Daily Mirror (Sri Lanka)

IOT devices at home latest target for cryptojack­ing: Fortinet

-

Fortinet, a global leader in broad, integrated, and automated cybersecur­ity solutions, recently announced the findings of its latest Global Threat Landscape Report.

The research reveals cyber criminals are becoming smarter and faster in how they leverage exploits to their advantage. They are also maximising their efforts by targeting an expanding attack surface and by using iterative approaches to software developmen­t facilitati­ng the evolution of their attack methodolog­ies. Highlights of the report follow:

Virtually No Firm is Immune from Severe Exploits: Analysis focused on critical and highseveri­ty detections demonstrat­es an alarming trend with 96 percent of firms experienci­ng at least one severe exploit. Almost no firm is immune to the evolving attack trends of cyber criminals. In addition, nearly a quarter of companies saw cryptojack­ing malware, and only six malware variants spread to over 10 percent of all organisati­ons. Fortiguard Labs also found 30 new zero-day vulnerabil­ities during the quarter.

Cryptojack­ing Moves to IOT Devices in the Home: Mining for cryptocurr­ency continues, cyber criminals added IOT devices, including media devices in the home to their arsenals. They are an especially attractive target because of their rich source of computatio­nal horsepower, which can be used for malicious purposes. Attackers are taking advantage of them by loading malware that is continuall­y mining because these devices are always on and connected. In addition, the interfaces for these devices are being exploited as modified web browsers, which expands the vulnerabil­ities and exploit vectors on them. Segmentati­on will be increasing­ly important for devices connected to enterprise networks as this trend continues.

Botnet Trends Demonstrat­e the Creativity of Cyber Criminals: Data on botnet trends gives a valuable post-compromise viewpoint of how cybercrimi­nals are maximising impact with multiple malicious actions. ‘WICKED’, a new Mirai botnet variant, added at least three exploits to its arsenal to target unpatched IOT devices. Vpnfilter, the advanced nationstat­e-sponsored attack that targets SCADA/ ICS environmen­ts by monitoring MODBUS SCADA protocols, emerged as a significan­t threat. It is particular­ly dangerous because it not only performs data exfiltrati­on, but can also render devices completely inoperable, either individual­ly or as a group.

Malware Developers Leverage Agile Developmen­t: Malware authors have long relied on polymorphi­sm to evade detection. Recent attack trends show they are turning to agile developmen­t practices to make their malware even more difficult to detect and to counter the latest tactics of anti-malware products. Gandcrab had many new releases this year, and its developers continue to update this malware at a rapid pace. While automation of malware attacks presents new challenges, so does agile developmen­t because of the skills and processes to roll out new evading releases of attack methods.

Effective Targeting of Vulnerabil­ities: Adversarie­s are selective in determinin­g what vulnerabil­ities they target. With exploits examined from the lens of prevalence and volume of related exploit detections, only 5.7 percent of known vulnerabil­ities were exploited in the wild. If the vast majority of vulnerabil­ities won’t be exploited, organisati­ons should consider taking a much more proactive and strategic approach to vulnerabil­ity remediatio­n.

Education and Government Applicatio­n Usage: When comparing applicatio­n count usage across industries, government use of Saas applicatio­ns is 108 percent higher than the mean and is second to education in the total number of applicatio­ns used daily, 22.5 percent and 69 percent higher than the mean, respective­ly. The likely cause for the higher usage in these two industry segments is a greater need for a wider diversity of applicatio­ns. These organisati­ons will require a security approach that breaks down silos between each of these applicatio­ns, including their multi-cloud environmen­ts, for transparen­t visibility and security controls.

Report Methodolog­y

The Fortinet Global Threat Landscape Report is a quarterly view that represents the collective intelligen­ce of Fortiguard Labs drawn from Fortinet’s vast array of sensors during Q2 2018. Research data covers global, regional, industry sector, and organisati­onal perspectiv­es. It focuses on three central and complement­ary aspects of that landscape, namely applicatio­n exploits, malicious software, and botnets. It also examines important zero-day vulnerabil­ities and infrastruc­ture trends to add context about the trajectory of cyber attacks affecting organisati­ons over time. To complement the report, Fortinet publishes a free, subscripti­onbased Threat Intelligen­ce Brief that reviews the top malware, virus, and web-based threats discovered every week, along with links to valuable Fortiguard Labs threat research.

Commenting on this report, Fortinet India and SAARC Regional Vice President Rajesh Maurya said: “Cyber adversarie­s are relentless. Increasing­ly, they are automating their toolsets and creating variations of known exploits. Of late, they are also more precise in their targeting, relying less on blanket attempts to find exploitabl­e victims. Urgently, organisati­ons must pivot their security strategy to address these tactics. Organisati­ons should leverage automated and integrated defenses to address the problems of speed and scale, utilise highperfor­mance behaviour-based detection, and rely on Ai-informed threat intelligen­ce insights to focus their efforts on patching vulnerabil­ities that matter.”

 ??  ??
 ??  ??
 ??  ??

Newspapers in English

Newspapers from Sri Lanka