50% of organisations studied were victims of spear phishing in 2022

Barracuda Networks research finds 24% of organisations studied had at least one email account compromised through account takeover.

  • 4 months ago Posted in

The report presents propriety spear-phishing data and analysis, drawing on a data set that comprises 50 billion emails across 3.5 million mailboxes, including nearly 30 million spear-phishing emails. The report also features survey findings from Barracuda-commissioned research. The survey, conducted by independent researcher Vanson Bourne, questioned IT professionals from frontline to the most senior roles at 1,350 companies with 100 to 2,500 employees, across a range of industries in the U.S., EMEA, and APAC countries.

Overall, the research shows that cybercriminals continue to barrage organisations with targeted email attacks, and many companies are struggling to keep up. While spear-phishing attacks are low-volume, they are widespread and highly successful compared to other types of email attacks.

● Spear phishing is widespread: 50% of organisations analysed were victims of spear phishing in 2022, and a typical organisations received 5 highly personalized spear-phishing emails per day.

● These attacks are highly successful: Spear-phishing attacks make up only 0.1% of all e-mail based attacks, according to Barracuda data, but they are responsible for 66% of all breaches.

● Organisations are feeling the impact: 55% of respondents that experienced a spear-phishing attack reported machines infected with malware or viruses; 49% reported having sensitive data stolen; 48% reported having stolen login credentials; and 39% reported direct monetary loss.

● Threat detection and response remains a challenge: On average, organisations take nearly 100 hours to identify, respond to, and remediate a post-deliver email threat — 43 hours to detect the attack and 56 hours to respond and remediate after the attack is detected.

● Remote work is increasing risks: Users at companies with more than a 50% remote workforce report higher levels of suspicious emails — 12 per day on average, compared to 9 per day for those with less than a 50% remote workforce.

● Having more remote workers slows detection and response: Companies with more than a 50% remote workforce also reported that it takes longer to both detect and response to email security incidents — 55 hours to detect and 63 hours to response and mitigate, compared to an average of 36 hours and 51 hours respectively for organisations with fewer remote workers.

“Even though spear phishing is low volume, with its targeted and social engineering tactics, the technique leads to a disproportionate number of successful breaches, and the impact of just one successful attack can be devastating,” said Fleming Shi, CTO, Barracuda. “To help stay ahead of these highly effective attacks, businesses must invest in account takeover protection solutions with artificial intelligence capabilities. Such tools will have far greater efficacy than rule-based detection mechanisms. Improved efficacy in detection will help stop spear-phishing with reduced response needed during an attack.”

Once integrated into the WatchGuard Unified Security Platform architecture, the CyGlass technology will deliver AI- and ML-based detection of network anomalies and accelerate Open XDR capabilities.
Intel presents a software-defined, silicon-accelerated approach built on a foundation of openness, choice, trust and security.
BlueVoyant and Qualys join forces to offer an integrated managed service for Qualys VMDR and TotalCloud, delivering an enhanced vulnerability identification, cloud security, and compliance solution.
New cloud-centric platform, purpose-built for small and midsize MSPs, improves customer billing, reduces complexity, and maximizes revenues.
CloudBees has introduced a new cloud native DevSecOps platform that places platform engineers and developer experience front and center.
To mitigate ransomware attacks, IT professionals must consider both business-related and infrastructure data equally.
New solution combines forensics evidence with real-time telemetry to deliver unified insights into security incidents analysts need to perform investigation and response activities with efficiency and speed.
Orange Cyberdefense has launched a new security orchestration and automated response ‘as a service’ offering that provides cost-effective automation to streamline security, IT and business operations. By automating response-based actions through to the end user and driving a faster mean time to respond (MTTR) to security threats, AutoXR addresses the need for increased efficiencies and reduced costs, reducing the burden on staff who have limited time to execute tasks.