{"id":350,"date":"2024-03-11T15:17:00","date_gmt":"2024-03-11T15:17:00","guid":{"rendered":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northwestcrc\/?p=350"},"modified":"2025-11-19T15:47:12","modified_gmt":"2025-11-19T15:47:12","slug":"online-identity-theft-is-a-key-driver-of-cyber-attacks","status":"publish","type":"post","link":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northwestcrc\/2024\/03\/11\/online-identity-theft-is-a-key-driver-of-cyber-attacks\/","title":{"rendered":"Online identity theft is a key driver of cyber attacks"},"content":{"rendered":"\n<p>New research from IBM has found that cyber attackers are using real accounts to gain access to IT systems and websites, instead of hacking into the system. This \u2018path of least resistance\u2019 means this method has seen an increase by a huge 71%, from the previous year. The report found that 50% of cyber attacks in the UK now involved the use of valid existing accounts.<\/p>\n\n\n\n<p>The data from <a href=\"https:\/\/www.ibm.com\/reports\/threat-intelligence\" data-type=\"link\" data-id=\"https:\/\/www.ibm.com\/reports\/threat-intelligence\">IBM\u2019s X-Force Threat Intelligence Index<\/a> explained that there are billions of account log in details, that have previously been hacked or stolen via malware, available to buy on the Dark Web, which are then being used by criminals to access accounts. Europe is the most targeted global region of 2023.<\/p>\n\n\n\n<p>In 2023, IBM\u2019s X-Force observed a 266% increase in infostealing malware, which is designed to steal personal and enterprise credentials, personally identifiable information, and banking and crypto wallet information. In addition to this, data theft and leak incidents rose by a third (32%) in 2023.<\/p>\n\n\n\n<p>Interestingly, the report also found that 84% of critical infrastructure incidents could have been avoided with cyber security best practice.<\/p>\n\n\n\n<p>This shows why creating secure passwords, as well as good password management within teams and businesses, is extraordinarily important. Being negligent in this area of cyber security can have a huge knock-on effect in terms of larger cyber breaches.<\/p>\n\n\n\n<p>DI Dan Giannasi, head of cyber and innovation at the NWCRC, said: \u201cThis is a very interesting but also highly worrying report from IBM, and it shows just how vital basic cyber security hygiene is for individuals and small businesses.<\/p>\n\n\n\n<p><br>\u201cCyber criminals are now preferring to use real people\u2019s accounts, the details of which can be bought and sold online from huge data breaches, in order to compromise businesses online.<\/p>\n\n\n\n<p><br>\u201cOur advice is always that small businesses need to take password management and online account security very very seriously.<\/p>\n\n\n\n<p><br>\u201cThis means choosing a secure and hard to guess password, updating it regularly and when prompted, as well as updating software when prompted.<\/p>\n\n\n\n<p><br>\u201cA good way of choosing a unique and secure password is the \u2018three random words\u2019 advice from the NCSC, which means selecting <a href=\"https:\/\/www.ncsc.gov.uk\/collection\/top-tips-for-staying-secure-online\/three-random-words\" data-type=\"link\" data-id=\"https:\/\/www.ncsc.gov.uk\/collection\/top-tips-for-staying-secure-online\/three-random-words\">three completely different<\/a> words, which make the password longer and stronger, and therefore much harder to hack.\u201d<\/p>\n\n\n\n<p>The X-Force Threat Intelligence Index is based on insights and observations from monitoring over 150 billion security events per day in more than 130 countries.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>New research from IBM has found that cyber attackers are using real accounts to gain access to IT systems and websites, instead of hacking into&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-350","post","type-post","status-publish","format-standard","hentry","category-uncategorised"],"acf":[],"_links":{"self":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northwestcrc\/wp-json\/wp\/v2\/posts\/350","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northwestcrc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northwestcrc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northwestcrc\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northwestcrc\/wp-json\/wp\/v2\/comments?post=350"}],"version-history":[{"count":1,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northwestcrc\/wp-json\/wp\/v2\/posts\/350\/revisions"}],"predecessor-version":[{"id":352,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northwestcrc\/wp-json\/wp\/v2\/posts\/350\/revisions\/352"}],"wp:attachment":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northwestcrc\/wp-json\/wp\/v2\/media?parent=350"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northwestcrc\/wp-json\/wp\/v2\/categories?post=350"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northwestcrc\/wp-json\/wp\/v2\/tags?post=350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}