Wednesday, April 24 2024

Collaborative cybersecurity firm CrowdSec released the Q2 2023 Majority Report, spotlighting the effectiveness of crowdsourced data in detecting and thwarting malicious activities to prevent cyberattacks.

The report issued by CrowdSec outlines the prevailing threat categories based on their research findings. Notably, the Scan category accounted for nearly 60 percent of reported threats, wherein attackers systematically scanned networks to identify open ports, services, or vulnerabilities for exploitation. Exploits accounted for over 23 percent of threats, where cybercriminals targeted known vulnerabilities in specific systems. Brute Force comprised 15 percent of threats, in which attackers attempted to exploit weak passwords, frequently targeting SSH services. The remaining threat percentages were attributed to Crawl and Spam.

The comprehensive analysis of these prevalent threats further emphasizes CrowdSec’s automated response mechanisms. The system proactively bans IPs identified as scanners or exploiters, and the community blocklist contains over 20,000 IPs categorized under the scan threat. Employing a multi-vector approach, CrowdSec efficiently detects and thwarts brute force attacks across various services, bolstering the overall security posture of targeted organizations.

In an intriguing observation, cybersecurity experts have raised concerns about the escalating role of IPv6 in cyber criminal activities. Introduced as the successor to IPv4, IPv6 offers a significantly expanded address space to accommodate the ever-growing number of connected devices. Data collected by the CrowdSec network indicates a substantial 120% increase in IPv6 adoption between July 2017 and July 2023. By June 2023, IPv6 addresses constituted 20% of all reported IPs, pointing to a rising trend in cyber threats associated with IPv6. Moreover, the report identifies a noteworthy 35% surge in the rate of IPv6 addresses reported between May and June 2023, which coincided with a spike in scanning attacks during that period.

The report also examines the role of Virtual Private Networks (VPNs) and proxies in cybercriminal activities. Contrary to concerns regarding their exploitation by cyber attackers, data from the CrowdSec network reveals that only 5% of reported IPs are flagged as VPN or proxy users, indicating that VPNs are not the primary tools utilized for cyberattacks. The report hints that other factors may be driving the increase in cyber threats.

Maintaining a proactive security stance, CrowdSec emphasizes the vital role of hosters and cloud providers. These entities play a critical role in swiftly identifying and blocking malicious IPs associated with their assets. Such prompt and responsible actions are essential in curbing the spread of attacks and safeguarding legitimate business assets from being inadvertently blocked, ensuring smooth operations for potential customers and partners.

The Global CrowdSec Network constitutes an extensive and active ecosystem, comprising more than 65,000 installations that collectively share 14.5 million signals daily and reported 12.2 million malicious IPs during Q2 2023. Leveraging the power of collective intelligence and data sharing, CrowdSec presents a robust and innovative approach to threat detection and prevention, fortified by behavioral detection scenarios and remediation components.

CrowdSec places a strong emphasis on data integrity and user privacy. The data presented in this report solely pertain to threats reported during Q2 2023 by the CrowdSec network. Users have the option to disclose their alerts, enabling them to benefit from the community blocklist. Various metrics, including Trust Score, Diversity, Profiling, Range Reputation, and Expiration, are employed to assess and handle reported IPs, ensuring accuracy and efficacy in addressing cyber threats.


Cyclops Emerges From Stealth With $6.4M in Funding


SEC Augments Cybersecurity Regulations with New Disclosure Rules  

Check Also


Don’t Miss

The words Endpoint Detection and Response (EDR) on a green background with lines on the right side of the image

Best Endpoint Detection & Response Platforms

Lara Oporto

Endpoint Detection & Response platforms continuously monitor endpoints for signs of malicious activities, such as unauthorized access or unusual behavior, enabling rapid detection and response to potential cyber threats to safeguard organizational assets. What is Endpoint Detection and Response and how does it work? Endpoint Detection and Response (EDR) is a cornerstone in modern cybersecurity […]

AT&T AlienVault Products Review: OSSIM vs USM

Ellie Buscemi

AlienVault is now the technological basis for AT&T AlienLabs and provides multiple products for different companies’ cybersecurity needs. What AT&T AlienVault Products are Available? In December 2021, CISOstack reported that AT&T intended to acquire AlienVault to expand its cybersecurity offerings to more businesses. Two years later, AlienVault-based offerings make up a large portion of AT&T’s […]

Photo by Simon Kadula on Unsplash.

Navigating Manufacturing IIoT Cybersecurity Challenges

John Powers

Guarding the Gears: Government policy and industry collaboration to mitigate cyberthreats to manufacturers. The smart factory is on the rise. Production lines equipped with advanced sensors can monitor equipment health in real-time and predict potential issues before they disrupt operations. Temperature and humidity sensors can ensure the optimal environment for delicate manufacturing processes. RFID-enabled asset […]

Best Microsegmentation Software

Ellie Buscemi

Microsegmentation allows a company to divide digital assets into smaller, more secure groups, which makes it harder for cybercriminals to take over a company’s data center. What is Microsegmentation? Microsegmentation refers to cyber professionals building layers of cybersecurity protection between groups of digital assets or individual cyber assets. Adding these layers inside instead of only […]

Best Breach and Attack Simulation Platforms

Ellie Buscemi

Breach and attack simulation (BAS) platforms allow companies to see weaknesses in their cyber infrastructures before a malicious hacker can exploit them. What Is BAS – Breach and Attack Simulation? Breach and attack simulation (BAS) is an approach to cybersecurity that uses advanced tools to imitate the attacks used by cybercriminals on companies’ digital infrastructure. […]

Ofer Ben-Noon and Ohad Bobrov

Palo Alto Networks to Acquire Talon

Ellie Buscemi

On Monday, Palo Alto Networks agreed to acquire Israeli startup Talon Cyber Security, an enterprise browser platform. The deal values Talon at between $600 to $700 million, according to The Information. Palo Alto will integrate Talon’s enterprise browser solution into its Prisma SASE product. The acquisition comes among a wave of acquisitions and releases involving […]