sb-as logo
Story image

Spear phishing techniques evolving to execute lateral attacks – Barracuda

22 Aug 2019

Cloud-enabled security solutions provider Barracuda has released a new report with key findings about the evolving email threat environment.

The latest report, titled: Spear Phishing: Top Threats and Trends Vol. 2 - Email Account Takeover: Defending Against Lateral Phishing, reveals new details about these growing and evolving threats, including the latest tactics used by cybercriminals and the critical precautions to help defend businesses.

The report takes a look at how compromised email accounts are being used to launch targeted lateral phishing attacks that are designed to evade many existing email protection systems, and which advanced detection techniques, security awareness training, and other strategies and solutions businesses are using to prevent attacks.

A closer look at evolving threats

Barracuda’s research uncovered fresh insights into how these popular attacks are evolving and the tactics used by cybercriminals to try to make them successful.

  • 1 in 7 businesses experienced lateral phishing attacks in a seven-month period, based on a random sample of enterprise organisations.
     
  • More than 60% of organisations that were attacked experienced multiple incidents.
     
  • About 11% of attacks managed to successfully compromise additional employee accounts.
  •  
  • 42% of the lateral phishing incidents weren’t reported to the organisation’s IT or security team.
     
  • More than 55% of the lateral phishing attacks targeted recipients with some personal or work relationship to the hijacked email account.
     
  • 37% of lateral phishing attacks used tailored content that was enterprise-oriented or highly specific to the victim’s organisation.

“Email threats, including account takeover and lateral phishing, continue to evolve, and cybercriminals continue to find new ways to execute attacks, avoid detection, and trick users,” says Barracuda Networks email security vice president Mike Flouton.

“Staying ahead of these types of attacks requires an understanding of the latest tactics being used by cybercriminals and the critical precautions available to help defend your business.”

Last month, Barracuda released a study on 2019 email security trends which found that while most IT professionals are more confident about their email security systems than they were a year ago, email attacks continue to have a significant impact on businesses.

Based on the success and proliferation of email-based attacks, IT security professionals will need to stay focused on the evolution and escalation of phishing, ransomware, and other threats and improve email security that goes beyond the traditional gateway.

Story image
CrowdStrike recognised as leading endpoint security vendor on global scale
IDC's report shows that CrowdStrike demonstrated a 2018-2019 growth rate of 99% and close to doubled its market share, while the market shares of the top three vendors in the corporate endpoint segment declined.More
Story image
APAC parents hide internet activity from children more than cyber attackers
A new report from Kaspersky has turned a modern trope - that teens have things to hide in their internet history - on its head, by proving the opposite is also true.More
Story image
Cyber attacks keeping business leaders up at night, new research finds
Data breaches and insider threats are keeping organisations up at night, according to new research from KnowBe4, the security awareness training and simulated phishing platform.More
Story image
Australians ignoring cybersecurity policies in favour of productivity
Trend Micro has found that 67% of remote workers have increased their cybersecurity awareness during COVID-19 related lockdowns. However, despite greater awareness people may still engage in risky behaviour, the survey finds.More
Link image
Enterprise Data Cloud - the new approach to becoming data-driven
Do you want Enterprise-class security and governance? Multi-function data analytics? An elastic cloud experience? No silos? No lock-in? No problem.More
Story image
Why enabling a remote workforce requires converging security at the edge
Fast-tracking an agile yet more secure remote workforce requires a recognition of the fundamental importance of cloud services and mobile access play for today’s users. More