Express Computer
Home  »  News  »  Sophos Report: ‘Digital detritus’ leaving businesses vulnerable to attacks on network edge devices

Sophos Report: ‘Digital detritus’ leaving businesses vulnerable to attacks on network edge devices

0 24

Sophos has released its Annual Threat Report 2025: Cybercrime on Main Street, which sheds light on the biggest security threats small and medium-sized businesses faced in 2024. According to the report, the number one way attackers infiltrated networks was through network edge devices like firewalls, routers, and VPNs, accounting for the initial compromise in nearly 30% of cases.

“Over the past several years, attackers have aggressively targeted edge devices,” said Sean Gallagher, principal threat researcher at Sophos. “Compounding the issue is the increasing number of end-of-life (EOL) devices found in the wild – a problem Sophos calls digital detritus. Because these devices are exposed to the internet and often low on the patching priority list, they are a highly effective method for infiltrating networks.”

The report found that VPNs were the most frequent compromise point, accounting for over 25% of all incidents and 25% of ransomware and data exfiltration events. “Attackers don’t have to deploy custom malware anymore,” Gallagher explained. “Instead, they can exploit businesses’ systems, increasing their agility and hiding in the places security leaders aren’t looking.”

Other key findings from the Sophos report include:

  • Ransomware is still the biggest threat: Ransomware accounts for over 90% of incident response cases involving mid-sized organisations, and 70% of cases involving small businesses.
  • MFA is no longer enough: Attackers bypass multi-factor authentication through adversary-in-the-middle authentication token capture, using phishing platforms to mimic the authentication process and steal credentials.
  • Attackers favor commercial Remote access tools: The most frequently abused legitimate, trusted tools were commercial remote access tools, involved in 34% of incident response and managed detection and response cases.
  • Attackers are evolving their social engineering tactics: Attackers are turning to the abuse of QR codes (phishing) and phone messages (vishing) to compromise businesses, as well as email bombing – sending thousands of spam emails in as little as one or two hours.

Get real time updates directly on you device, subscribe now.

Leave A Reply

Your email address will not be published.

LIVE Webinar

Digitize your HR practice with extensions to success factors

Join us for a virtual meeting on how organizations can use these extensions to not just provide a better experience to its’ employees, but also to significantly improve the efficiency of the HR processes
REGISTER NOW 

Stay updated with News, Trending Stories & Conferences with Express Computer
Follow us on Linkedin
India's Leading e-Governance Summit is here!!! Attend and Know more.
Register Now!
close-image
Attend Webinar & Enhance Your Organisation's Digital Experience.
Register Now
close-image
Enable A Truly Seamless & Secure Workplace.
Register Now
close-image
Attend Inida's Largest BFSI Technology Conclave!
Register Now
close-image
Know how to protect your company in digital era.
Register Now
close-image
Protect Your Critical Assets From Well-Organized Hackers
Register Now
close-image
Find Solutions to Maintain Productivity
Register Now
close-image
Live Webinar : Improve customer experience with Voice Bots
Register Now
close-image
Live Event: Technology Day- Kerala, E- Governance Champions Awards
Register Now
close-image
Virtual Conference : Learn to Automate complex Business Processes
Register Now
close-image