Report

2022 BrightCloud® Threat Report: The year of innovation for cybercrime

2022 BrightCloud® Threat Report: The year of innovation for cybercrime

Show first post

114 replies

Since formally joining the IT world in the early 80’s I have personally witnessed only a handful of infections. In those days I knew of the existence of two antivirus software applications. For the past 4 years I have satisfactorily and happily been protecting my devices and those of my customers with Webroot  ; )

It all boils down to 2 things for me, vigilance and training. People are the weak link in any attack and they will always be. 

This has shown to be true in every attack we have witnessed.

Userlevel 7
Badge +4

No Surprise at all to see Africa there. 

Userlevel 1

It should come as no suprise that ransomware attacks companies with under 1000 employees, they are more vunerable because they may not have the necessary security in place.

In my experience the sell of security to small companies is a lot harder than large and the education is also less.

Userlevel 3

Very interesting

Userlevel 4
Badge +3

Here is an interesting thought regarding windows 7 and windows 10.

 

“Windows 7 PCs experienced 0.06
infections per PC, and Windows 10 PCs
averaged only 0.03 infections per PC”

 

|Is it the fact that the windows 7 users are looking for “apps” to make their pc faster which get flagged as they are nomally classed as malware? Are non-computer savy users (who havn’t changed their OS in 10 years) and  also have old unupported apps as well with their own vulnerabilities.

In 27 years of IT support business I have not seen the massive “O/S unsupported" spike in infections predicted each time.  However last year I did get a decent answer from a security professional.  He said its the browsers on the old systems.  This makes sense and tied with the DIY nature of a Windows 7 user, thats going to be very dangerous.

BTW:  the most important part of a layered defence is making the main user profile a non-admin.  Cuts out lots of stupid moves from the users and even some convincer remote access frauds, as the users can’t install the remote software they are being told to install.

Userlevel 4

Of all the places where malware could hide on business PCs, it uses %temp% more than half the time

 

This is surprising but also not surprising, perhaps it would be a good idea to have like an auto temp folder clear scheduled every time Webroot runs a daily scan, if the threat hasn’t been detected it’s a potential rudimentary failsafe.

“53% of consumer PCs were infected more than once, and 19% infected more than 5 times”

Some people never learn...

Userlevel 2
  • In 2021, we discovered over 4 million new high-risk URLs in 2021, almost 66% of them involved in phishing.

Too many new things coming up, we need to stay alert always

Userlevel 7
Badge +62

Educating people more. Let others know about Webroot/Bright Cloud and Security Awareness. 

Userlevel 2

Interesting to see smaller businesses are targeted more compared to larger. I guess it makes sense, larger organisations will have more budget for IT.

Userlevel 2

Unfortunate but not surprising that Africa is up there. As a South African, we hear everyday of newly reported ways that criminals and malicious organisations are securing funding. It is however, a reality everyone is going to face at sometime worldwide. Unfortunately, us cybersecurity specialists aren’t the only ones innovating our industry.

These are really surprising Stats: 

  • In 2021, we discovered over 4 million new high-risk URLs in 2021, almost 66% of them involved in phishing.
  • Bad actors like to time their phishing attacks. In the month of May alone, we witnessed a 770% increase in phishing activity.

Unfortunately, supply chain attacks are the ones that give me nightmares and they’re not dwindling. One major attack could put hundreds or thousands of small MSPs out of business in addition to costing their clients loads of grief and money.

Reply