Q3 2024: Over Half A Million Cyber Attacks On Critical Infrastructure

Blackberry has released its latest Global Threat Intelligence Report which looks at new trends in the cyber security threat landscape. Between July and September 2024.

Over the period, BlackBerry detected 600,000 attacks against critical infrastructure, 45 percent of which targeted the financial sector. They also detected 430,000 attacks against private sector organisations.  

The Report examines the behaviours of dangerous, lesser- known, threat actors and trends in their methodologies and motivations. In particular, the report  addresses threats in telecommunications infrastructure, highlighting strategies to better protect personal devices and secure communication best practices.  

The report also features insights from a continued partnership between BlackBerry and the Royal Canadian Mounted Police’s National Cyber Crime Coordination Centre (NC3). Together, the two organisations share intelligence on the rise of new ransomware groups, top ransomware threats, and challenges for law enforcement in combatting cyber attacks. 

In comment, Ismael Valenzuela, Vice President of Threat Research & Intelligence at BlackBerry said “Our attack surface has never been wider, with threat actors and nation states broadening their horizons into cyber espionage attacks, while ransomware groups are becoming more sophisticated in their campaigns, however, we’ve also never been better prepared...We have the tools, technology, and protocols to protect ourselves and mitigate the impact of attacks, and our industry is equipped to keep up with changes in threat actor methodology.” 

Additional highlights from the latest BlackBerry Global Threat Intelligence Report include: 

  • North America and Latin America are the Most Targeted Nations Globally: These nations saw the highest volume of attacks and most instances of unique malware. APAC and EMEA were the second and third most targeted regions, respectively. 
  • Emerging Threats Are Increasingly Dangerous: BlackBerry internal telemetry identified activity related to Lynx ransomware, the Coyote banking trojan, and threat groups RansomHub and Hunter’s International. 
  • Deepfake Threats Continue to Rise: The growing use of AI-based scams has led to new regulatory frameworks nationwide to mitigate the impact, including the US No AI Fraud Act and the Canadian non-consensual media legislation. 
  • Geopolitical Influences are Creating Concerning Threats: BlackBerry analysts found that cybercrime is being used in human trafficking rings in Southeast Asia, and North Korean operatives are using deepfake technology and fake identities to infiltrate Western IT companies. 

You can download Bleackberry's  Global Threat Intelligence Report Here:

Image: @BlackBerry

You Might Also Read: 

Is The British Government Doing Enough To Combat Cyberattacks Against Critical Infrastructure?:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« AI-Enhanced Attacks Are A Rising Threat
The British Government’s AI Action Plan  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TitanFile

TitanFile

TitanFile is an award-winning, easy and secure way for professionals to communicate without having to worry about security and privacy.

HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking, a Hewlett Packard Enterprise company, is a leading provider of next-generation network access solutions for the mobile enterprise.

PSYND

PSYND

PSYND is a Swiss consultancy company based in Geneva specialized in CyberSecurity and Identity & Access Management.

Plug and Play Tech Center

Plug and Play Tech Center

Plug and Play is the ultimate innovation platform, bringing together the best startups and the world’s largest corporations.

Center for Education & Research in Information Assurance & Security (CERIAS)

Center for Education & Research in Information Assurance & Security (CERIAS)

CERIAS is one of the world’s leading centers for research and education in areas of information and cyber security.

ITTAS

ITTAS

ITTAS is a multidisciplinary company specializing in information security and software and hardware protection software.

CloudBolt Software

CloudBolt Software

CloudBolt provide solutions for your toughest cloud challenges. From automation, to cost and security, and hybrid IT governance — we have you covered.

World Cyber Security Summit

World Cyber Security Summit

World Cyber Security Summit, by Trescon, is a thought-leadership driven platform for CISOs who are looking to explore new-age threats and the technologies/strategies that can help mitigate them.

Fibernet

Fibernet

Fibernet's innovative solutions in the fields of cybersecurity and fiber optics range from telecommunications infrastructure to small business cybersecurity.

Pulsant

Pulsant

Pulsant is the UK’s premier digital edge infrastructure company providing next-generation cloud, colocation and connectivity services.

Proximus Ada

Proximus Ada

Proximus Ada is the first Belgian center of excellence combining artificial intelligence and cybersecurity.

PingSafe

PingSafe

PingSafe is creating the next-generation cloud security platform powered by attackers' intelligence, providing coverage for vulnerabilities that traditional security solutions would otherwise overlook

Downdetector

Downdetector

Downdetector helps people all over the world understand disruptions to vital services such as the internet, social media, web hosting platforms, banks, games, entertainment, and more.

Cytacs

Cytacs

Cytacs is the AI-powered cyber security platform specifically designed for small and medium-scale enterprises.

CYNC Secure

CYNC Secure

CYNC boosts cybersecurity remediation by consolidating fragmented data and optimizing operational processes.

Vulnify

Vulnify

At Vulnify, we’re revolutionizing the way businesses identify and manage security vulnerabilities.