An insurer’s perspective on threats today
Lars Hedensjö, Cyber Underwriter at If explains, "In the Nordic region, the number of ransomware attacks has increased marginally in 2023 when compared to 2022. Extortionists prefer to target large companies as they have more resources. Still, in 2023 the proportion of ransomware attacks against large companies (over 5,000 employees) has decreased in relation to medium-sized companies (501–5,000 employees). Currently, the percentage of ransomware attacks, as distributed by company size, is:
- 17% of incidents occur in large companies
- 34% in medium-sized companies
- 25% in smaller companies (51–500 employees), and
- 24% in small companies (1–50 employees)
Presumably, large companies’ investments in improved security have had an impact, which then influences the extortionists to continue with more vulnerable medium-sized companies."1
He continues, "In 2023, the most common type of attack in the Nordic region was extortion, accounting for 32% of cases. The second most common was contained attacks at 20%, where the attacker gained an initial foothold but was detected and stopped before further damage could occur. Business Email Compromise (BEC), accounts for 16% of cases. These attacks often begin with a phishing email that allows the attacker to obtain the victim's email login credentials. The attacker then monitors the email correspondence waiting for opportunities, such as intercepting account details. BEC attacks have seen a large percentage increase from 2022 to 2023."2
The primary attack vectors used were vulnerabilities, which accounted for 38% of cases. These weaknesses were found in services that were directly accessible from the internet. When extortionists engage in mass exploitation, they often install backdoors to maintain access if the organisation updates its systems to remove the vulnerability, allowing them to return later for an extortion attempt. Additional attack vectors include valid accounts (26%), phishing (23%), trusted services and supply chain attacks (10%), and other methods (3%). Trusted services have shown the most growth in usage, although they are primarily used by the most advanced ransomware groups.3