Story image

Report finds legacy cybersecurity a cinch for modern cybercrime

23 Mar 2018

The message from Webroot’s recent annual threat report is clear – stay on top of your cybersecurity or be breached.

Data collected throughout 2017 shows that attacks such as ransomware and cryptojacking are easily bypassing legacy security solutions due to businesses neglecting patch, update, or replace their current products.

Webroot chief technology officer Hal Lonas says it is concerning to see the relentless innovation of cybercriminals.

“Over the past year, news headlines have revealed that attackers are becoming more aggressive and getting extremely creative,” says Lonas.

“Cryptojacking made our threat report for the first time this year as an emerging threat that combines everything an attacker could want: anonymity, ease of deployment, low-risk, and high-reward. Organisations need to use real-time threat intelligence to detect these types of emerging threats and stop attacks before they strike.”

Some of the notable findings and analysis from the report include:

  • Cryptojacking has rapidly gained popularity as it is profitable, anonymous and requires minimal effort. Since September 2017 more than 5,000 websites have been compromised with JavaScipt cryptocurrency miner CoinHive to mine Monero by hijacking site visitors’ CPU power.
  • Windows 10 is almost twice as safe as Windows 7. Despite this the operating system migration rate has been slow with only 32 percent of corporate devices running Windows 10 by the end of 2017.
  • Creating slightly different variants of malicious or unwanted files (polymorphism) has become mainstream. In 2017, 93 percent of the malware encountered and 95 percent of potentially unwanted applications (PUAs) were only seen on one machine.
  • Ransomware continues its meteoric rise with new and reused ransomware variants distributed with a variety of purposes. Together, WannaCry and NotPetya infected more than 200,000 machines in over 100 countries within just 24 hours.
  • There are hundreds of thousands of websites created every day, and of these 25 percent were deemed malicious, suspicious, or moderately risky.
  • Phishing attacks remain one of the most used and successful attack vectors. Phishing is becoming increasingly targeted, using social engineering and IP masking to get greater results. Only 62 domains were responsible for 90 percent of the phishing attacks observed in 2017.
  • Mobile devices continue to be a prime target for attackers with 32 percent of mobiles apps found to be malicious. Of these, Trojans continue to be the most prevalent (67 percent) followed by PUAs (20 percent).
  • Ten countries accounted for 62 percent of all malicious IPs globally. These were the United States (12 percent), China (12 percent), Indonesia (8 percent), France (6 percent), Russia (4 percent), Ukraine (4 percent), Iraq (4 percent), Vietnam (4 percent), Germany (3 percent), and India (3 percent). The other 38 percent was made up of more than 200 countries.

Looking at these statistics it would appear the power lies well and truly with the cybercriminal, which is why Lonas says it’s vital that businesses roll their sleeves up and ensure their cybersecurity defences are up to scratch.

Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.
IBM X-Force Red & Qualys introduce automated patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
Micro Focus acquires Interset to improve predictive analytics
Interset utilises user and entity behavioural analytics (UEBA) and machine learning to give security professionals what they need to execute threat detection analysis.