searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine

Featured news

  • April 2021 Patch Tuesday forecast: Security best practices
  • Having a cybersecurity training program in place isn’t enough to ensure cyber safety
  • Cybersecurity threats and cybercrime trends of 2020
  • Most organizations have already migrated to a cloud VPN
  • Remote work: One of the legacies of the pandemic
Help Net Security
Help Net Security
October 8, 2020
Share

Number of corporate credentials exposed on the dark web increased by 429%

While there has been a year-over-year decrease in publicly disclosed data breaches, an Arctic Wolf report reveals that the number of corporate credentials with plaintext passwords on the dark web has increased by 429 percent since March.

corporate credentials dark web

For a typical organization, this means there are now, on average, 17 sets of corporate credentials available on the dark web that could be used by hackers.

With access to just one corporate account, attackers can easily execute account takeover attacks, which allow them to move laterally within an organization’s corporate network and gain access to sensitive data, intellectual property, competitive information, or funds.

Cybersecurity incidents now occur after hours

The sharp increase in corporate credential leaks underscores the need for organizations to have dedicated 24×7 monitoring of their network, endpoint, and cloud environments in order to prevent targeted attacks that could happen at any time.

Of the high-risk security incidents observed, 35% occur between the hours of 8:00 PM and 8:00 AM, and 14% occur on weekends; times when many in-house security teams are not online.

“The cybersecurity industry has an effectiveness problem. Every year new technologies, vendors, and solutions emerge. Yet, despite this constant innovation, we continue to see breaches in the headlines.

“The only way to eliminate cybersecurity challenges like ransomware, account takeover attacks, and cloud misconfigurations is by embracing security operations capabilities that fully integrate people, processes, and technology,” said Mark Manglicmot, VP Security Services, Arctic Wolf.

COVID-19 increasing the number of security operations challenges

  • A 64 percent increase in phishing and ransomware attempts – Hackers have created new phishing lures around COVID-19 topics and adapted traditional lures seeking to take advantage of remote workers.
  • Critical vulnerability patch time has increased by 40 days – A combination of higher common vulnerabilities and exposures (CVE) volumes, more critical CVEs, and the emergence of a remote workforce have significantly slowed the patching programs at many organizations.
  • Unsecured Wi-Fi usage is up by over 240 percent – Remote workforces connecting to open and unsecured Wi-Fi networks outside of their office or home are now facing increased risks of malware exposure, credential theft, and browser session hijacking.
More about
  • account hijacking
  • Arctic Wolf Networks
  • credentials
  • cyber risk
  • cybersecurity
  • dark web
  • data
  • data breach
  • hacking
  • network
  • passwords
  • phishing
  • ransomware
  • vulnerability
Share this
patch

April 2021 Patch Tuesday forecast: Security best practices

  • 4 things you can do to minimize cyberattacks on supply and value chains
  • Cloud-native watering hole attack: Simple and potentially devastating
How do I select an attack detection solution for my business?

What's new

infosec products of the week

New infosec products of the week: April 9, 2021

light

Having a cybersecurity training program in place isn’t enough to ensure cyber safety

patch

April 2021 Patch Tuesday forecast: Security best practices

snake

Cybersecurity threats and cybercrime trends of 2020

Don't miss

patch

April 2021 Patch Tuesday forecast: Security best practices

infosec products of the week

New infosec products of the week: April 9, 2021

Office 365

Office 365 phishing campaign uses publicly hosted JavaScript code

idea

4 things you can do to minimize cyberattacks on supply and value chains

cloud

Cloud-native watering hole attack: Simple and potentially devastating

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • Twitter

In case you’ve missed it

  • How do I select an attack detection solution for my business?
  • Zero Trust creator talks about implementation, misconceptions, strategy
  • How do I select a bot protection solution for my business?
  • With data volumes and velocity multiplying, how do you choose the right data security solution?

(IN)SECURE Magazine ISSUE 68 (March 2021)

  • Physical cyber threats: What do criminals leave when they break in?
  • Review: Group-IB Fraud Hunting Platform
  • Tips for boosting the “Sec” part of DevSecOps
Read online
© Copyright 1998-2021 by Help Net Security
Read our privacy policy | About us | Advertise