May 11, 2017 By Douglas Bonderud 2 min read

Europe is climbing the charts, but it’s not in a desirable category for EU member countries. According to a recent NTT Security report, more than half of the world’s phishing attacks now originate from the Europe, Middle East and Africa region (EMEA).

The Netherlands is ground zero for this type of attack, having suffered 38 percent of noted phishing attacks, which is second only to the U.S. The U.K. also took second spot behind the U.S. in total number of cyberattacks. So what’s the impact of this growing European invasion?

Europe: A Breeding Ground for Cyberattacks

While the distribution and origin of attack efforts has changed, methodologies remain largely the same. As noted by CBR Online, 73 percent of all cyberattacks leveraged phishing techniques to gain access, with many relying on a combination of social engineering and poor password choices to effectively breach company networks.

What’s more, 77 percent of attacks occurred across just four industries: business and professional services (28 percent), government (19 percent), health care (15 percent) and retail (15 percent), NTT Security reported. In many cases, phishing efforts acted as precursors to ransomware infections, forcing companies to choose between holding the line and risking lost data or paying up and hoping that attackers honor their word.

But something had to give. Europe’s increasing tech savvy and rising economic clout made it the ideal place for cybercriminals to develop new techniques, improve old threat vectors and launch a new wave of cyberattacks against targets worldwide.

A Potentially New Landscape

As noted above, both the Netherlands and the U.K. feature prominently in the new threat landscape. But what sets these nations apart from their European neighbors?

“Particular areas of the EMEA, and especially the Netherlands, are known for having internet networks that are fast and reliable,” Dave Polton of NTT Security told SecurityWeek. Add in the extremely busy Amsterdam Internet Exchange (AMS-IX), and it’s the perfect place for cybercriminals looking to develop, test and deploy new phishing attacks.

Meanwhile, in the U.K., just 31 percent of businesses listed cybersecurity as a “very high” priority, and a “sizable proportion” of companies lack basic information security protections, Forbes noted. The gap between necessary cybersecurity protections and the current technology landscape makes the rise of cyberattacks inevitable. It has also helped push the U.K. into second place behind the U.S. for total attacks launched.

The nation has rolled out new cyber legislation in the form of the Investigatory Powers Act, which compels communication service providers (CSPs) to retain customer internet connection records for one year and allows law enforcement agencies to see these records without a warrant. However, security experts such as Sean Sullivan of F-Secure argued in SecurityWeek that these new powers will “be useful in a reactive way, to investigate after the fact. I do not think they will prevent.”

Last Line of Defense

The Netherlands and the U.K. are now leading the charge in both overseas phishing attacks and total attack volume. It’s not good news for security firms or enterprises, but it’s necessary knowledge. Understanding the scope of new threats is the only hope of holding the line and putting preventative measures in place.

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today