{"id":454522,"date":"2021-04-05T02:12:47","date_gmt":"2021-04-05T06:12:47","guid":{"rendered":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/crowdstrike-releases-2021-cybersecurity-global-threat-report-automation-world.php"},"modified":"2021-04-05T02:12:47","modified_gmt":"2021-04-05T06:12:47","slug":"crowdstrike-releases-2021-cybersecurity-global-threat-report-automation-world","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/automation\/crowdstrike-releases-2021-cybersecurity-global-threat-report-automation-world.php","title":{"rendered":"CrowdStrike Releases 2021 Cybersecurity Global Threat Report &#8211; Automation World"},"content":{"rendered":"<p><p>As  industrial companies connect plant-level software and devices to internet-connected  enterprise systems, cybersecurity has become a critical operations issue for  manufacturers of all sizes. While the Industrial Internet of Things (IIoT)  greatly expands the efficiency of plant floor operations, it  also introduces countless new vectors for potential cyberattacks. With more data flowing in and out of plants, the  concern is that once localized networks will become more vulnerable.<\/p>\n<p>The  threat actors seeking to exploit these new loopholes include disgruntled  employees and criminals attempting to steal intellectual property or other  sensitive information for purposes of extortion, hacktivists who desire to  garner public attention for their causes, and state-backed  foreign agents engaged in espionage activities for political purposes.<\/p>\n<p>Unfortunately,  the risk of many of these types of attacks has only grown since the onset of  COVID-19, according to cybersecurity company CrowdStrikes recently released 2021 Global  Threat Report. This increased hacking activity stems from several sources. For  one, as lockdowns took hold in early 2020, many workers migrated to home  offices that lacked the cybersecurity protections of commercial workplaces  equipped with dedicated information technology (IT) staff. In addition, as remote  access boomed, the potential attack surface available to hackers was  broadened. Finally, fear and uncertainty surrounding the pandemic has  increasingly been exploited to engage in phishing attacks and other forms of  social engineering designed to trick users into granting malevolent actors  access to proprietary systems and information.<\/p>\n<p>CrowdStrikes  report details recent efforts engaged in by state-sponsored adversaries looking  to steal valuable data pertaining to vaccine research and government responses  to COVID-19 as well as targeted intrusions, sometimes referred to as big game  hunting. In these latter efforts, e-criminals identify high-value individual targets  for extortion and blackmail via infection with ransomwaresoftware that locks  users out of a system until a fee is paid. The report notes that ransomware  attacks on manufacturing facilities have proven uniquely effective, as the  time-sensitive nature of their production schedules often renders paying the  fee less expensive than losing critical throughput.CrowdStrike has observed a strong uptick in cybersecurity breaches in the past year. Manufacturing alone saw 228 ransomware incidents in 2020.<\/p>\n<p>In addition  to individual manufacturing facilities, healthcare and the supply chain also  stood out in 2020 as particularly vulnerable. In the healthcare space, phishing  attacks currently pose the greatest risk, with tactics and techniques taking a  plethora of forms, including: exploitation of individuals looking for details  on disease tracking, testing, and treatment; impersonation of medical bodies  requesting information, including the World Health Organization (WHO) and U.S.  Centers for Disease Control and Prevention (CDC); and offering financial  assistance or government stimulus packages in exchange for private information.<\/p>\n<p>Meanwhile,  cyberattacks on the supply chain have relied on more sophisticated methods. For  instance, in December of 2020, public reporting revealed a complex supply chain  attack against the update deployment mechanism of the SolarWinds Orion IT  management software. Those responsible for this attack were able to distribute  malicious code which had the ability to collect information about the host,  enumerate files and services on the system, modify registry keys, and terminate  system processes. According to CrowdStrikes report, supply chain attacks  represent an especially pernicious tactic because they allow malicious actors  to propagate their attack from a single point of intrusion to multiple  downstream targets. Following from this, CrowdStrike identifies the securing of  cloud environments as a priority for cybersecurity professionals in the years  to come.<\/p>\n<p>To chart  ongoing threats, CrowdStrike has also created an eCrime index based on various  observables which are weighted by impact and continuously monitored. The index  will allow users to remain aware of the changing mechanisms and tactics used to  exploit vulnerable systems and will include additional analysis provided by  CrowdStrikes subject matter experts.<\/p>\n<p>Access  CrowdStrikes full 2021 Global Threat Report.<\/p>\n<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Here is the original post:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.automationworld.com\/cybersecurity\/article\/21354953\/crowdstrike-releases-2021-cybersecurity-global-threat-report\" title=\"CrowdStrike Releases 2021 Cybersecurity Global Threat Report - Automation World\">CrowdStrike Releases 2021 Cybersecurity Global Threat Report - Automation World<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> As industrial companies connect plant-level software and devices to internet-connected enterprise systems, cybersecurity has become a critical operations issue for manufacturers of all sizes.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/automation\/crowdstrike-releases-2021-cybersecurity-global-threat-report-automation-world.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[431581],"tags":[],"class_list":["post-454522","post","type-post","status-publish","format-standard","hentry","category-automation"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/454522"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=454522"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/454522\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=454522"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=454522"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=454522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}