Page 120 - Cyber Defense eMagazine June 2024
P. 120

Among the key findings, Internet Security Report featuring data from Q3 2023 showed:

               •  Threat  actors  increasingly  use  remote  management  tools  and  software  to  evade  anti-
                   malware detection. This trend has also been noted by both the FBI and CISA. For instance, in
                   researching the top phishing domains, the Threat Lab observed a tech support scam that would
                   result  in  a  victim  downloading  a  pre-configured,  unauthorized  version  of  TeamViewer,  which
                   would allow an attacker full remote access to their computer.

               •  Medusa  ransomware  variant  surges  in  Q3,  driving  endpoint  ransomware  attacks  to
                   increase 89%. On the surface, endpoint ransomware detections appeared down in Q3. Yet the
                   Medusa ransomware variant, which emerged in the Top 10 malware threats for the first time, was
                   detected  with  a  generic  signature  from  the  Threat  Lab’s  automated  signature  engine.  When
                   factoring in the Medusa detections, ransomware attacks rose 89% quarter over quarter.


               •  Threat actors pivot from using script-based attacks and increasingly employ other living-
                   off-the-land  techniques.  Malicious  scripts  declined  as  an  attack  vector  by  11%  in  Q3  after
                   dropping by 41% in Q2. Still, script-based attacks remain the largest attack vector, accounting for
                   56% of total attacks, and scripting languages like PowerShell are often used in living-off-the-land
                   attacks. At the same time, Windows living-off-the-land binaries increased 32%. These findings
                   indicate to Threat Lab researchers that threat actors continue to utilize multiple living-off-the-land
                   techniques, likely in response to more protections around PowerShell and other scripting. Living-
                   off-the-land attacks make up the most endpoint attacks.

               •  Malware arriving over encrypted connections declined to 48%, meaning just under half of all
                   malware  detected  came  via  encrypted  traffic.  This  figure  is  notable  because  it  is  down
                   considerably from previous quarters. Overall, total malware detections increased by 14%.

               •  An email-based dropper family that delivers malicious payloads comprised four of the Top
                   5 encrypted malware detections in Q3. All but one of the variants in the Top 5 contained the
                   dropper  family  named  Stacked,  which  arrives  as  an  attachment  in  an  email  spear  phishing
                   attempt. Threat actors will send emails with malicious attachments that appear to come from a
                   known sender and claim to include an invoice or important document for review, aiming to trick
                   end  users  into  downloading  malware.  Two  of  the  Stacked  variants  –  Stacked.1.12  and
                   Stacked.1.7 – also appeared in the Top 10 malware detections.

               •  Commoditized  malware  emerges.  Among  the  top  malware  threats,  a  new  malware  family,
                   Lazy.360502, made the Top 10 list. It delivers the adware variant 2345explorer as well as the
                   Vidar password stealer. This malware threat connected to a Chinese website that provided a
                   credential stealer and appeared to operate like a “password stealer as a service,” where threat
                   actors could pay for stolen credentials, illustrating how commoditized malware is being used.

               •  Network attacks saw a 16% increase in Q3. ProxyLogon was the number-one vulnerability
                   targeted in network attacks, comprising 10% of all network detections in total.





            Cyber Defense eMagazine – June 2024 Edition                                                                                                                                                                                                          120
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   115   116   117   118   119   120   121   122   123   124   125