Q3 2024: Over Half A Million Cyber Attacks On Critical Infrastructure

Blackberry has released its latest Global Threat Intelligence Report which looks at new trends in the cyber security threat landscape. Between July and September 2024.

Over the period, BlackBerry detected 600,000 attacks against critical infrastructure, 45 percent of which targeted the financial sector. They also detected 430,000 attacks against private sector organisations.  

The Report examines the behaviours of dangerous, lesser- known, threat actors and trends in their methodologies and motivations. In particular, the report  addresses threats in telecommunications infrastructure, highlighting strategies to better protect personal devices and secure communication best practices.  

The report also features insights from a continued partnership between BlackBerry and the Royal Canadian Mounted Police’s National Cyber Crime Coordination Centre (NC3). Together, the two organisations share intelligence on the rise of new ransomware groups, top ransomware threats, and challenges for law enforcement in combatting cyber attacks. 

In comment, Ismael Valenzuela, Vice President of Threat Research & Intelligence at BlackBerry said “Our attack surface has never been wider, with threat actors and nation states broadening their horizons into cyber espionage attacks, while ransomware groups are becoming more sophisticated in their campaigns, however, we’ve also never been better prepared...We have the tools, technology, and protocols to protect ourselves and mitigate the impact of attacks, and our industry is equipped to keep up with changes in threat actor methodology.” 

Additional highlights from the latest BlackBerry Global Threat Intelligence Report include: 

  • North America and Latin America are the Most Targeted Nations Globally: These nations saw the highest volume of attacks and most instances of unique malware. APAC and EMEA were the second and third most targeted regions, respectively. 
  • Emerging Threats Are Increasingly Dangerous: BlackBerry internal telemetry identified activity related to Lynx ransomware, the Coyote banking trojan, and threat groups RansomHub and Hunter’s International. 
  • Deepfake Threats Continue to Rise: The growing use of AI-based scams has led to new regulatory frameworks nationwide to mitigate the impact, including the US No AI Fraud Act and the Canadian non-consensual media legislation. 
  • Geopolitical Influences are Creating Concerning Threats: BlackBerry analysts found that cybercrime is being used in human trafficking rings in Southeast Asia, and North Korean operatives are using deepfake technology and fake identities to infiltrate Western IT companies. 

You can download Bleackberry's  Global Threat Intelligence Report Here:

Image: @BlackBerry

You Might Also Read: 

Is The British Government Doing Enough To Combat Cyberattacks Against Critical Infrastructure?:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« AI-Enhanced Attacks Are A Rising Threat
The British Government’s AI Action Plan  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Silent Breach

Silent Breach

Silent Breach specializes in network security and digital asset protection. Services include Pentesting, Security Assessments, Incident Detection & Response, Governance Risk & Compliance.

K2 Integrity

K2 Integrity

K2 Integrity is a preeminent risk, compliance, investigations, and monitoring firm - built by industry leaders to safeguard our clients’ operations, reputations, and economic security.

Cipher Tooth

Cipher Tooth

CipherTooth is a superior system for delivering secure content over the Internet.

RiskIQ

RiskIQ

RiskIQ is the leader in digital threat management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence.

GeoLang

GeoLang

GeoLang’s Ascema platform protects sensitive information at the content level by identifying, classifying and tracking data across the corporate infrastructure.

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling and Data Destruction protect the environment and your data with proven and trusted electronics recycling and data destruction services.

Nu Quantum

Nu Quantum

Nu Quantum is developing quantum photonics hardware to power the quantum revolution in communications, sensing and computing.

Atakama

Atakama

With Atakama, data remains encrypted until the very moment it is used, and the ability to decrypt is based on zero trust architecture.

Revere Technologies

Revere Technologies

Revere Technologies is a pure-play cyber security solutions and services provider in Sub-Saharan Africa.

Hyperion Gray

Hyperion Gray

Hyperion Gray are a small research and development team focused on innovative work in a variety of areas including Software & Security Research, Penetration Testing, Incident Response, and Red Teaming

CoreStack

CoreStack

CoreStack helps enterprises overcome cloud challenges such as ever growing security risks, stringent regulatory compliance needs and operational complexities.

Apura Cybersecurity Intelligence

Apura Cybersecurity Intelligence

Apura is a Brazilian company that develops advanced products and provides specialized services in information security and cyber defense.

Vertek

Vertek

Vertek is a leading provider of operations consulting, end-to-end business process outsourcing, business intelligence, software applications and managed cybersecurity solutions.

Cybit

Cybit

Cybit is the one-stop-shop for digital transformation that scales in line with your growth.

Access Talent Today

Access Talent Today

Access Talent Today is an AI/ML and cyber security talent provider.

DeepTempo

DeepTempo

At DeepTempo, we build AI models and related software that protect enterprises and service providers from sophisticated cyber threats.