One-in-ten (or 9%) prevented cybersecurity incidents could cause major disruption or unauthorised access to the customer’s assets. The vast majority of incidents (72%) were of medium severity, according to anonymised metadata voluntarily provided by Kaspersky MDR customers. This means that if these threats had not been detected by the service, they would have affected the performance of the assets or could lead to single data misuse cases.
Cyberattacks are growing in complexity and employing evasive techniques to avoid detection by security solutions. Detection and prevention of such threats requires seasoned threat hunters who can spot suspicious actions before they cause damage to a company. Kaspersky analysed anonymised customers’ cases identified via the Kaspersky MDR service in the fourth quarter of 2020 to see how widespread and severe resolved incidents were.
The research revealed that almost every industry, except mass media and transportation, saw high severity incidents during the analysed period. Most often, critical incidents affected organisations from the public sector (41% of all high severity incidents were detected in this industry), IT (15%) and financial (13%) verticals.
Almost a third (30%) of these critical incidents were human-driven targeted attacks. Almost one quarter (23%) of high severity incidents were classified as high impact malware outbreaks, including ransomware. In 9% of cases, cybercriminals gained access to a company’s IT infrastructure using social engineering techniques.
Kaspersky experts also noted that current APTs were typically detected together with artifacts of previous advanced attacks, suggesting that if an organisation responds to a sophisticated threat, it’s often attacked again, likely by the same actor. Also, in organisations experiencing APTs experts often discovered signs of simulation of adversarial behaviour, such as red teaming, or an assessment of a company’s operational security capabilities through a sophisticated attack simulation.
“Our study found that targeted attacks are rather common – more than one quarter (27%) of organisations faced them. The good news is that organisations that are likely to experience such incidents know about this risk and are prepared for them. These organisations employ services that help them assess their defensive capabilities, such as red teaming, as well as seek help from experts who can stop criminals,” comments Gleb Gritsai, Head of Security Services, Kaspersky.
To protect your organisation from APTs and other advanced attacks, Kaspersky recommends the following:
- Dedicated services can help against high-profile threats. The Kaspersky Managed Detection and Response service can help identify and stop attacks in their early stages, before the attackers achieve their goals.
- Use a dedicated set for effective endpoint protection, threat detection and response products to timely detect and remediate even new and evasive threats. Kaspersky Optimum Framework includes the essential set of endpoint protection empowered with EDR and MDR.
- Provide your SOC team with access to the latest threat intelligence and regularly upskill them with professional training.
- Provide your staff with basic cybersecurity hygiene training, as many targeted attacks start with phishing or other social engineering techniques.