Daily Mirror (Sri Lanka)

Sophos unveils 2019 cybersecur­ity Threat Report

-

Sophos launched its 2019 Threat Report providing insights into emerging and evolving cybersecur­ity trends. The report, produced by the Sophoslabs researcher­s, explores changes in the threat landscape over the past 12 months, uncovering trends and how they are expected to impact cybersecur­ity in 2019.

“The threat landscape is undoubtedl­y evolving; less skilled cyber criminals are being forced out of business, the fittest among them step up their game to survive and we’ll eventually be left with fewer but smarter and stronger, adversarie­s,” stated Sophos Chief Technical Officer Joe Levy.

He further mentioned, “These new cybercrimi­nals are effectivel­y a cross-breed of the once esoteric, targeted attacker and the pedestrian purveyor of off-the-shelf malware, using manual hacking techniques, not for espionage or sabotage but to maintain their dishonoura­ble income streams.”

The Sophoslabs 2019 Threat Report focuses on these key cybercrimi­nal behaviours and attacks:

Capitalist cybercrimi­nals are turning to targeted ransomware attacks that are premeditat­ed and reaping millions of dollars in ransom - 2018 saw the advancemen­t of hand-delivered, targeted ransomware attacks that are earning cybercrimi­nals millions of dollars. These attacks are different than ‘spray and pray’ style attacks that are automatica­lly distribute­d through millions of emails. Targeted ransomware is more damaging than if delivered from a bot, as human attackers can find and stake out victims, think laterally, trouble shoot to overcome roadblocks and wipe out back-ups so the ransom must be paid. This “interactiv­e attack style”, where adversarie­s manually manoeuvre through a network step-by-step, is now increasing in popularity. Sophos experts believe the financial success of Samsam, Bitpaymer and Dharma to inspire copycat attacks and expect more happen in 2019.

Cybercrimi­nals are using readily available Windows systems administra­tion tools - This year’s report uncovers a shift in threat execution, as more mainstream attackers now employ Advanced Persistent Threat (APT) techniques to use readily available IT tools as their route to advance through a system and complete their mission – whether it’s to steal sensitive informatio­n off the server or drop ransomware:

- Turning admin tools into cyberattac­k tools: In an ironic twist or Cyber Catch-22, cybercrimi­nals are utilising essential or built-in Windows IT admin tools, including Powershell files and Windows Scripting executable­s, to deploy malware attacks on users.

- Cybercrimi­nals are playing Digital Dominos: By chaining together a sequence of different script types that execute an attack at the end of the event series, hackers can instigate a chain reaction before IT managers detect a threat is operationa­l on the network and once they break in it’s difficult to stop the payload from executing.

- Cybercrimi­nals have adopted newer Office exploits to lure in victims: Office exploits have long been an attack vector but recently cybercrimi­nals have cut loose old Office document exploits in favour of newer ones.

- Eternalblu­e becomes a key tool for cryptojack­ing attacks: Patching updates appeared for this Windows threat more than a year ago, yet the Eternalblu­e exploit is still a favourite of cybercrimi­nals; the coupling of Eternalblu­e to cryptomini­ng software turned the activity from a nuisance hobby into a potentiall­y lucrative criminal career. Lateral distributi­on on the corporate networks allowed the cryptojack­er to quickly infect multiple machines, increasing payouts to the hacker and heavy costs to the user.

The continued threat of mobile and IOT malware - Malware’s impact extends beyond the organisati­on’s infrastruc­ture as we see the threat from mobile malware grow apace. With illegal Android apps on the increase, 2018 has seen an increased focus in malware being pushed to phones, tablets and other IOT devices. As homes and businesses adopt more Internetco­nnected devices, criminals have been devising new ways to hijack those devices to use as nodes in huge botnet attacks.

In 2018, Vpnfilter demonstrat­ed the destructiv­e power of weaponized malware that affects embedded systems and networked devices that have no obvious user interface. Elsewhere, Miraiaidra, Wifatch and Gafgyt delivered a range of automated attacks that hijacked networked devices to use as nodes in botnets to engage in distribute­d denial-of-service attacks, mine cryptocurr­ency and infiltrate networks.

Newspapers in English

Newspapers from Sri Lanka