Cybercriminals looking for ports in stormy new world of work

A rise in remote work has seen a corresponding increase in criminals scanning for vulnerabilities among WFH teams to place ransomware on company networks

Cybercriminals are increasingly scanning remote workers looking for open ports that allow them to deliver ransomware into unsuspecting businesses, according to new research.

Cybersecurity company BlueVoyant revealed this and other findings in its new report, Emerging External Cyber Defense Trends, which looks at the risks organisations face.

"As enterprises' internal cybersecurity has become better defended and better monitored, cyber threat actors have evolved their tactics to focus on new methods of compromise, targeting a wider attack surface than ever before," says Joel Molinoff, BlueVoyant's global head of supply chain defence. 

"This report shines a spotlight on the latest cyber criminal techniques BlueVoyant's threat intelligence has observed, plus recommended actions organisations can take to help prevent these threats."

The report focuses on a number of topics, including:

Dynamic phishing tactics

Attackers increasingly evade detection by directing consumers to spoofed domains and presumed threat hunters to an error page. BlueVoyant found that redirections increased 240% in 2022.

Dynamic DNS infrastructure

Cyber criminals more and more use a new type of hosting provider to create and set up short-lived websites. This vector provides an opportunity for a low-cost, high-volume campaign that can be duplicated in future attacks — all without having to register a domain.


The use of SMS text messages to distribute phishing messages is on the rise as cyber attackers are increasingly abusing legitimate text messaging services to deliver phishing messages.

Open ports

With the rise of remote work from the COVID-19 pandemic, more employees need remote network access. Cyber criminals are increasingly scanning for the ports that allow this in order to gain a foothold into organisations' networks. These ports, if misconfigured, are a common ransomware delivery method.


Every week new vulnerabilities are discovered across multiple industries, and these vulnerabilities can quickly become a critical attack vector. Despite this, many organisations are slow to patch.

Financial fraud

Cyber criminals are finding new ways to carry out financial fraud, such as using instant messaging to plan campaigns and sell stolen data, instead of dark web forums, which are known to be more easily accessible by law enforcement agencies, and therefore are considered less secure by many criminals.

"It has become harder for organisations to identify basic external-facing vulnerabilities and threats due to sheer volume, and threat actors are increasingly taking advantage of these exposures, pivoting and evolving their tactics to achieve their goals," says Ron Feler, BlueVoyant's global head of threat intelligence. "On top of this, organisations must now respond to potential threats much quicker as attackers have gotten quicker to exploit vulnerabilities."


Featured Articles

AI-Based Phishing Scams Are On The Rise This Valentine’s Day

Research from Egress Threat Intelligence, Avast, Cequence Security & KnowBe4 outlines how AI is being used in dating app phishing scams on Valentine’s Day

Speaker Lineup Announced for Tech Show London 2024

See Below for a Newly Announced Speaker List for Tech Show London 2024, as it Promises to Showcase Technology Trends Will Impact Various Sectors

Darktrace predicts AI deepfakes and cloud vulnerabilities

Darktrace reveals its top predictions for AI and cybersecurity developments in 2024, which include AI worms, hallucinations and cloud concerns

Secure 2024: AI’s impact on cybersecurity with Integrity360

Technology & AI

IT and OT security with Ilan Barda, CEO of Radiflow

Cyber Security

QR ‘Quishing’ scams: Do you know the risks?

Application Security