Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Incogni Personal Information Removal Service Review: Hands Off My Data!

    March 29, 2023

    Twitter suffers a concerning data leak, company suspects ex-employee behind it

    March 28, 2023

    Demand for digital data protection bill gathers steam

    March 27, 2023
    Facebook Twitter Instagram
    Your Infotech
    • Data

      Incogni Personal Information Removal Service Review: Hands Off My Data!

      March 29, 2023

      Twitter suffers a concerning data leak, company suspects ex-employee behind it

      March 28, 2023

      Demand for digital data protection bill gathers steam

      March 27, 2023

      Sharing sensitive business data with ChatGPT could be risky

      March 23, 2023

      Governments request for user data from Apple, Google rises; India ranks no. 1 in Southern Asia: Report

      March 20, 2023
    • Cloud

      Google opens Italy’s second cloud region in Turin city

      March 24, 2023

      France’s OVH expands into India amid growing cloud adoption

      March 21, 2023

      Govt plans incentive scheme for cloud startups to thwart Microsoft, Amazon, and Google domination

      March 17, 2023

      Intellect launches eMACH.ai for banks to use cloud services with embedded AI

      March 14, 2023

      Chinese AI groups use cloud services to evade US chip export controls

      March 9, 2023
    • Networking

      Arista Modernizes Routing in the Wide Area Network

      March 22, 2023

      Amazon’s AWS cozies up to carriers to launch 2 services to build and operate networks in the cloud

      February 22, 2023

      META PLATFORMS SPENT OVER $1 BILLION ON ARISTA NETWORKING IN 2022

      February 17, 2023

      Microsoft Teams and Outlook are down due to a ‘networking issue’

      January 25, 2023

      Warning to those with older phones 3G networks are to be scrapped starting this year

      January 23, 2023
    • Virtualization

      Imagination and Telechips drive automotive display diversity with hardware virtualization

      March 16, 2023

      Device virtualization is key to IoT adoption

      March 3, 2023

      Discover how virtualization can transform your business with this online training

      February 7, 2023

      Server Virtualization Software Market Next Big Thing | Major Giants IBM, Oracle, Microsoft

      February 2, 2023

      Global Data Virtualization Market Report 2022: Featuring Oracle, IBM, Cisco, Salesforce, Workday, Alteryx, Domo, Ceros, Cluvio & Qliktech International

      January 26, 2023
    • IT Infrastructure

      TCS+ | The need for speed: Braintree’s Heath Huxtable on modern IT infrastructure

      March 13, 2023

      The race to net zero: Six ways to slash IT infrastructure emissions

      March 10, 2023

      Vertiv and TechAccess partner to boost African IT infrastructure solutions

      February 28, 2023

      It Infrastructure Market Size 2023 Research Report with Technological Factors and Forecast till 2025

      February 21, 2023

      Geojit to build 1.25 lakh sq ft IT infrastructure in Infopark

      February 14, 2023
    Your Infotech
    Home»Cloud»Crowdstrike Reports Cloud Attacks, Microsoft Vulnerabilities, SIM Swapping Biggest Threats
    Cloud

    Crowdstrike Reports Cloud Attacks, Microsoft Vulnerabilities, SIM Swapping Biggest Threats

    yourinfotechBy yourinfotechMarch 1, 2023Updated:March 1, 2023No Comments3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp VKontakte Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    CrowdStrike today released its 2023 Global Threat Report, revealing the current state of digital security. Among the key findings in the report is that cloud exploitation grew by 95%. Perhaps even more troubling is that there are now more “cloud-conscious” threat actors—that is, attackers with an emphasis on and skills in the cloud—than ever before by a wide margin.

    “As organizations are increasingly migrating to the cloud, adversaries are adding the cloud to their targeting repertoire to expand the impact of their intrusions,” Adam Meyers, SVP of Intelligence, CrowdStrike, told SDxCentral. “The goals of adversaries often remain identical or similar in the cloud to their ambitions outside of the cloud—ii.e., gain initial access, gain persistence, and move laterally.”

    Less Malware, But More Credential Theft
    There was a time when malware was the defining characteristic of online security and attacks, but that’s no longer the case. CrowdStrike reported that the vast majority (71%) of attacks it detected in 2022 did not involve the use of malware, compared to 62% in 2021. Instead of relying on malware, attackers are relying on other techniques including credential theft to gain unauthorized access.

    “Ultimately, it all comes down to issues surrounding credential compromise,” Meyers said. “CrowdStrike observed adversaries time and time again moving past malware to infiltrate systems through legitimate credentials.” Infiltration is not the end game for many attackers and often leads to additional exploitation of victims. The 2023 Global Threat Report highlights that CrowdStrike observed a 20% increase in the number of adversaries conducting data theft and extortion campaigns.

    Microsoft Vulnerabilities Are a Top Concern
    One of the top-level findings in the CrowdStrike report is that adversaries are weaponizing and re-exploiting vulnerabilities.

    Meyers noted that attackers are increasingly finding new ways to exploit previously identified bugs. “If the bug has been patched, they will ultimately find ways around the patch,

    Meyers added that, in some cases, such as Log4j, attackers have found alternative paths to trigger the bug. In other instances, a bug is found in a common application or library and the use of that library is found in multiple products leading to multiple product vulnerabilities being identified. The other issue is just the sheer volume of vulnerabilities, and in particular, vulnerabilities patched by Microsoft. Meyers noted that Microsoft issued more than 900 patches in 2022 including 30 zero-day patches

    “We believe the biggest issue remains with Microsoft vulnerabilities,” Meyers said. “These issues continue to amplify the systemic risk that organizations are facing with the legacy architecture of Microsoft.”


    SIM swapping is a type of social engineering attack where an attacker fraudulently transfers a victim’s phone number to a SIM card under their control. Meyers explained that SIM swapping is increasingly used to bypass various multi-factor authentication (MFA) solutions, and continues to be used for scams.

    CrowdStrike reported that in 2022, Scattered Spider emerged and heavily targeted Business Process Outsourcing (BPO) companies, which are frequently used for outsourced account support by mobile telecoms. Meyers said that part of the goal was to conduct SIM swapping for profit, potentially targeting crypto traders. The reason SIM swapping persists is that it is inherently present in cellular networks currently,” Meyers said. “The cellular network uses the SIM to identify users, so by swapping the SIM in the account, allows potential MFA bypasses.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
    Previous ArticleVertiv and TechAccess partner to boost African IT infrastructure solutions
    Next Article China leads the US in the global competition for key emerging technology, 
    yourinfotech
    • Website

    Related Posts

    Google opens Italy’s second cloud region in Turin city

    March 24, 2023

    France’s OVH expands into India amid growing cloud adoption

    March 21, 2023

    Govt plans incentive scheme for cloud startups to thwart Microsoft, Amazon, and Google domination

    March 17, 2023

    Intellect launches eMACH.ai for banks to use cloud services with embedded AI

    March 14, 2023

    Leave A Reply Cancel Reply

    Our Picks

    Subscribe to Updates

    Get the latest creative news from Your Infotech about Information Technology.

    About Us
    About Us

    We provide a wide range of customized, integrated B2B and B2C digital marketing services solutions that are ideal for your business.

    We're accepting new partnerships right now.

    Email Us: info@yourmartech.com
    Contact: +1-530-518-1420

    Our Brands
    • Your Martech
    • Your HR Tech
    • Your Fin Tech
    • Your Revenue
    • Your Bio Tech
    • Your POS Tech
    • Your Health Tech
    SUBSCRIBE NOW
    Loading
    LinkedIn
    • Privacy Policy
    © 2023 Vigarbiz Inc. Designed by Vigarbiz Media.

    Type above and press Enter to search. Press Esc to cancel.