top of page
  • Writer's pictureMichael Paulyn

Here are the Top 3 Overlooked Cybersecurity Breaches of 2023

Cybercriminals don't sleep; with month two not even done for 2023, attacks are already rising, and companies need to be on the lookout. Below are the top three overlooked cybersecurity breaks of 2023. To learn more, keep reading.

1. RaaS Attacks

Ransomware as a service is a new type of cyberattack in which hackers release ransomware software to their victim's device or network. This software can be easily purchased on the dark web by other hackers or criminal organizations. Typically, "purchase plans" will include all the software, which allows the hacker to "charge" per infection and even split the earnings with other hackers.

These attacks tend to victimize medium-sized companies in the United States that might have a dozen sites serving local customer bases. The RaaS software works to break into the victim's network, and within a few minutes, the hacker can ransom off access to the network for a lucrative payout.

One notable characteristic is that these attacks aren't sudden or swift; there's usually a cover build-up in the coming weeks and months before the victim receives the ransom. This process can usually take just minutes. Post-research shows that the attacker's servers did not even exist on the network, with no need for discovery or weeks of lateral movement.

2. Critical Infrastructure Attacks

Another growing trend regarding cyberattacks is the increase of critical infrastructure attacks becoming more common and deadly. Network breaches in water supply plants, sewage systems, and many other critical infrastructure systems are growing in popularity, potentially putting millions at risk.

Etay Maor, Sr. Director of Security Strategy at Cato Networks, explains that "unfortunately, scanning for vulnerable systems in critical infrastructure is easier than ever. While many such organizations have multiple layers of security, they are still using point solutions to try and defend their infrastructure rather than one system that can look holistically at the full attack lifecycle. Breaches are never just a phishing problem, credentials problem, or a vulnerable system problem - they are always a combination of multiple compromises performed by the threat actor."

3. Three-Step Ransomware Attacks

This final time, which is known as a three-step ransomware attack, uses the following steps to access its victim's network and data covertly:

A. Infiltration

First, the hacker will seek access to the network using a phishing campaign. In this stage, the victim clicks a link they receive in an email; this link is generated from an external website, resulting in the hacker downloading the payload.

B. Network activity

After that, the cyber attacker will focus on laterally working throughout the network for the next few weeks. During this period, the hacker collects sensitive data such as passwords and uses in-memory file-less malware. Then once complete, the encryption begins; the final attack date is usually when the IT department is away on holiday.

C. Exfiltration

Finally, the hacker uploads the data from the network and sends the request for a ransom payment.

Hungry for more? Join me each week, where I'll break down complex topics and dissect the latest news within the cybersecurity industry and blockchain ecosystem, simplifying the tech world.

5 views0 comments


bottom of page