajorHavoc 

Userlevel 7
Badge +22

Why would people allow their machines to be infected with malware more then once? Some even 5 times (19%)? Unbelievable. They never learn…..

 

I’m not sure “allowed” is the right word here. Remember we have a more unique view of these issues. To some users, this is all black magic and have no cause and effect understanding of the issues. It’s our jobs to help educate people so they can learn to help prevent these infections. 

Userlevel 2
Badge +1

Why would people allow their machines to be infected with malware more then once? Some even 5 times (19%)? Unbelievable. They never learn…..

 

Userlevel 1
Badge +2

Protect your BYOD PCs - they expose your corporate network too!

The high infection rates amongst personal devices is not suprising, but seeing the numbers is useful. Worth addressing within any company that uses a BYOD policy and the need for those devices to be used as securely as any business device.

I was interested to learn that, “The smallest organizations, with 100 employees or less, comprised 44% of ransomware victims”. This wasn’t necessarily surprising given that smaller companies have less resources in terms of support from IT experts, but having information like this is valuable for our clients. As an MSP this is relevant to a good proportion of our clients, and ransomware poses a massive threat to companies that prize system uptime over most other things.

Userlevel 1

I'm really amazed by the increase in Apple phishing attack. When I work with Mac users, their goto reaction is Macs are built safe so I don't have to worry about viruses,  hacking, etc. But they are still vulnerable,  so it's very important for all users to be cautious. 

Interesting read!

“During 2021, 82% of ransomware attacks targeted organizations with less than 1,000 employees. The smallest organizations, with 100 employees or less, comprised 44% of ransomware victims.”

I would say that 44% for smaller business may be on the low side.  I see these attempts almost daily.

Congratulations to all the winners

Apple being the larger ones spoofed makes sense considering how they lead the sway of smart phones and tablets for a while.

Always a good read,.“The Middle East, Asia, and Africa were the regions with the highest percentage of infections.” make perfectly sense.

Userlevel 5
Badge +5

Congratulations.

Userlevel 7
Badge +4

Well done all!

Userlevel 7

Congratulations to all the winners!

 

Userlevel 7
Badge +20

Congratulations to @Heltus 

it’s very tedious to add you all to these wheels :)

You win the Lego X-Wing!

Great answer kid, that was one in a million

Look out for a DM and hopefully you have a shipping address in US, UK, CA (and you don’t mind a couple more goodies)

Userlevel 4
Badge +5

Great info, thanks for all you guys do. 

Userlevel 3

Very interesting! thanks for info!

  • The Middle East, Asia, and Africa were the regions with the highest percentage of infections.
  • 53% of consumer PCs were infected more than once, and 19% infected more than 5 times.
  • Apple was most often impersonated company in phishing attacks.
  • Of all the places where malware could hide on business PCs, it uses %temp% more than half the time.

These statistics are extremely interesting to me. It’s important to report this kind of information to our customers so ensure that they’re aware how easy it is to get infected. I bet most of the users don’t even realise they have infections. I will bring up the issue with the %temp% folder because most of our customers don’t realise it exists! 

Userlevel 3
Badge +1

“53% of consumer PCs were infected more than once, and 19% infected more than 5 times”

For this reason expecially during the last year we are receiving from companies to organise cyber security courses

 

Small organization are the primary targets,  and this is a rilevant data that has to be deeply considered. 

Userlevel 7
Badge +22

Interesting take concerning the Apple impersonations. Is an impersonation of Apple easier then Android, because Apple is more desirable? Or because Apple is more identifiable vs the multiple companies that utilise Android across flagship phones?

Strange trying to put myself in that though process!

I believe Apple ranks very high (depending on what survey you look at) on the list of bets known company names. Also, Apple products are desirable by lots of people and expensive, so I’m sure thinking you won an iPhone or iPad is a thrill and pulls people in.  

Userlevel 2

Great to see the ANZ region see a drop of 51% in infection rates between 2020 and 2021!

Reply