Cyber attacks on manufacturing up 300% in a year

NTT also found that application-specific and web-application attacks accounted for two-thirds of all cyber crime

Hackers have taken advantage of the coronavirus crisis to launch cyber attacks against essential industries, according to NTT’s latest report.

The company’s 2021 Global Threat Intelligence Report (GTIR) revealed that the manufacturing, health care, and finance industries saw 300%, 200%, and 53% increases in worldwide attacks, respectively. These top three sectors accounted for a combined 62% of all attacks in 2020, up from just 11% in 2019.

The shift to remote working and workers accessing company infrastructure through client portals has also resulted in application-specific and web application attacks spiking. These have accounted for 67% of all attacks, more than doubling in the past two years.

Health care was the worst-hit sector, with 97% of all hostile activity targeted at the industry being web application or application-specific attacks.

The report found that business and professional services were the most attacked industries in the Americas, accounting for 26% of all attacks. The US accounted for two of the highest rates of reconnaissance activity of any country analyzed, with 64% of all hostile action targeting the technology industry as some form of surveillance. In education, 58% of all hostile activity was reconnaissance.

Kazu Yozawa, CEO of NTT’s Security division, said that last year his company predicted a surge in targeted, opportunistic attacks and unfortunately, this has proven all too true. 

“While these industries have done their best to maintain essential services throughout disruptive times, the fall in security standards when companies need them most is alarming. As services continue to move online and become increasingly digital to account for the new normal, organizations must be extra vigilant in upholding and maintaining best practices in their security,” he said.

Rodney Joffe, SVP and Fellow at Neustar told IT Pro it’s clear that cyber criminals have wasted no time taking advantage of this expanded threat landscape, attacking both the “front end” of applications — the APIs — as well as the applications behind them. 

Related Resource

Security awareness training strategies for account takeover protection

Why you need an inside-the-perimeter strategy for internal threats

Security awareness training strategies for account takeover protection - whitepaper from MimecastDownload now

“Many of these attacks are opportunistic, a result of bot-driven reconnaissance or the “vertical cascade” method. In other, rarer cases, attacks are more targeted, involving hackers spending time to find a vulnerability in an organization’s web presence and exploiting it to steal customer or patient information, intellectual property, or finance credentials,” Joffe said.

The report also found that crypto-miners have replaced spyware as the world’s most common malware, but the use of certain malware variants against specific industries continues to evolve. crypto miners accounted for 41% of all detected malware in 2020. XMRig coin miner was the most common variant, representing nearly 82% of all coinminer activity.

Featured Resources

How to choose an AI vendor

Five key things to look for in an AI vendor

Download now

The UK 2020 Databerg report

Cloud adoption trends in the UK and recommendations for cloud migration

Download now

2021 state of email security report: Ransomware on the rise

Securing the enterprise in the COVID world

Download now

The impact of AWS in the UK

How AWS is powering Britain's fastest-growing companies

Download now

Recommended

ProtectedBy.AI’s CodeLock blocks malware at source code level
software as a service (SaaS)

ProtectedBy.AI’s CodeLock blocks malware at source code level

9 Jun 2021
CISOs aren’t leading by example when it comes to cyber security
cyber security

CISOs aren’t leading by example when it comes to cyber security

24 May 2021
New report highlights the need for diversity in cyber security recruitment
cyber security

New report highlights the need for diversity in cyber security recruitment

28 Apr 2021
Putin open to handing cyber criminals over to US
hacking

Putin open to handing cyber criminals over to US

14 Jun 2021

Most Popular

Ten-year-old iOS 4 recreated as an iPhone app
iOS

Ten-year-old iOS 4 recreated as an iPhone app

10 Jun 2021
Fastly blames software bug for major outage
public cloud

Fastly blames software bug for major outage

9 Jun 2021
GitHub to prohibit code that’s used in active attacks
cyber security

GitHub to prohibit code that’s used in active attacks

7 Jun 2021