As cybersecurity threats become more frequent and sophisticated, businesses in Greece are facing greater challenges in safeguarding their valuable assets. Over the past quarter, there has been a high increase in cyberattacks across Greece, with various attack types on the rise, according to statistics, by Odyssey SOC, (Security Operation Center).

Our SOC has released the latest cybersecurity statistics, revealing a concerning trend in the significant increase of certain types of attacks during the last quarter in Greece. This surge is predicted to continue and intensify, emphasizing the crucial need for strong cybersecurity measures to protect against potential threats.

The statistics provided specifically outline the six types of attacks that have experienced the most significant increase in comparison to a three-month period. The data presented is solely derived from confirmed incidents and not from alerts or automatic statistics generated by security controls, as they may not provide accurate insights.

Process Monitoring: Malicious Windows Processes on the Rise

In recent months, we have observed a significant 55% increase in the detection of malicious Windows processes, highlighting a concerning trend. These processes often originate from malware infections, particularly those associated with ransomware. Malicious Windows processes can infiltrate your systems, compromising their integrity and potentially leading to data loss or unauthorized access to sensitive information.

To protect against these types of attacks, it is crucial to keep your systems and software up-to-date at all times. Additionally, ensure the implementation of strong security measures, including firewalls and antivirus software, to enhance your defense against malicious Windows processes.

Communication with C2C: Botnet Communication Attempts Increase

Another alarming trend we’ve observed is a 51% increase in communication attempts between known botnets and other systems. Botnets, which serve as “control centres,” utilize a large network of compromised devices to launch coordinated attacks, often in the form of Distributed Denial of Service (DDoS) attacks. These attacks can cripple your network infrastructure and disrupt your online services, leading to financial losses and reputational damage.

To mitigate the risk of such attacks, it is essential to establish robust network security measures. Implementing firewalls and intrusion detection systems will help safeguard your systems and prevent communication attempts from and to known botnets.

Destruction of Records: Ransomware Attacks on the Rise

The prevalence of ransomware attacks has seen a concerning 46% increase, resulting in a significant rise in data encryption for ransom or non-disclosure on the dark web. Ransomware poses a severe threat to businesses as it can encrypt critical data and hold it hostage until a ransom is paid, or threaten to publicly disclose sensitive information. These attacks can cause substantial financial losses, reputational damage, and disruptions to business operations. Preventing ransomware attacks requires a proactive approach. Regularly backing up your data and storing it securely is crucial. Furthermore, fortify your defenses by deploying comprehensive security measures, such as firewalls, antivirus software, and intrusion detection systems.

Data Exfiltration: Final Stage of an Attack

The alarming 25% increase in data exfiltration underscores the significance of this final stage in successful cyberattacks. Data exfiltration refers to the unauthorized extraction of an organization’s sensitive information by attackers who have breached their systems. The detection of data exfiltration indicates that an attack has already compromised security defenses and potentially caused substantial damage.

Safeguarding against data exfiltration necessitates the implementation of robust security measures. Deploying effective solutions such as firewalls, intrusion detection system, and data loss prevention systems will help prevent successful data theft and enhance detection capabilities.

Unauthorized Administration of Devices and Systems: A Risky Activity

A concerning 21% increase has been observed in activities related to the unauthorized use of systems with accounts possessing high-level privileges. These activities presuppose that attackers have gained access to usernames and passwords through techniques like phishing or brute force attacks. Unauthorized administration of devices and systems grants attackers significant control and privileges, enabling them to exploit vulnerabilities, compromise data integrity, and escalate their attacks within an organization’s infrastructure. Mitigating the risks associated with unauthorized system administration calls for stringent authentication measures. Implementing two-factor authentication and ensuring that all user accounts are secured with strong passwords are crucial steps to prevent potential attacks.

By prioritizing cybersecurity, we not only protect our digital infrastructure but also foster the trust necessary for our interconnected society to thrive.

In today’s interconnected world, cyber threats are prevalent and complex, and organizations in Greece must remain vigilant. Recent cybersecurity trends, including an increase in malicious Windows processes, botnet communication attempts, ransomware attacks, credential-stealing Trojans, data exfiltration, and unauthorized system administration, highlight the need for strong security measures and staying up-to-date with the latest trends.

SIGN UP

Keep up to date with our weekly
digest of articles

We are committed to protecting your privacy and complying with the General Data Protection Regulation (GDPR). By completing this form, you consent to the collection and processing of your personal data for the purpose of processing your inquiry. Your data will be handled securely and will not be shared with third parties without your explicit consent. You have the right to access, rectify, or delete your personal data at any time by contacting us at [email protected]. For more information on how we handle your data, please refer to our Privacy Notice. Any confidential information you share about your organization will be handled in strict confidence