Report Identifies Increasing Evidence of Cyber Attacks Penetrating Networks

A new study has identified a surge in the typical indicators of targeted attacks on today's networks. In a six-month study of 40 customer and prospect networks (a total of more than 250,000 hosts) across multiple industries, malware detection company Vectra Networks found a 580 percent increase in lateral movement detections and a 270 percent increase in reconnaissance detections compared to last year — both signs of targeted attacks that have penetrated a network's security perimeter. Nearly 25 percent of the data analyzed was from education networks.

"The increase in lateral movement and reconnaissance detections shows that attempts at pulling off targeted attacks continue to be on the rise," said Oliver Tavakoli, CTO for Vectra Networks, in a press release. "The attackers' batting average hasn't changed much, but more at-bats invariably has translated into more hits."

While the study found just 6 percent growth in command-and-control communication, high-risk Tor detections jumped by more than 1,000 percent, accounting for 14 percent of all command-and-control traffic. External remote access increased by 183 percent over last year.

In addition, a comparison of hidden tunnels in encrypted traffic vs. clear traffic revealed that "HTTPS is favored over HTTP for hidden tunnels, indicating an attacker's preference for encryption to hide their communications," according to a statement from the company.

Other findings include:

  • Botnet monetization behavior grew linearly compared to last year's report. Ad click-fraud was the most commonly observed botnet monetization behavior, representing 85 percent of all botnet detections.
  • Within the category of lateral movement detections, brute-force attacks accounted for 56 percent, automated replication accounted for 22 percent and Kerberos-based attacks accounted for 16 percent. Although only the third most frequent detection, Kerberos-based attacks grew by 400 percent compared to last year.
  • Of internal reconnaissance detections, port scans represented 53 percent while darknet scans represented 47 percent, which is fairly consistent with behavior detected last year.

The Post-Intrusion Report is available for download at the Vectra Networks site.

About the Author

Rhea Kelly is editor in chief for Campus Technology, THE Journal, and Spaces4Learning. She can be reached at [email protected].

Featured

  • clock and neon light trails

    Don't Wait for the Clock to Run Out on Digital Accessibility

    Public universities with over 50,000 students face the looming April 24, 2026, deadline to comply with new Americans with Disabilities Act (ADA) Title II standards. The urgency many feel is warranted: Implementation timelines are tight and the scope of compliance is extensive.

  • Businessman holding Chatbot with binary code, message and data 3d rendering

    Anthropic Criticizes OpenAI Ad Strategy

    Anthropic recently launched a multi-million dollar Super Bowl advertising campaign criticizing OpenAI's decision to start showing ads within ChatGPT.

  • Abstract speed motion blur in vibrant colors

    3 Ed Tech Shifts that Will Define 2026

    The digital learning landscape is entering a new phase defined by rapid advances in artificial intelligence, rising expectations for the student experience, and increasing pressure to demonstrate quality and accountability in online education.

  • glowing brain above stacked coins

    The Higher Ed Playbook for AI Affordability

    Fulfilling the promise of AI in higher education does not require massive budgets or radical reinvention. By leveraging existing infrastructure, embracing edge and localized AI, collaborating across institutions, and embedding AI thoughtfully across the enterprise, universities can move from experimentation to impact.