December 7, 2021 By David Bisson 2 min read

Security researchers detected an increase in both phishing campaigns and brute force attacks in the first half of 2021.

Vendor and Business Email Compromise Attempts Also Up

According to Abnormal Security, the volume of brute force attacks grew by 160% starting in May 2021 and ending in mid-June. This means that brute force attacks targeted 26% of all organizations per week on average during that period — more than double the rate (10%) for a typical week.

Some weeks registered a higher volume of attacks than others. In particular, the rate of attacks for the week of June 6 shot up 671% over the previous week’s average. Subsequently, nearly a third of all organizations found themselves targeted by brute force attacks that week.

Credential phishing attempts also increased in H1 2021. They rose from two-thirds of advanced attacks in Q4 2020 to more than 73% of attempts in Q2 2021.

Such growth highlights the fact that digital criminals can use a compromised email account to conduct secondary attacks. That threat includes vendor email compromise as well. In this case, attackers seize a vendor account and inject themselves into an ongoing email conversation. Then, they use that access to send fraudulent invoices or banking details under their control.

These types of attacks rose for the fourth consecutive quarter in Q2 2021.

And then there are business email compromise scams. This type of attack grew from 0.2 campaigns per 1,000 mailboxes at the beginning of the year to 0.41 campaigns by the end of June.

The Growing Speed of Phishing Attacks

The findings discussed above highlight the extent to which phishing attacks have become easier and cheaper to conduct.

No wonder then that the average phishing attack lasts an average of 21 hours. That breaks down to nine hours from when the first victim visits the campaign’s malicious domain to when the first detection comes in. After that, it’s another seven hours before detection rates of the phishing site peak. Another five hours account for the time where victims receive the link and browse the site.

At the same time, it doesn’t cost attackers all that much to conduct a phishing attack. They can purchase an email list between $50 and $500 on a dark web marketplace, for instance. Once they’ve bought it, they can then use the same list to launch other attacks.

How to Protect Against Phishing and Brute Force Attacks 

Organizations can protect themselves against credential phishing and brute force attack campaigns by cultivating a culture of cyber awareness. Specifically, they can use threat intelligence to educate their employees about some of the most recent phishing attacks targeting users. It’s important to use phishing simulations as part of this process. That way, you can test employees’ knowledge and provide follow-up learning modules where needed.

At the same time, organizations need to implement technical controls designed to safeguard their authorized accounts. They can do this by putting multi-factor authentication in place to prevent a set of compromised credentials from translating into a successful account takeover. They can also leverage single sign-on to reduce the pressure for employees to remember too many passwords for too many web accounts.

More from News

Europe’s Cyber Resilience Act: Redefining open source

3 min read - Amid an increasingly complex threat landscape, we find ourselves at a crossroads where law, technology and community converge. As such, cyber resilience is more crucial than ever. At its heart, cyber resilience means maintaining a robust security posture despite adverse cyber events and being able to anticipate, withstand, recover from and adapt to such incidents. While new data privacy and protection regulations like GDPR, HIPAA and CCPA are being introduced more frequently than ever, did you know that there is new…

Feds release urgent guidance for U.S. water sector

3 min read - The water and wastewater sector (WWS) faces cybersecurity challenges that leave it wide open to attacks. In response, the CISA, EPA and FBI recently released joint guidance to the sector, citing variable cyber maturity levels and potential cybersecurity solutions. The new Incident Response Guide (IRG) provides the water sector with information about the federal roles, resources and responsibilities for each stage of the cyber incident response lifecycle. Sector owners and operators can use this information to augment their incident response…

What to expect from the new National Cyber Director

4 min read - As cyber threats show no sign of slowing down in terms of sophistication and frequency, the role of the National Cyber Director (NCD) in the United States is becoming a cornerstone of the nation’s defense strategy. Inaugural NCD Chris Inglis set a high bar for the office during his tenure, steering the country through a gauntlet of cyber challenges. Now, as Harry Coker Jr. steps into this critical role, he faces a landscape that continues to evolve with new threats on…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today