Abion / Blog / Key Takeaways from the “Microsoft Digital Defense Report 2024”
Insights Microsoft Defense Report

Images: Microsoft and ThisIsEngineering on Pexels  

From the rise of sophisticated ransomware to the increasing use of AI by both attackers and defenders, the report sheds light on critical trends shaping the future of cybersecurity.

The Microsoft Digital Defense Report 2024 delivers a comprehensive analysis of the evolving threat landscape, highlighting key vulnerabilities and emerging risks that every organisation should take seriously. Why is it important? As one of the largest technology companies in the world, Microsoft has a unique vantage point, analysing 78 trillion security signals daily from its vast ecosystem of cloud services, endpoints, and global customers. This unparalleled access provides invaluable insights into how threats are evolving and what businesses can do to stay ahead.

Our experts have studied the findings, summarised some of the key takeaways and offered some practical advice for our industry and clients on what we can all do to better prepare, manage and minimise these risks.

1.  The Evolving Landscape of Cybersecurity: Multiple Threats Uniting

The report underscores a major shift: the traditional lines between cybercriminals and nation-state actors are blurring. In the past, state-sponsored hackers focused on espionage and sabotage, while cybercriminals aimed for financial gain. Today, they are collaborating more than ever, sharing tools, tactics, and infrastructure.

600 million

cyberattacks per day targeting Microsoft customers

2.75 x

year-on-year surge in ransomware attacks, with them becoming more complex and evasive

Business Impact:

  • Intellectual Property at Risk: Nation-state actors are increasingly targeting trade secrets and proprietary data, with attacks linked to elections and geopolitical conflicts like the Russia-Ukraine war and Iran-Israel tensions.
  • Supply Chain Vulnerabilities: Attackers are exploiting third-party vendors and IT providers as entry points, posing significant risks to companies reliant on external partners for critical services.

 

Protective Measures:

  • Conduct thorough risk assessments of your supply chain and strengthen vendor security protocols.
  • Implement multi-factor authentication (MFA) and adopt secure-by-design principles across your organisation.

 

Microsoft Defense Report

If there is a weak point in your system, threat actors are going to find it.

 

- Joy Chik, President, Identity and Network Access Microsoft

2. The Rise of Ransomware: New Trends in E-Commerce and Beyond

One concerning trend noted was the rise in human-operated ransomware, targeting businesses across all industries. Unlike traditional ransomware, which encrypts data quickly, these sophisticated attacks involve disabling defences, stealing sensitive data, and leveraging it for extortion.

75 billion+

E-commerce fraud is expected annually by 2028

 

99%

of impersonation attacks exploit human behaviours, such as weak passwords & credential reuse

Emerging Scenarios:

  • E-Commerce headache: Online retailers are prime targets for ransomware due to their reliance on seamless digital transactions. Attackers disrupt services, leading to significant downtime, lost revenue, and damaged brand reputation.

  • Complex tactics: Attackers are employing methods like social engineering, SIM swapping and adversary-in-the-middle attacks (AiTM - which occur when attackers trick users into clicking a link and completing MFA on the attacker’s behalf) to bypass MFA protections, making it even harder for businesses to defend against these threats.

 

Protective Measures:

  • Strengthening ransomware response strategy by regularly updating incident response plans and conducting mock simulations.
  • Enforce MFA and raise awareness about phishing.
  • Using AI-driven cybersecurity tools to detect unusual activity early and automate response actions.
  • Intellectual Property at Risk: Nation-state actors are increasingly targeting trade secrets and proprietary data, with attacks linked to elections and geopolitical conflicts like the Russia-Ukraine war and Iran-Israel tensions.
  • Supply Chain Vulnerabilities: Attackers are exploiting third-party vendors and IT providers as entry points, posing significant risks to companies reliant on external partners for critical services.

3.  DDoS Attacks: Stealthier threats emerge

Distributed Denial of Service (DDoS) attacks have intensified, peaking at 4,500 attacks per day in June 2024. More concerning is the rise in covert application-layer DDoS attacks, which target web applications and bypass traditional network-level defences.

4500 attacks

Throughout 2024, attacks increased with a peak of 4,500 per day in June

1.25 million

DDoS attacks in the second half of the year

Business Impact:

  • Sectors like finance, gaming, and technology have been particularly affected, with a notable increase in DDoS attacks against India’s gaming industry.
  • These attacks can cause significant downtime and financial losses, damaging both operations and reputations.

Protective Measures:

  • Implement a DDoS protection solution, securing the network and application infrastructure, hardening the DNS infrastructure
  • Add security measures such as firewalls, load balancers, and routers to secure the network and application infrastructure.
  • Implement security measures such as DNSSEC and DNS filtering to harden the DNS infrastructure.
  • Create an incident response plan and carry out regular DDoS simulations to ensure preparedness.
Domain
As we look to the future, the dawning of the age of AI means cybersecurity professionals will encounter both new opportunities and new challenges.

 

- Amy Hogan-Burney, Vice President & Deputy General Counsel Customer Security & Trust, Cybersecurity Policy & Protection Unit, Microsoft

4. Business Email Compromise: A Growing Threat

As email is often the channel fraudster use to launch their attacks, Business Email Compromise (BEC) remains a prevalent challenge for businesses. BEC is where attackers use techniques like inbox rule manipulation (where emails with keywords related to credentials or financial matters are redirected to less monitored folders like Spam, hiding their fraudulent activity from the user’s immediate view), (homoglyph domains (e.g., using "micr0soft.com" instead of "microsoft.com"), impersonate executives, or hijack legitimate email accounts to deceive employees into sharing sensitive information or transferring funds.

1.5%

average loss in profits due to fraud for organisations

50%

of Business Email Compromise attack tactics employ inbox rule changes after gaining access

Business Impact:

  • BEC attacks have a high financial impact. In 2023, it was report that BEC scams have caused over $50 billion in global losses, making it one of the most lucrative cybercrimes.
  • Impersonation attacks can severely damage brand reputation and client trust.

Protective Measures:

  • Enforce multi-factor authentication (MFA) to secure email accounts.
  • Implement a comprehensive Email Compromise Protection (ECP) solution to protect emails and your brand identity. This includes using SPF, DKIM, and DMARC protocols to authenticate emails from your domain, ensuring only verified senders can use your brand name. Further strengthen this with Verified Mark Certificates to visually assure email recipients that the email is from you.
  • Train employees to spot red flags and verify unusual payment requests via separate communication channels.
  • Use domain monitoring tools to detect and block look-alike domains.

 

5. Phishing and Domain Threats

Corporate and brand impersonation attacks are escalating, with businesses of all sizes at risk. Attackers are setting up fake websites, creating counterfeit social media profiles, and launching phishing campaigns that exploit trusted brand names.

Attackers are using legitimate services and increasingly sophisticated techniques to bypass traditional email security filters, posing a significant risk to brand integrity and user trust. Fraudsters have also doubled down on various forms of impersonating domains including homoglyphs, sub-domain squatting, and plausible alternate domain registration.

25%

of phishing attacks now include a QR code

 

54%

of phishing campaigns targeting consumers impersonated online software and service brands

Key Threats:

  • Homoglyph domains (e.g., “paypaI.com” with a capital "I" instead of a lowercase "L") and alternate domain registrations (e.g., using ".net" instead of ".com") are designed to deceive users into visiting fake websites that closely resemble legitimate brands.
  • Sub-domain Squatting: Cybercriminals exploit trusted cloud services to create malicious sub-domains (e.g., “yourbrand.cloudprovider.com”), making phishing emails appear more legitimate.
  • These attacks can cause significant financial and reputational loss for companies and consumers alike.

Protective Measures:

  • Proactively register your primary domain in multiple TLDs (e.g., .com, .net, .org etc.) and secure common misspellings or regional domains to prevent bad actors from misusing your business online.
  • Implement robust domain monitoring and watching services to identify infringing domains that resemble your brand name or trade marks. Early detection enables quick takedowns and limits potential damage.
  • Use web application firewalls and anti-phishing technologies to block malicious websites
  • Educate your customers about identifying legitimate communications from your brand and provide guidance on avoiding phishing scams.
  • Educate staff to adopt zero trust principles (even if the request looks like it is coming from the CEO), question content integrity and to report anything suspicious.

 

6.  AI: A Double-Edged Sword in Cybersecurity

The rapidly growing role of artificial intelligence (AI) in cybersecurity featured heavily in the report, highlighting both the positives and negatives of this powerful technology. While AI offers enhanced capabilities for threat detection and response, it also presents new challenges as attackers use it to scale their operations.

42% growth in IoT

With the Internet of Things (IoT) market growing at 42% per year, pervasive targeting of personal and home-use products is also expected.

In the coming year, Microsoft anticipate the biggest rises in automated fraud with the use of deepfake impersonation as cyberattack and fraud channels.

Key Threats:

  • AI-Enhanced Phishing: Attackers are using AI to create more realistic phishing emails, automate social engineering attacks, and even generate deepfake audio or video content to impersonate executives in Business Email Compromise (BEC) scams.
  • AI for Defence: On the flip side, AI is helping defenders by automating routine security tasks, analysing vast amounts of data for anomalies, and speeding up incident response.

 

Protective Measures:

Businesses need to ensure they are harnessing AI’s potential not only for defence but also for proactive threat hunting and automating security operations, including:

  • Leverage AI tools for real-time threat detection and anomaly analysis to stay ahead of sophisticated attacks.
  • Integrate AI capabilities into your IT processes to automate responses and reduce human error.
  • Employ AI technology to monitor and detect online activity to identify infringing domains, content and registrations so you can quickly act to remove it.

 

We all can, and must, do better, hardening our digital domains to protect our networks, data, and people at all levels."

- Tom Burt, Microsoft

Staying Ahead in 2024

As we look to the future, the volume and complexity of cyberattacks are unlikely to decline. Businesses must evolve their strategies to be able to quickly respond and adapt as well as invest in the latest technologies and build resilient security frameworks. By understanding the insights from the Microsoft Digital Defense Report 2024 and taking proactive steps to protect your digital assets, you put your business in a strong position to safeguard your brand and clients, protect your IP, and secure your online presence against the threats of tomorrow.

Ready to strengthen your web security & brand protection?

Let’s start a conversation today.

Related articles

Allianz stadium EURO24

Protecting Intellectual Property at Major Sporting Events: A Comprehensive Guide

Trademark Management
English
25, September 2024
Counterfeiting is a global issue that affects both luxury and everyday brands, undermining the integrity of genuin...
Black Friday Protection Package

Black Friday & Christmas – A Threat Against Your Brand?

Strategy
Trademark Management
English
17, September 2024
While Black Friday brings opportunities, it also poses security and technical challenges that can impact sales and...

This website uses cookies

Cookies ("cookies") consist of small text files. The text files contain data which is stored on your device. To be able to place some type of cookies we need your consent. We at Abion AB, corporate identity number 556633-6169 use these types of cookies. To read more about which cookies we use and storage duration, click here to get to our cookiepolicy.

Manage your cookie-settings

Necessary cookies

Necessary cookies are cookies that need to be placed for fundamental functions on the website to work. Fundamental functions are for instance cookies that are needed for you to use menus and navigate the website.

Functional cookies

Functional cookies need to be placed for the website to perform in the way that you expect. For instance to remember which language you prefer, to know if you are logged in, to keep the website secure, remember login credentials or to enable sorting of products on the website in the way that you prefer.

Statistical cookies

To know how you interact with the website we place cookies to collect statistics. These cookies anonymize personal data.

Ad measurement cookies

To be able to provide a better service and experience we place cookies to tailor marketing for you. Another purpose for this placement is to market products or services to you, give tailored offers or market and give recommendations on new concepts based on what you have bought from us previously.

Ad measurement user cookies

In order to show relevant ads we place cookies to tailor ads for you

Personalized ads cookies

To show relevant and personal ads we place cookies to provide unique offers that are tailored to your user data