Wednesday, June 12 2024

Collaborative cybersecurity firm CrowdSec released the Q2 2023 Majority Report, spotlighting the effectiveness of crowdsourced data in detecting and thwarting malicious activities to prevent cyberattacks.

The report issued by CrowdSec outlines the prevailing threat categories based on their research findings. Notably, the Scan category accounted for nearly 60 percent of reported threats, wherein attackers systematically scanned networks to identify open ports, services, or vulnerabilities for exploitation. Exploits accounted for over 23 percent of threats, where cybercriminals targeted known vulnerabilities in specific systems. Brute Force comprised 15 percent of threats, in which attackers attempted to exploit weak passwords, frequently targeting SSH services. The remaining threat percentages were attributed to Crawl and Spam.

The comprehensive analysis of these prevalent threats further emphasizes CrowdSec’s automated response mechanisms. The system proactively bans IPs identified as scanners or exploiters, and the community blocklist contains over 20,000 IPs categorized under the scan threat. Employing a multi-vector approach, CrowdSec efficiently detects and thwarts brute force attacks across various services, bolstering the overall security posture of targeted organizations.

In an intriguing observation, cybersecurity experts have raised concerns about the escalating role of IPv6 in cyber criminal activities. Introduced as the successor to IPv4, IPv6 offers a significantly expanded address space to accommodate the ever-growing number of connected devices. Data collected by the CrowdSec network indicates a substantial 120% increase in IPv6 adoption between July 2017 and July 2023. By June 2023, IPv6 addresses constituted 20% of all reported IPs, pointing to a rising trend in cyber threats associated with IPv6. Moreover, the report identifies a noteworthy 35% surge in the rate of IPv6 addresses reported between May and June 2023, which coincided with a spike in scanning attacks during that period.

The report also examines the role of Virtual Private Networks (VPNs) and proxies in cybercriminal activities. Contrary to concerns regarding their exploitation by cyber attackers, data from the CrowdSec network reveals that only 5% of reported IPs are flagged as VPN or proxy users, indicating that VPNs are not the primary tools utilized for cyberattacks. The report hints that other factors may be driving the increase in cyber threats.

Maintaining a proactive security stance, CrowdSec emphasizes the vital role of hosters and cloud providers. These entities play a critical role in swiftly identifying and blocking malicious IPs associated with their assets. Such prompt and responsible actions are essential in curbing the spread of attacks and safeguarding legitimate business assets from being inadvertently blocked, ensuring smooth operations for potential customers and partners.

The Global CrowdSec Network constitutes an extensive and active ecosystem, comprising more than 65,000 installations that collectively share 14.5 million signals daily and reported 12.2 million malicious IPs during Q2 2023. Leveraging the power of collective intelligence and data sharing, CrowdSec presents a robust and innovative approach to threat detection and prevention, fortified by behavioral detection scenarios and remediation components.

CrowdSec places a strong emphasis on data integrity and user privacy. The data presented in this report solely pertain to threats reported during Q2 2023 by the CrowdSec network. Users have the option to disclose their alerts, enabling them to benefit from the community blocklist. Various metrics, including Trust Score, Diversity, Profiling, Range Reputation, and Expiration, are employed to assess and handle reported IPs, ensuring accuracy and efficacy in addressing cyber threats.

Previous

Cyclops Emerges From Stealth With $6.4M in Funding

Next

SEC Augments Cybersecurity Regulations with New Disclosure Rules  

Check Also

Widget

Don’t Miss

One Cloud

Trend Micro Cloud One: A Comprehensive Review

Ellie Buscemi

What is Cloud One by Trend Micro? The Cloud One platform by Trend Micro is a cloud posture security management (CPSM) product that focuses on providing security in the cloud to businesses. Trend One is designed for businesses whose infrastructure relies on a mix of cloud applications and older device-based programs. Examining the security capabilities […]

Best Security Information and Event Management (SIEM) Solutions

Lara Oporto

A Security Information and Event Management system (SIEM) is typically most needed in larger organizations or those with complex IT infrastructures where there’s a high volume of security events and logs generated from various sources. Companies often invest in SIEM when they require comprehensive visibility into their network activities and want to centralize security monitoring […]

Best Browser Security Products

Ellie Buscemi

What is Browser Security and how does it work? Browser Security is a subcategory of cybersecurity that focuses on minimizing a user’s vulnerability to cyber threats while they use the worldwide web. These cyber threats include phishing web pages, session hijacking and malware, which can be injected onto a device by means of tamped-with web […]

Headshot of BastionZero CEO Sharon Goldberg

Cloudflare Acquires BastionZero to Enhance SASE Offering

Nico Davidoff

Acquisition Aims to Boost Cloudflare One’s Capabilities Amidst Growing SASE Market Competition Cloudflare has acquired BastionZero, a zero trust infrastructure platform, in a move aimed at enhancing its Cloudflare One secure access service edge (SASE) offering. The acquisition underscores Cloudflare’s commitment to expanding its presence in the growing SASE market. Cloudflare reported first-quarter revenue of […]

Best Secure Access Service Edge Platforms

Lara Oporto

What is SASE and how does it work? Secure Access Service Edge (SASE) is an architectural model that combines network connectivity with security functions, all delivered through a unified cloud platform or centralized policy control. In contrast to the traditional approach, where network security relies on a multitude of distinct functionalities like firewalls, Virtual Private […]

Best Data Security Posture Management (DSPM) Products

Ellie Buscemi

What is Data Security Posture Management and how does it work? Data Security Posture Management (DSPM) tools focus on protecting data by continuously tracking where it is located and who has access to it. DSPM refers to a set of methods that cybersecurity professionals use to better understand their sensitive data like what it is, […]