BreachesHIGH

Cyber Identity Thieves Target Europe’s Businesses

CSCSO Online
Darktracephishingcloud securityidentity theftGermany
🎯

Basically, hackers are stealing identities to break into companies in Europe.

Quick Summary

Cyber identity thieves are increasingly targeting businesses in Europe, especially in Germany. With 58% of attacks stemming from compromised cloud accounts, the risk to your data is significant. Organizations must act now to strengthen security measures and protect sensitive information.

What Happened

Europe is facing a growing threat from cyber identity thieves, and the urgency is palpable. According to Darktrace's latest Threat Report for 2026, 58% of attacks in Europe last year originated from compromised cloud accounts or email access. This alarming statistic highlights a shift in tactics, as traditional network breaches now account for only 42% of incidents.

Germany has emerged as the most targeted country, with over half of the reported incidents affecting organizations in the EMEA region. The manufacturing sector is particularly vulnerable, as attackers exploit weaknesses in cloud transformation, SaaS? usage, and hybrid work models?. This new landscape has blurred the lines of traditional network boundaries, allowing attackers to log in with stolen credentials rather than physically infiltrating systems.

Why Should You Care

This situation affects you directly. Imagine your online bank account being accessed by someone who has your login details. If attackers can log in using valid credentials, they can move freely within a company's systems, making detection incredibly challenging. This means that your personal data, financial information, and even your job could be at risk.

In sectors like healthcare, finance, and energy, the stakes are even higher. For instance, 33% of phishing emails in healthcare targeted privileged users, which could lead to massive data breaches. If these sectors are compromised, it could have serious implications for public safety and trust.

What's Being Done

Experts are sounding the alarm, and organizations need to be proactive. Here are some immediate actions to consider:

  • Ensure multi-factor authentication? is enabled on all accounts.
  • Conduct regular security audits to identify vulnerabilities?.
  • Train employees to recognize phishing? attempts and suspicious activities.

Darktrace is monitoring the situation closely, particularly focusing on groups like Lazarus from North Korea and ShadowPad from China, who are increasingly targeting the manufacturing sector. As the landscape evolves, expect to see more sophisticated attacks leveraging compromised accounts and exploiting? existing vulnerabilities? in cloud environments.

💡 Tap dotted terms for explanations

🔒 Pro insight: The shift to identity-based attacks indicates a need for enhanced detection methods that focus on user behavior rather than traditional perimeter defenses.

Original article from

CSO Online

Read Full Article

Related Pings

HIGHBreaches

Loblaw Data Breach - Customer Information Exposed

Loblaw has disclosed a data breach impacting customer information, including names and emails. This raises serious concerns about data security in retail. Customers should stay alert for potential scams.

SecurityWeek·
HIGHBreaches

Starbucks Data Breach Exposes Personal Info of 889 Employees

Starbucks has reported a data breach affecting 889 employees due to phishing attacks. Personal information, including Social Security numbers, was exposed. The company is offering identity protection services to those affected.

Security Affairs·
HIGHBreaches

Hacker Accidentally Exposes FBI's Epstein Files

What Happened A foreign hacker accidentally accessed a server containing sensitive materials related to the FBI's investigation into Jeffrey Epstein. This incident occurred when the hacker discovered a trove of emails, images, and documents that appeared to contain child abuse materials. Shocked by the content, the hacker left a message threatening to report the findings to the FBI, unaware

Wired Security·
HIGHBreaches

Telus Digital Confirms Major Data Breach by ShinyHunters

What Happened Telus Digital, the digital services arm of Canadian telecommunications giant Telus, has confirmed that it suffered a significant data breach. This announcement follows allegations from the notorious cybercrime group, ShinyHunters, who claimed to have exfiltrated nearly 1 petabyte of data over several months. The breach reportedly involved the use of credentials obtained from a previous hack of

SC Media·
HIGHBreaches

Bank Leak Exposes Customer Data Amid AI Security Concerns

What Happened In a significant breach of trust, Lloyds, Halifax, and Bank of Scotland customers experienced a shocking privacy violation. Customers were able to see other users' transactions within their banking apps. This incident highlights a serious confidentiality failure, raising concerns about how secure our financial information really is. The breach is not the result of a hack but

SC Media·
HIGHBreaches

Loblaw Faces Data Breach After Cyberattack on IT Network

Loblaw has reported a data breach affecting customer information due to a cyberattack. Millions of customers may be impacted, raising concerns about identity theft. The company is advising affected customers to reset their passwords and monitor their accounts.

SC Media·