The holiday season is just around the corner, bringing with it a lot of joy and happiness. This also happens to be the perfect time for malicious activities. During this time of year people tend to be engaged elsewhere and less responsive, allowing criminals to operate easily and go unnoticed. It’s also a period of high-traffic and high-dollar activities, which presents a great opportunity for threat actors to wage profitable attacks.
Remember the Target breach that happened eight years ago? 40 million customer credit card details were stolen during the holiday season. Studies afterward showed limited damage in the long run, however with the current sophistication and maturity of malicious actors this type of attack would be much more devastating today. Why is that?
There are at least four reasons why bad actors have gotten increasingly sophisticated over time:
Many hackers and scammers can get away with just about anything, especially when they live in countries that ignore cyber attacks beyond national borders. Similar to hi-tech companies, hacking groups and organizations can even post job offers to lure in the best talent.
Many organizations have been driven to depend on remote online interfaces, both for customers and remote access for employees. This has played a major role in expanding the attack surface, creating more opportunities for attackers to execute attacks.
It’s now feasible to scan the entire internet for a specific security gap in less than 48 hours. Since most organizations have weekly or monthly patch service level agreements (SLAs), this provides a window of opportunity for exploiting vulnerabilities.
Similar to other maturing industries such as financial services and agriculture, cybersecurity has malicious groups specializing in different phases of an attack lifecycle. For example, the FIN12 group is focused on ransomware deployment and ensuring the target organizations’ critical data and mission-critical infrastructure will be down without easy backup restoration. FIN12 works in partnership with other criminal gangs responsible for initial access establishment.
Given these reasons, potential damage could put businesses down for hours or days during peak holiday season; giving way to far more painful disasters than the Target breach in 2013.
Technology is the major silver lining here. With the ability to reduce risk from sophisticated attackers, attack surface management solutions proactively discover and monitor your organization’s attack surface for potential risks and ideal opportunities for attackers. They allow you to uncover and respond to risks before they can evolve into major issues. These tools are key to winning the battle and staying safe this holiday season.
Alex Zaslavsky, a former Senior Product Manager at CyCognito, has more than 15 years of infosec experience working on data analytics, system development, architecture and technical product management, in addition to being a veteran of the 8200 unit.
Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024.
Get a free scan of your attack surface and gain valuable insight into your organization's risk posture by allowing CyCognito to discover, contextualize, and test externally exposed assets on a portion of your parent company or a single subsidiary.
Discover insights on application security, exposure management and other key topics below.
The definitive guide to attack surface management. Learn everything you need to know to reduce your cyber security risk with attack surface management.
Exposure management is a set of processes which allow organizations to assess the visibility, accessibility, and risk factors of their digital assets.
Vulnerability assessment is the process of identifying, quantifying, and prioritizing vulnerabilities in a system.
Explore CyCognito modules ASM, AST and EI in the resources below.
Scalable, continuous, and comprehensive testing for all external assets, all the time.
CyCognito Automated Security Testing dynamically applies payload-based testing techniques across your entire external attack surface.
CyCognito Exploit Intelligence uses threat intelligence about attackers’ behavior and exploitability for enhanced prioritization.