Story image

Credential theft is the hottest trend for cyber attackers in Q2

29 Sep 17

This year cyber attackers have narrowed their focus to methods that involve credential theft – whether through malware, phishing or brute force attacks, the end result is a massive uptake in prevalence and sophistication.

WatchGuard’s latest quarterly Internet Security Report analyses threats facing SMBs and enterprises. It found that nearly half (47%) of all malware is able to hide from signature-based AV solutions, and is also ‘new’ or zero-day malware.

The number one malware for the second quarter this year was Mimikatz, an open source credential theft tool used for stealing and replacing Windows credentials.

It accounted for 36% of all malware, and it is the first time it has appeared in the report’s top 10 list.

WatchGuard CTO Corey Nachreiner says that data from the report shows attackers are more focused on credential theft than ever before.

 “From JavaScript-enabled phishing attacks and attempts to steal Linux passwords, to brute force attacks against web servers, the common theme here is that login access is a top priority for criminals. Knowing this, businesses must harden exposed servers, seriously consider multi-factor authentication, train users to identify phishing attacks and implement advanced threat prevention solutions to protect their valuable data,” he explains.

Phishing attacks and malicious JavaScript tools are increasingly hand-in-hand. For several quarters, attackers have used JavaScript code and downloaders to deliver malware through both web and email attacks.

In Q2, the most popular method was email phishing attacks that use JavaScript to closely mimic login pages such as Google, Microsoft and others. The similarities to the genuine sites trick users into giving up their details, the report says.

The report also found that brute force attacks are also proving popular for attackers’ quests to gain user credentials. The attacks against web servers use automated tools and work against web servers without protections that monitor failed logins. Automated attacks are able to test thousands of passwords per second.

While brute force attacks were in the top 10 network attacks, network attacks as a whole have dropped 30% compared to Q1.

WatchGuard used anonymised data from its Firebox Feeds across 33,500 appliances. In Q2, appliances blocked more than 16 million malware variants.

“The web continues to be the battleground. As has continued for the third quarter in a row, most if not all the top ten network attack targeted web servers and clients. Adding additional securityservices to your web traffic remains a top priority,” the report concludes.

How to stay safe when shopping online
Online shopping is a great way to avoid the crowds – but there are risks.
Dell EMC embeds security in latest servers
Dell EMC's 14th generation of PowerEdge servers has comprehensive management tools to provide security across hardware and firmware.
Why data backups should be a part of daily operations
"Disaster recovery needs to address complete system failure and provide a set of security policies to govern disaster incidents."
Businesses focusing on threats from within - survey
Over 50% of respondents reported that 100 days of dwell time or more was representative of their organisation.
Corelight and Exabeam partner to improve network monitoring
The combination of lateral movement and siloed usage of point security products leaves many security teams vulnerable to compromise.
SailPoint releases first identity annual report
SailPoint’s research found that many organisations are lacking maturity in their governance processes over identities.
Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.