THE IMPACT OF DESTRUCTIVE MALWARE REMAINS HIGH , PARTICULARLY AS CRIMINALS COMBINE IT WITH DESIGNER ATTACKS .
TRENDING
advanced analytics and risk-based decision making can enable comprehensive protection at machine speed and scale .”
Cybercrime attack methods evolve to ensure success at speed and scale
Data indicates that cybercriminals are getting better and more sophisticated in their use of malware and leveraging newly announced zero-day vulnerabilities to attack at speed and scale . While the number of exploit detections per firm dropped by 13 % in quarter one of 2018 , the number of unique exploit detections grew by more than 11 %, while 73 % of companies experienced a severe exploit .
Spike in cryptojacking
Malware is evolving and becoming more difficult to prevent and detect . The prevalence of cryptomining malware more than doubled from quarter to quarter from 13 % to 28 %. Additionally , cryptojacking was quite prevalent in the Middle East , Latin America and Africa . Cryptomining malware is also showing incredible diversity for such a relatively new threat . Cybercriminals are creating stealthier file-less malware to inject infected code into browsers with less detection . Miners are targeting multiple operating systems as well as different cryptocurrencies , including Bitcoin and Monero . They are also fine tuning and adopting delivery and propagation techniques from other threats based on
“
THE IMPACT OF DESTRUCTIVE MALWARE REMAINS HIGH , PARTICULARLY AS CRIMINALS COMBINE IT WITH DESIGNER ATTACKS .
Phil Quade , Chief Information Security Officer , Fortinet
what was successful or unsuccessful to improve future success rates .
Targeted attacks for maximum impact
The impact of destructive malware remains high , particularly as criminals combine it with designer attacks . For these types of more targeted attacks , criminals conduct significant reconnaissance on an organisation before launching an attack , which helps them to increase success rates . Afterwards , once they permeate the network , attackers move laterally across the network before triggering the most destructive part of their planned attack . The Olympic Destroyer malware and the more recent SamSam ransomware are examples of where cybercriminals combined a designer attack with a destructive payload for maximum impact .
Ransomware continues to disrupt
The growth in both the volume and sophistication of ransomware continues to be a significant security challenge for organisations . Ransomware continues to evolve , leveraging new delivery channels such as social engineering and new techniques such as multi-stage attacks to evade detection and infect systems .
GandCrab ransomware emerged in January with the distinction of being the first ransomware to require Dash cryptocurrency as a payment . BlackRuby and SamSam were two other ransomware variants that emerged as major threats during the first quarter of 2018 .
Multiple attack vectors
Although the side channel attacks dubbed Meltdown and Spectre dominated the news headlines during the quarter , some of the top attacks targeted mobile devices or known exploits on router , web or Internet technologies . A total of 21 % of organisations reported mobile malware , up 7 %, demonstrating that IoT devices continue to be targeted . Cybercriminals also continue to recognise the value of exploiting known vulnerabilities that haven ’ t been patched as well as recently discovered zero-days for increased opportunity . Microsoft continued to be the number one target for exploits and routers took the number two spot in total attack volume . Content Management Systems ( CMS ) and web-oriented technologies were also heavily targeted .
Cyberhygiene – more than just patching
Measuring how long botnet infections persist based on the number of consecutive days in which continued communications are detected reveals that hygiene involves more than just patching . It is also about clean-up . Data showed that 58.5 % of botnet infections are detected and cleaned up the same day . A total of 17.6 % of botnets persist for two days in a row and 7.3 % last three days . About 5 % persist for more than a week . As an example , the Andromeda botnet was taken down in quarter four of 2017 but data from quarter one found it showing prominently in both volume and prevalence .
Attacks against operational technology ( OT )
While OT attacks are a smaller percentage of the overall attack landscape , the trends are concerning . This sector is increasingly becoming connected to the Internet , with serious potential ramifications for security . Currently , the vast majority of exploit activity is directed against the two most common industrial communication protocols because they are widely-deployed and therefore highlytargeted . Data shows that in Asia ICS exploit attempts appear to be somewhat more prevalent when comparing the prevalence of ICS exploit activity across other regions . •
22 INTELLIGENTCIO www . intelligentcio . com