Daily Mirror (Sri Lanka)

Cybercrimi­nals successful­ly use common exploits, ‘swarm’ tech to attack at speed, scale: Fortinet

- Urgency: of attacks creates Botnet reoccurren­ce: vulnerabil­ities: Mobile threats: Pervasive and evasive malware: Ransomware is always there: Cybercrimi­nals target all sizes: SCADA is critical:

Fortinet, the global leader in high-performanc­e cybersecur­ity solutions, announced the findings of its latest Global Threat Landscape Report.

The research reveals that high botnet reoccurren­ce rates and an increase of automated malware demonstrat­e that cybercrimi­nals are leveraging common exploits combined with automated attack methods at unpreceden­ted speed and scale.

Keeping up with swarm attacks, botnet reoccurren­ces or the latest ransomware attack is daunting for the most strategic or staffed security team. If caught off guard, any organisati­on can fall victim to the enormous amount of attacks at play today.

To facilitate learning from what is happening in the wild, the intelligen­ce included in the latest report offers views of the cyber threat landscape from many perspectiv­es. It focuses on three central and complement­ary aspects of that landscape, namely applicatio­n exploits, malicious software and botnets.

It also examines important zero-day vulnerabil­ities and infrastruc­ture trends of the correspond­ing attack surface to add context about the trajectory of cyberattac­ks affecting organisati­ons over time.

Seventy nine percent of firms saw severe attacks in 3Q 2017. Research data overall during the quarter quantified 5,973 unique exploit detections, 14,904 unique malware variants from 2,646 different malware families and 245 unique botnets detected. In addition, Fortinet identified 185 zero-day vulnerabil­ities to date this year.

Many organisati­ons experience­d the same botnet infections multiple times. This is an alarming data point. Either the organisati­ons did not thoroughly understand the total scope of the breach and the botnet went dormant only to return again after business operations went back to normal or the root cause was never found and the organisati­on was reinfected with the same malware.

The exact applicatio­n exploit used by attackers to breach Equifax was the most prevalent with 6,000+ unique detections recorded last quarter and it is once again the most prevalent this quarter. In fact, three exploits against the Apache Struts framework made the top 10 list of most prevalent. This is an example of how attackers swarm when they catch scent of widespread, vulnerable targets.

One in four firms detected mobile malware. Four mobile malwarespe­cific families stood out for the first time because of their prevalence. This is an indication that mobile is increasing­ly becoming a target and that the threats themselves are becoming automated and polymorphi­c. With holiday shopping season in full swing this trend is concerning as purchases from mobile devices will be frequent and Internet of things (IOT) devices will be popular gifts to be purchased.

The most common functional­ity among top malware families was downloadin­g, uploading and dropping malware onto infected systems. This behaviour helps slip malicious payloads through legacy defences by wrapping them in dynamic packaging. In addition, malware strains that establish remote access connection­s, capture user input and gather system informatio­n were common as well. These advanced techniques are becoming the norm recently and both data points demonstrat­e the increased intelligen­t and automated nature of malware today.

After a hiatus during the first half of the year, the Locky ransomware ramped up in a big

Printed and published by Wijeya Newspapers Ltd. on Tuesday January 02, 2018 at No. 8, Hunupitiya Cross Road, Colombo 02 way with three new campaigns. Roughly 10 percent of firms reported it. In addition, at least 22 percent of organisati­ons detected some type of ransomware during the quarter.

Midsize firms saw higher rates of botnet infections, demonstrat­ing that they deal with more than their fair share of security problems. Cybercrimi­nals potentiall­y view midsize organisati­ons as a ‘sweet spot’ because often they do not have the same level of security resources and technologi­es as large enterprise­s but are seen as having valuable data assets. At the same time, the attack surface for midsize firms is growing at a fast pace because of their cloud adoption rates.

In addition to high-volume attacks like those against Apache Struts, some threats fly below the radar or have severe consequenc­es that spillover beyond the organisati­on in which they occur. Among the exploits tracked that target various types of supervisor­y control and data access (SCADA) systems, only one crossed the 1/1,000 threshold of prevalence and none were observed by more than one percent of reporting firms. Unfortunat­ely, enterprise network intrusions and outages are bad but breaches into SCADA environmen­ts put the physical infrastruc­ture on which many lives depend at risk, demonstrat­ing the importance of this statistic.

The findings this quarter reinforce many of the prediction­s unveiled recently by the Fortinet Fortiguard Labs global research team for 2018. Both the trends and the threat data potentiall­y foreshadow a wave of new types of attacks coming in the near future. The cybercrime community is already adept at leveraging advances in automation to create attacks exploiting vulnerabil­ities with increasing­ly malicious payloads capable of spreading at speed and scale.

Only a security framework that utilizes advanced threat intelligen­ce sharing and an open architectu­re to tie security and networking components into a single, automated and proactive defence and response system can protect for the future. The ever-evolving attack surface requires the flexibilit­y to quickly implement the latest security strategies and solutions with the ability to seamlessly add advanced techniques and technologi­es as they emerge, without throwing out the existing infrastruc­ture.

As the volume, velocity and automation of attacks increase, it becomes important to align patching prioritiza­tion to what is happening in the wild to focus better on the most critical. In addition, organisati­ons need to ensure that a strategic threat detection and incidentre­sponse strategy is in place that complement­s technology and intelligen­ce to speed up the process.

The Fortinet Global Threat Landscape report is a quarterly view that represents the collective intelligen­ce of Fortiguard Labs drawn from Fortinet’s vast array of sensors during 3Q 2017. Research data covers global, regional, industry sector and organisati­onal perspectiv­es.

 ??  ??
 ??  ??

Newspapers in English

Newspapers from Sri Lanka