In a recent analysis of cyber-attacks in 2023, SecureClaw Cyber Threat Advisory identified several key trends and gaps in security. Throughout the year, cybercriminals targeted various industries, including automobiles, manufacturing, software providers, energy, telecom, healthcare, and government organizations. The most common targets for cyber threats were database systems, IT infrastructures, software systems, websites, servers, and mobile apps. Cybercriminals used a variety of techniques and attack methods, such as ransomware, malware, phishing, DDoS, unauthorized access, backdoors, and credential theft.
The purpose of these cyber-attacks ranged from damaging reputations and disrupting business activities to extortion and illegal access to data. Some attacks were state-sponsored, particularly in regions experiencing conflicts and wars. Notably, the cyber domain was significantly impacted by the Israel-Hamas war and attempts by Iran to infiltrate Israel’s water systems.
Throughout 2023, various ransomware gangs were active, targeting large enterprises such as Volvo Car, Ferrari, Tesla, and Spanish bank Globalcaja. Each ransomware gang had their own unique patterns and techniques, such as demanding millions of dollars in ransom or using a ransomware as a service (RaaS) business model. Other types of malware, such as Frebniis Malware and Emotet, were also prevalent.
To improve cybersecurity and resilience, organizations should adopt cybersecurity standards and best practices, provide cybersecurity awareness training for employees, securely backup important data, and regularly monitor network activity. Additionally, organizations should develop a business continuity plan to ensure they can respond effectively to cyber threats and other unexpected events.