Symantec 2013 threat report flags surge in targeted attacks

Small businesses are the most popular targets, security vendor claims.

Information security

Research by cyber security firm Symantec has shown a 42 per cent rise in targeted attacks during 2012 compared to the previous year.

The organisation's 18th annual Internet Security Threat Report (ISTR) also showed SMBs are bearing the brunt of this increase in online criminal activity, with 31 per cent of targets falling into this category.

Advertisement - Article continues below

Symantec cited increased interest in SMBs among the cyber criminal community as they provide them with an attack route in to larger companies.

Cybercriminals are able to use a technique known as waterholing, where the website of a legitimate website - that the target is almost certain to visit - is compromised with malicious code, which then infects site visitors.

Andy Singer, director of product marketing at Symantec, said in a blog post: "Cybercriminals ... are attacking smaller businesses because they increasingly lack sufficient protection, and sometimes use them as a stepping stone to larger targets.

"'Watering hole' attacks infect 500 businesses in a single day."

The company said it has also noted a rise in attacks aimed at companies in the manufacturing sector, which has now moved to the top of the list of target industries for attack during 2012. This has been accompanied by a drop in the number of government targets, the organisation claimed.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Stephen Trilling, chief technology officer at Symantec, said: "This year's ISTR shows that cybercriminals aren't slowing down, and they continue to devise new ways to steal information from organisations of all sizes.

"The sophistication of attacks coupled with today's IT complexities, such as virtualisation, mobility and cloud, require organisations to remain proactive and use defence in depth' security measures to stay ahead of attacks."

Featured Resources

Preparing for long-term remote working after COVID-19

Learn how to safely and securely enable your remote workforce

Download now

Cloud vs on-premise storage: What’s right for you?

Key considerations driving document storage decisions for businesses

Download now

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Transforming productivity

Solutions that facilitate work at full speed

Download now
Advertisement

Recommended

Visit/security/ransomware/356292/university-of-california-gets-fleeced-by-hackers-for-114-million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Visit/security/cyber-security/356289/australia-announces-135b-investment-in-cybersecurity
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
Visit/cloud/cloud-security/356288/csa-and-issa-form-cybersecurity-partnership
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020
Visit/security/ethical-hacking/356252/poorly-secured-banking-apps-lead-to-cyber-threats
ethical hacking

Mobile banking apps are exposing user data to attackers

26 Jun 2020

Most Popular

Visit/business/business-operations/356395/nvidia-overtakes-intel-as-most-valuable-us-chipmaker
Business operations

Nvidia overtakes Intel as most valuable US chipmaker

9 Jul 2020
Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/hardware/components/356405/is-it-time-to-put-intel-outside
components

Is it time to put Intel Outside?

10 Jul 2020