• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

A Third of Malicious Logins Originate in Nigeria

You are here: Home / General Cyber Security News / A Third of Malicious Logins Originate in Nigeria
March 18, 2022

A spear-phishing examine by security company Barracuda has observed that a 3rd of destructive logins into compromised accounts in 2021 came from Nigeria.

The obtaining was incorporated in the Spear Phishing: Prime Threats and Tendencies Vol. 7 – Critical conclusions on the newest social engineering techniques and the growing complexity of attacks  report, released by the firm on Wednesday.

The report is dependent on Barracuda researchers’ evaluation of “millions of e-mails across hundreds of businesses” among January 2021 and December 2021.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Researchers noticed: “A sizeable shift is underway as cyber-criminals transfer from volumetric to focused attacks, from malware to social engineering, from working as solitary hackers to forming structured legal enterprises profiting from attacks that start out with a single phishing email.”

They located that 51% of social engineering attacks had been phishing. Microsoft was the most impersonated model, made use of in 57% of phishing attacks. Scientists uncovered that approximately 500,000 Microsoft 365 accounts were compromised by threat actors in 2021.

A person in five organizations experienced an account compromised in 2021, with workforce at tiny enterprises far more than three times much more probably to be attacked. An average worker of a business enterprise with much less than 100 workers will obtain 350% far more social engineering attacks than another person employed at a greater enterprise.

A substantial improve in the level of popularity of discussion hijacking attacks was noticed, with the volume of attacks exploiting this vector growing by 270% over the 12 months. 

Researchers warned that email protection that relies on guidelines, policies, permit or blocklists, signatures and other styles of standard email security are no more time helpful against the continually evolving danger of socially engineered attacks simply because hackers can trick end users into taking actions such as sharing their qualifications. 

“Small firms often have fewer sources and absence security skills, which leaves them a lot more vulnerable to spear-phishing attacks, and cybercriminals are taking benefit,” said Don MacLennan, senior vice president of engineering and merchandise administration and email security at Barracuda. 

“That’s why it is critical for organizations of all sizes not to ignore investing in security, both equally technology and user education and learning. The problems brought on by a breach or a compromised account can be even additional expensive.


Some components of this report are sourced from:
www.infosecurity-journal.com

Previous Post: «open source dev attacked for spreading data wiping 'protestware' Open source dev attacked for spreading data-wiping ‘protestware’
Next Post: Russian Hackers Allegedly Compromise Ukrainian News Sites, Displaying ‘Z’ Symbol Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.