BRANDEFENSE BRANDEFENSE
  • Home
  • Product
    How it works?
    Platform Overview
    Cyber Intelligence
    Brand & Reputation Protection
    Exposure Management
    Solutions
    Threat Intelligence Service
    Brand Protection
    Vulnerability Management
    Attack Surface Management
    Fraud Protection
    VIP Security
    Vulnerability Intelligence
    By Use Case
    Preventing Data Leakage
    Phishing Monitoring
    Account Takeover Detection
    Stolen Credit Cards
    Dark Web Monitoring
    Remediation and Takedown
    brandefense background
    Eliminate risks
    Explore the Brandefense
  • Blog
  • Resources
    Security News
    Threat Intelligence Researches
    Digital Risk Protection – FAQ
    We in the Press
  • Partners
    Channel Partners
    Deal Registration
  • Company
    About Us
    Career
    Privacy Policy
    Terms of Use
    Contact Us
Free Trial

BRANDEFENSE

  • Home
  • Product
    How it works?
    Platform Overview
    Cyber Intelligence
    Brand & Reputation Protection
    Exposure Management
    Solutions
    Threat Intelligence Service
    Brand Protection
    Vulnerability Management
    Attack Surface Management
    Fraud Protection
    VIP Security
    Vulnerability Intelligence
    By Use Case
    Preventing Data Leakage
    Phishing Monitoring
    Account Takeover Detection
    Stolen Credit Cards
    Dark Web Monitoring
    Remediation and Takedown
    brandefense background
    Eliminate risks
    Explore the Brandefense
  • Blog
  • Resources
    Security News
    Threat Intelligence Researches
    Digital Risk Protection – FAQ
    We in the Press
  • Partners
    Channel Partners
    Deal Registration
  • Company
    About Us
    Career
    Privacy Policy
    Terms of Use
    Contact Us
Comparing Cyber Security Attacks in Q3 – Q4 of 2022 for the Manufacturing Sector

Comparing Cyber Security Attacks in Q3 – Q4 of 2022 for the Manufacturing Sector

BRANDEFENSE
Ransomware
30/01/2023

What Happened in Manufacturing Sector in Q3 – Q4 of 2022?

In recent years, ransomware attacks have become frequent and severe. The onslaught has concentrated on the manufacturing sector, with producers providing easy targets for bad actors. In this industry, it’s vital to recognize the latest trends and defend yourself accordingly.

The manufacturing sector comprises establishments engaged in the mechanical, physical, or chemical transformation of materials, substances, or components into new products. Establishments in the manufacturing sector are often described as plants, factories, or mills and characteristically use power-driven machines and materials-handling equipment. However, establishments that transform materials or substances into new products by hand or in the worker’s home and those engaged in selling to the general public products made on the same premises from which they are sold, such as bakeries, candy stores, and custom tailors, may also be included in this sector.

As the manufacturing sector increasingly relies on software and digitization, it becomes a common target for ransomware attacks that can compromise data security and cause costly disruptions. To prevent these issues, many companies in this sector are prioritizing cybersecurity measures to protect their data and operations.

comparing with q3-q4 by industries
Figure 1: When analyzed in the third quarter (July-August-September) of 2022, you can see that the number of attacks decreased in all sectors. However, in the last quarter (October-November-December), attacks increased significantly, especially in October, and tended to increase compared to the previous quarter.

While no industry is safe from ransomware attacks, the manufacturing sector has been hit especially hard. In the last quarter alone, there was an astronomical increase of 151% in the manufacturing sector compared to the third quarter. Once the second most frequently targeted sector, it is now the most attacked industry. With the assaults coming thick and fast, manufacturers need to beef up their cybersecurity systems before it’s too late. There are two main reasons why the sector has seen such a rise in cybercrime:

A Conceptual Look About Ransomware Attacks in Other Sectors

Ransomware attacks increased substantially in 2022 across multiple sectors, with the government sector experiencing the highest increase at 425%. Other sectors, such as energy and utilities, manufacturing, banking and finance, and IT, also saw notable increases. However, some sectors saw less of an increase, with business professionals and legal services seeing only a 20% increase and retail only seeing a 53% increase. The healthcare and public health sector were the least affected, with a 14% increase. This data emphasizes the importance of cyber security for all industries.

ransomware attacks by different industries in q3-a4
Figure 2: Proportional Overview of Ransomware Attacks by Different Industries in Q3-Q4

Ransomware Trends Report (Q3-Q4 2022)

Inside, you'll learn the world's most targeted sectors, countries and malicious groups' activity over the last 6 months.

Get your free copy

Why Are Ransomware Attacks on the Rise?

The COVID-19 pandemic has put a strain on IT workforces and made it difficult for companies to keep up with the constantly changing tactics of cybercriminals. As a result, factories, which often have large computer systems with inadequate security measures in place, have become vulnerable targets for attacks. The limited size of many security teams only compounds this problem, making it difficult for these organizations to effectively defend against these threats.

The graphic shows the attacks received by the sectors in the last 6 months of 2022. Especially Manufacturing and Business, Professionals % Legal (such as law office, hotels insurance companies) sectors the biggest share of the pie. Moreover, the education, health and information technologies sectors are among the sectors most preferred by threat actors.

number of attacks last 6 months
Figure 3: The number of attacks observed monthly by sector.

Cybercriminals are always happy to take advantage of weaknesses, and they’ve identified factories as vulnerable targets. To understand how these crimes unfold, it’s helpful to analyze specific cases. In each of the incidents outlined below, a criminal organization succeeded in locking or extracting a company’s data. Either by publishing sensitive information or bringing operations to a halt, each assault had a truly disastrous effect.

In 2020, Visser Precision suffered a massive DoppelPaymer cyberattack. The aerospace precision parts manufacturer has private dealings with many major firms and agencies, including Tesla, SpaceX, and General Dynamics, and this preponderance of sensitive information attracted criminals’ attention. The hackers published important company documents on their website, including nondisclosure agreements.

In 2021, the technology manufacturer Acer suffered a massive cyber assault. The criminals, who call themselves REvil, claimed credit for the disruptions. While the route of entry remains unknown, experts have speculated that a Microsoft Exchange vulnerability might be to blame. REvil demanded $50 million to release the locked data, more than any previous ransom in the history of cybercrime. To prove their involvement in the assault, the group posted pictures of sensitive files online.

How to Brandefense Can Help You?

When it comes to cybersecurity, the “attack surface area” refers to the various points within a system that could potentially be targeted by malicious actors. It is the sum total of all potential entry points or attack vectors into a system, application or network. It includes all the various ways an attacker can access sensitive information or disrupt the normal functioning of the system. The attack surface can encompass a wide range of entry points, such as network ports, services, software vulnerabilities, user credentials, and more. In general, the larger the attack surface, the more potential vulnerabilities there are that can be exploited by an attacker.

Attack Surface Management (ASM) is the process of identifying, analyzing, and reducing the attack surface of a system, application or network. It involves identifying all entry points, or attack vectors, that a potential attacker could use to gain access to sensitive information or disrupt the normal functioning of a system. The goal of ASM is to reduce the risk of security breaches by identifying and mitigating vulnerabilities in systems and applications.

brandefense attack surface management solution

Conclusion, Mitigations & Recommendations

There are several steps that companies can take to protect themselves, such as;

  • Improving email security,
  • Regularly backing up data,
  • Keep systems and applications up to date by scanning for security vulnerabilities,
  • Do not access links in unsafe spam messages or unknown websites,
  • Do not provide personal information to untrusted sources,
  • Never use USB sticks obtained from unknown sources,
  • Use VPN services on public Wi-Fi networks,
  • Institutions and organizations should provide awareness training to their employees against cyber security threats,
  • Up-to-date security solutions should be used in systems and e-mail mail servers.

By taking these measures, companies can significantly reduce their risk of falling victim to a cyberattack.

Share on Facebook Share on Twitter
Search
Categories
APT GroupsBlogDark WebDRPSFraudRansomwareSector AnalysisSecurity NewsVIP SecurityWe in the PressWeekly Newsletter
Recent Posts
  • What is BEC (Business Email Compromise) Attack?
    What is BEC (Business Email Compromise) Attack?
  • What Is Smishing and How To Protect Yourself?
    What Is Smishing and How To Protect Yourself?
  • Security Newsletter | March 30, 2023
    Security Newsletter | March 30, 2023
  • What is Incident Response and How to Build It?
    What is Incident Response and How to Build It?
2022 Ransomware Trends Report
Report
Download Report
Follow us!

    Continue Reading

    Previous post

    Critical RCE Alert on Western Digital My Cloud OS

    critical rce in western digital
    weekly cyber security news from brandefense
    Next post

    Weekly Security News – Week 5

    particle element
    We know what hackers know about you
    Our cyber threat intelligence and security research team is ready to help you.
    Request a demo
    Free Trial
    Contact
    Login

    Follow us on

    brandefense logo brandefense

    Brandefense is solving SOC’s complex challenges. We are here to help Brandefense customers to protect their brands and reputations against cyber threats.

    United States:

    300 Delaware Ave. Ste 210 #328 Wilmington, DE 19801 / USA

    Turkey:

    Üniversiteler Mahallesi, 1605.Cadde, Kapı No:3/1, No: 204, 06800 Çankaya/Ankara 06800

    © 2022 Brandefense. All rights reserved.

    Solutions
    Threat IntelligenceBrand ProtectionVulnerability ManagementFraud ProtectionVIP SecurityAttack Surface ManagementVulnerability Intelligence
    Use Case
    Data LeakagePhishing MonitoringAccount Takeover DetectionStolen Credit CardsDark Web MonitoringRemediation / Takedown
    Partners
    Channel PartnersDeal Registration
    Company
    AboutCareerPrivacy PolicyTerms Of UseContact
    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage vendors Read more about these purposes
    View preferences
    {title} {title} {title}
    Close
    Search

    Hit enter to search or ESC to close