One in 10 cybersecurity incidents investigated are considered severe

Cyberattacks are growing in complexity and employing evasive techniques to avoid detection by security solutions. Detection and prevention of such threats requires seasoned threat hunters who can spot suspicious actions before they cause damage to a company. Kaspersky analyzed anonymized customers’ cases identified via the Kaspersky MDR service in Q4 2020 to see how widespread and severe resolved incidents were.

The study found out that one-in-10 customers prevented cybersecurity incidents that could have caused major disruption or unauthorized access to the their assets. The vast majority of incidents (72%) were of medium severity. This means that if these threats had not been detected by the service, they would have affected the performance of the assets or could lead to single data misuse cases.

The research also revealed that almost every industry, except mass media and transportation, saw high severity incidents during the analyzed period. Most often critical incidents affected organizations from the public sector (41% of all high severity incidents were detected in this industry), IT (15%) and financial (13%) verticals.

Almost a third (30%) of these critical incidents were human-driven targeted attacks. Almost one quarter (23%) of high severity incidents were classified as high impact malware outbreaks, including ransomware. In 9% of cases, cybercriminals gained access to a company’s IT infrastructure using social engineering techniques.

one-in-10-cybersecurity-incidents-investigated-by-kaspersky-in-organizations-are-considered-severe.png

Kaspersky experts also noted that current APTs were typically detected together with artifacts of previous advanced attacks, suggesting that if an organization responds to a sophisticated threat, it’s often attacked again, likely by the same actor. Also, in organizations experiencing APTs experts often discovered signs of simulation of adversarial behavior, such as red teaming, or an assessment of a company’s operational security capabilities through a sophisticated attack simulation.

“Our study found that targeted attacks are rather common — more than one quarter (27%) of organizations faced them. The good news is that organizations that are likely to experience such incidents know about this risk and are prepared for them. These organizations employ services that help them assess their defensive capabilities, such as red teaming, as well as seek help from experts who can stop criminals, “– comments Gleb Gritsai, Head of Security Services, Kaspersky.

To protect your organization from APTs and other advanced attacks, Kaspersky recommends the following:

  • Dedicated services can help against high-profile threats. The Kaspersky Managed Detection and Response service can help identify and stop attacks in their early stages, before the attackers achieve their goals.
  • Use a dedicated set for effective endpoint protection, threat detection and response products to timely detect and remediate even new and evasive threats. Kaspersky Optimum Framework includes the essential set of endpoint protection empowered with EDR and MDR.
  • Provide your SOC team with access to the latest threat intelligence and regularly upskill them with professional training.
  • Provide your staff with basic cybersecurity hygiene training, as many targeted attacks start with phishing or other social engineering techniques.

The full report is available at the following link.