December 7, 2021 By David Bisson 2 min read

Security researchers detected an increase in both phishing campaigns and brute force attacks in the first half of 2021.

Vendor and Business Email Compromise Attempts Also Up

According to Abnormal Security, the volume of brute force attacks grew by 160% starting in May 2021 and ending in mid-June. This means that brute force attacks targeted 26% of all organizations per week on average during that period — more than double the rate (10%) for a typical week.

Some weeks registered a higher volume of attacks than others. In particular, the rate of attacks for the week of June 6 shot up 671% over the previous week’s average. Subsequently, nearly a third of all organizations found themselves targeted by brute force attacks that week.

Credential phishing attempts also increased in H1 2021. They rose from two-thirds of advanced attacks in Q4 2020 to more than 73% of attempts in Q2 2021.

Such growth highlights the fact that digital criminals can use a compromised email account to conduct secondary attacks. That threat includes vendor email compromise as well. In this case, attackers seize a vendor account and inject themselves into an ongoing email conversation. Then, they use that access to send fraudulent invoices or banking details under their control.

These types of attacks rose for the fourth consecutive quarter in Q2 2021.

And then there are business email compromise scams. This type of attack grew from 0.2 campaigns per 1,000 mailboxes at the beginning of the year to 0.41 campaigns by the end of June.

The Growing Speed of Phishing Attacks

The findings discussed above highlight the extent to which phishing attacks have become easier and cheaper to conduct.

No wonder then that the average phishing attack lasts an average of 21 hours. That breaks down to nine hours from when the first victim visits the campaign’s malicious domain to when the first detection comes in. After that, it’s another seven hours before detection rates of the phishing site peak. Another five hours account for the time where victims receive the link and browse the site.

At the same time, it doesn’t cost attackers all that much to conduct a phishing attack. They can purchase an email list between $50 and $500 on a dark web marketplace, for instance. Once they’ve bought it, they can then use the same list to launch other attacks.

How to Protect Against Phishing and Brute Force Attacks 

Organizations can protect themselves against credential phishing and brute force attack campaigns by cultivating a culture of cyber awareness. Specifically, they can use threat intelligence to educate their employees about some of the most recent phishing attacks targeting users. It’s important to use phishing simulations as part of this process. That way, you can test employees’ knowledge and provide follow-up learning modules where needed.

At the same time, organizations need to implement technical controls designed to safeguard their authorized accounts. They can do this by putting multi-factor authentication in place to prevent a set of compromised credentials from translating into a successful account takeover. They can also leverage single sign-on to reduce the pressure for employees to remember too many passwords for too many web accounts.

More from News

DOD establishes Office of the Assistant Secretary of Defense for Cyber Policy

2 min read - The federal government recently took a new step toward prioritizing cybersecurity and demonstrating its commitment to reducing risk. On March 20, 2024, the Pentagon formally established the new Office of the Assistant Secretary of Defense for Cyber Policy to supervise cyber policy for the Department of Defense. The next day, President Joe Biden announced Michael Sulmeyer as his nominee for the role.“In standing up this office, the Department is giving cyber the focus and attention that Congress intended,” said Acting…

CISA releases landmark cyber incident reporting proposal

2 min read - Due to ongoing cyberattacks and threats, critical infrastructure organizations have been on high alert. Now, the Cybersecurity and Infrastructure Security Agency (CISA) has introduced a draft of landmark regulation outlining how organizations will be required to report cyber incidents to the federal government. The 447-page Notice of Proposed Rulemaking (NPRM) has been released and is open for public feedback through the Federal Register. CISA was required to develop this report by the Cyber Incident Reporting for Critical Infrastructure Act of…

Recent developments and updates in Biden cyber policy

3 min read - The White House recently released its budget for the 2025 fiscal year, which supports the government’s commitment to cybersecurity. The cybersecurity funding allocations line up with the FY 2025 cybersecurity spending priorities released last year that included the following pillars: Defend critical infrastructure Disrupt and dismantle threat actors Shape market forces to drive security and resilience Invest in a resilient future Forge international partnerships to pursue shared goals. In 2023, the White House released a 35-page document detailing the new…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today