CrowdStrike has released the 2021 CrowdStrike Global Threat Report, detailing unique insights to the global threat landscape and offering best practices for organisations looking to amplify their cybersecurity maturity in 2021. The findings suggest supply chain attacks, ransomware, data extortion and nation-state threats prove to be more prolific than ever. On the heels of unprecedented growth in eCrime, CrowdStrike has introduced a new eCrime index (ECX) in this year’s report. The ECX displays the strength, volume and sophistication of the cybercriminal market, and is updated weekly in real-time based on 18 unique indicators of criminal activity.
The 2021 Global Threat Report highlights that eCrime attacks made up 79% of all intrusions (via hands-on-keyboard activity) uncovered by CrowdStrike Falcon OverWatch, the organisation’s expert team of threat hunters. Among a popular vector for cyber criminals is the supply chain as it allows malicious actors to propagate multiple downstream targets from a single intrusion. Additionally, the report spotlights how nation-state adversaries infiltrated networks to steal valuable data seeking COVID-19 vaccine research, whereby threat actors have improved strategies to evade detection and camouflage in networks, many times deceiving their targets.
“There is a human being behind every attack, and cyber actors are getting bolder and more astute day-to-day. As such, it’s critical to employ comprehensive cloud-native technology for increased visibility and prevention capabilities including threat intelligence and expert threat hunting to stay one step ahead of modern day attacks. Additionally, today’s rapidly changing remote work environment highlights that identity protection is central to the defence of any enterprise’s infrastructure. Organisations must take decisive action to control access and protect data in order to outmanoeuvre adversaries,” said Adam Meyers, senior vice president of intelligence at CrowdStrike.
Other key findings from the 2021 Global Threat Report include: