N-able Anomaly Detection: Identifying and Mitigating Credential-Based Threats
Cybersecurity Threats to Backup Environments on the Rise: N-able Introduces Anomaly Detection
The increasing sophistication of identity-driven cyberattacks has led to a surge in threats targeting backup environments. In response, N-able has expanded its Anomaly Detection capabilities in Cove Data Protection to provide customers with real-time alerts when suspicious or unauthorized changes to backup policies are detected.
Stolen Credentials: A Growing Threat
According to the 2025 Verizon Data Breach Investigations Report, approximately 88% of basic web application breaches involved stolen credentials, highlighting the widespread nature of this tactic. Attackers using stolen or phished credentials can gain access to backup software, weaken backup policies, and make subtle changes that may go unnoticed for weeks or even months.
Consequences of Unauthorized Changes
Once inside, attackers can alter retention policies, exclude critical data from backups, and delete protected devices, ultimately rendering recovery impossible when a ransomware attack is launched. To combat this, Anomaly Detection introduces a vital layer of protection, providing IT teams with real-time visibility into changes to backup policies.
The Anomaly Detection feature is designed to provide an early warning system against credential-based tactics used by attackers to disable or corrupt backups before deploying ransomware. With this expanded capability, customers can rest assured that their backup environments are better protected against the growing threat of identity-driven cyberattacks.
