Kaspersky’s New Report Reveals the Top Cyber Threats for SMBs in 2023

We Keep you Connected

Kaspersky’s New Report Reveals the Top Cyber Threats for SMBs in 2023

Kaspersky’s New Report Reveals the Top Cyber Threats for SMBs in 2023
Your email has been sent
A new report from Kaspersky reveals the top cyber threats for SMBs in 2023. Read more about it and how to protect organizations from it.
According to a new report from Kaspersky, small and medium-sized businesses are facing various cybersecurity threats; the biggest issues are exploits against their infrastructure, malware for different purposes and backdoors.
Jump to:
The biggest cybersecurity threat to SMBs is the use of exploits by attackers; there were 483,980 detections in the five first months of 2023. The successful use of exploits allows an attacker to compromise a system or a computer, elevate their privileges, plant malware, steal sensitive data or even crash systems or delete information, depending on the exploit type.
The second biggest cybersecurity threat is Trojans. Trojans are malicious software that, once installed on a system, provide the ability to install more malware or execute programs or commands in the background without alerting the users. Depending on the purpose of the Trojan, it might also be used for deleting, blocking, modifying or copying data or facilitating further compromise.
The third biggest cybersecurity threat for SMBs is backdoors, which are malware that provides remote access to attackers. Those accesses can then be used for manipulating files, exfiltrating sensitive data such as intellectual property and more.
Kaspersky’s research shows that the global number of cybersecurity attacks when comparing January 2022 to May 2022 and January 2022 to May 2023 has decreased by 42%, yet the types of attacks stayed the same (Figure A and Figure B).
Figure A
Figure B
Between January 1 and May 18, 2023, a total of 1,201,436 detections were triggered, while the same period in 2022 triggered 698,423 detections.
All of these cybersecurity threats can be operated by attackers for a variety of purposes, including cyberespionage and data theft (e.g., organizations’ sensitive information, trade secrets and employees’ personally identifiable information) and financial gain operations (e.g., business email compromise operations and credit card information theft).
SMBs’ employees very often receive phishing emails from attackers pretending to be a legitimate service that the user operates, a trusted partner, a software vendor, a financial institution, or a delivery service (Figure C). According to research from cybersecurity leader Barracuda Networks, an average employee of an SMB receives 350% more social engineering attacks than an employee of a larger company.
Figure C
Other social engineering techniques consist of reaching users via email and offering attractive deals or money to the recipient (Figure D). Yet when the user answers, they will be tricked into providing data and possibly credentials, credit card information or corporate access, depending on the attack.
Figure D
The last example provided by Kaspersky is QBot malware diffusion. In this case, the attacker gains access to a legitimate email box of a corporate user. The emails are then selected, and the reply function is used to send a message to the original sender with a link leading to a QBot infection. The technique is known as conversation hijack as the attacker joins an existing email dialogue to try to infect more employees. Since the email answer comes from a legitimate account that has been compromised, it is very difficult to detect this cybersecurity threat.
There are various reasons why cybercriminals target SMBs, but the main two reasons are:
In the last few years, SMBs have become increasingly targeted by cybercriminals and are even more targeted than large corporations, according to Barracuda Networks.
SMBs are advised to have all systems — hardware and software — up to date and patched in order to avoid attackers using exploits against known vulnerabilities.
It is strongly recommended to use security solutions on endpoints and servers that minimize the chances of being compromised or infected by malware. Email security solutions should be deployed in order to detect and block phishing attempts. In addition, cloud storage and services should be monitored to detect any unusual activity that could be the result of an attacker’s behavior.
Access control policies should be deployed, especially for corporate VPN access, in addition to deploying multifactor authentication so an attacker cannot log in even when they are in possession of valid credentials.
Cybersecurity awareness and training programs should be provided for all employees.
Disclosure: I work for Trend Micro, but the views expressed in this article are mine.
Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices.
Kaspersky’s New Report Reveals the Top Cyber Threats for SMBs in 2023
Your email has been sent
Your message has been sent
TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project.
Get up and running with ChatGPT with this comprehensive cheat sheet. Learn everything from how to sign up for free to enterprise use cases, and start using ChatGPT quickly and effectively.
Get the most out of your payroll budget with these free, open source payroll software options. We’ve evaluated the top eight options, giving you the information you need to make the right choice.
We highlight some of the best certifications for DevOps engineers. Learn more about DevOps certifications.
With so many project management software options to choose from, it can seem daunting to find the right one for your projects or company. We’ve narrowed them down to these ten.
This Microsoft PowerToys app simplifies the process of visualizing and modifying the contents of the standard Windows Registry file.
Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices.
Recruiting a Linux administrator with the right combination of technical expertise and experience will require a comprehensive screening process. This hiring kit from TechRepublic Premium provides an adjustable framework that your business can use to find the right person for the job. From the hiring kit: INTRODUCTION Because of the nature of open-source technology, Linux …
Security measures and other IT controls only work if they are implemented consistently, predictably and with integrity. The IT audit director develops and schedules internal audits to measure and document whether those IT controls were followed as prescribed. This hiring kit from TechRepublic Premium can give your enterprise a head start on finding your ideal …
Recruiting an iOS developer with the right combination of design and programming expertise will require a comprehensive screening process. This hiring kit from TechRepublic Premium can give your enterprise a head start on finding your ideal candidate. From the hiring kit: INTRODUCTION Whether the underlying reasons are personal or business, people living in the modern …
TechRepublic Premium was at Snowflake Summit 2023, the company’s annual user conference held in Las Vegas, June 26-29. In this feature, learn about Snowflake’s data strategies, how it is expanding generative AI LLM vocabulary and its latest joint product integrations with Microsoft. From the download: Snowflake chairman and CEO Frank Slootman kicked off Snowflake Summit …

source

GET THE LATEST UPDATES, OFFERS, INFORMATION & MORE