{"id":8845,"date":"2020-05-22T05:08:06","date_gmt":"2020-05-22T02:08:06","guid":{"rendered":"https:\/\/forklog.media\/?p=8845"},"modified":"2020-05-22T02:29:21","modified_gmt":"2020-05-21T23:29:21","slug":"cybercriminals-change-focus-from-individual-servers-to-enterprise-networks","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/cybercriminals-change-focus-from-individual-servers-to-enterprise-networks\/","title":{"rendered":"Cybercriminals Change Focus From Individual Servers to Enterprise Networks"},"content":{"rendered":"<p>Hackers seem to have shifted their focus from individual servers to corporate networks. In the second half of 2019, the number of postings on illicit marketplaces offering access to corporate networks reportedly began surging.<\/p>\n<p><!--more--><\/p>\n<p>Cybercriminals have been actively placing so-called \u201caccess for sale\u201d proposals on darknet seeking to sell the remote control over enterprise computers to third parties, over the past months, per a May 20 <a href=\"https:\/\/www.ptsecurity.com\/ww-en\/analytics\/access-for-sale-2020\/\">report<\/a> from cybersecurity firm Positive Technologies.<\/p>\n<p>Once a third party obtains access to corporate computers, they can perform attacks on the company\u2019s infrastructure and eventually steal data and disrupt business operations.<\/p>\n<p>Positive Technologies analyzed 190 dedicated dark web sites and forums with mainly Russian- and English-speaking users and concluded that more than 70 million people visit those sites per month.<\/p>\n<h2><b>Even Low-Skilled Hackers Can Breach Corporate Networks<\/b><\/h2>\n<p>According to the findings, access to industrial businesses has the widest popularity among ill-intentioned individuals, accounting for 18% of the total number of proposals, and is followed by the service sector companies, with 14%. In general, the price varies from $500 to $100,000, with the cost of privileged access to a single local network of $5,000.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/www.ptsecurity.com\/upload\/corporate\/ww-en\/images\/analytics\/article_311007\/311007_4.jpg\" alt=\"Compromised companies by sector\" width=\"692\" height=\"417\" \/><\/p>\n<p><i>Compromised companies by sector. Source: <\/i><a href=\"https:\/\/www.ptsecurity.com\/ww-en\/analytics\/access-for-sale-2020\/\"><i>Positive Technologies<\/i><\/a><\/p>\n<p>Positive Technologies\u2019s report notes that even low-skilled hackers are capable of breaching corporate networks, posing risk primarily to large companies. So-called script kiddies\u2014unskilled individuals who use scripts or programs developed by others to attack computer systems\u2014target small and medium-sized firms as they usually spend less on network security.<\/p>\n<h2><b>Trends Shaping the Threat Landscape are Changing<\/b><\/h2>\n<p>Interestingly, a <a href=\"https:\/\/www.business-standard.com\/article\/news-ians\/dark-web-listings-of-malware-on-the-rise-study-119060800809_1.html\">study<\/a> into the issue by cybersecurity firm Bromium and a group of researchers from the University of Surrey showed that, in 2019, the banking and finance sector was exposed to hacker attacks the most, with 35% of listings from darknet sellers. E-commerce came second, with 20% of listings, at the time.<\/p>\n<p>The findings set forth in a recent report from tech behemoth IBM align with those from Bromium and the University of Surrey as they <a href=\"https:\/\/www.ibm.com\/security\/data-breach\/threat-intelligence\">determined<\/a> the financial services and retail sectors as two main industries targeted by cybercriminals in 2019.<\/p>\n<p>Per IBM, more than 8 billion records were breached last year, and 150,000 vulnerabilities were disclosed to date. Operational technology attacks reportedly skyrocketed by massive 2,000% year-on-year, in 2019, focusing on the Internet of Things, and connected industrial and medical systems.<\/p>\n<p>In the fourth quarter of 2019, the volume of ransomware attacks increased by 67% year-on-year, with bad actors continuously developing new ransomware code for destructive attacks.<\/p>\n<p>Cyberattacks are growing in number due to the low barrier to entry. To resist attacks, per Positive Technologies, companies should \u201censure comprehensive infrastructure protection, both on the network perimeter and within the local network. Make sure that all services on the perimeter are protected and security events on the local network are properly monitored to detect intruders in time.\u201d<\/p>\n<p><i>Written by Ana Alexandre<\/i><\/p>\n<p><b>Follow us on\u00a0<\/b><a href=\"https:\/\/twitter.com\/forklogmedia\"><b>Twitter<\/b><\/a><b>\u00a0and\u00a0<\/b><a href=\"https:\/\/www.facebook.com\/forklogmedia\"><b>Facebook<\/b><\/a><b>\u00a0and join our\u00a0<\/b><a href=\"https:\/\/t.me\/forklogmedia\"><b>Telegram channel<\/b><\/a><b>\u00a0to know what\u2019s up with crypto and why it\u2019s important.<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers seem to have shifted their focus from individual servers to corporate networks. In the second half of 2019, the number of postings on illicit marketplaces offering access to corporate networks reportedly began surging.<\/p>\n","protected":false},"author":6,"featured_media":8847,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"human_written","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1111,43,148],"class_list":["post-8845","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybersecurity","tag-hackers","tag-security"],"aioseo_notices":[],"amp_enabled":true,"views":"669","promo_type":"1","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/8845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=8845"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/8845\/revisions"}],"predecessor-version":[{"id":8848,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/8845\/revisions\/8848"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/8847"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=8845"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=8845"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=8845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}