Story image

2018 sees surge in encrypted attacks, malware & ransomware

12 Jul 2018

2018 is turning out to be a year of encrypted threats, ransomware, and soaring volumes of malware, leading experts to warn businesses that they will need every security tool in their toolbox to keep threats at bay.

SonicWall’s 2018 Cyber Threat Report defines the situation as a ‘cyber arms race that moves with great agility and purpose’ – and SonicWall CEO Bill Conner says that as the race gets faster it brings bigger consequences for enterprises, government agencies, and businesses in sectors including education and finance.

The report says that even though we’re only halfway through 2018, the volume of malware attacks (5.99 billion so far) is on track to exceed last year’s total of 9.32 billion.

“With the constantly changing and unpredictable threat landscape, it is vital that cybersecurity leaders build innovative and adaptable solutions to better protect their customers,” comments SonicWall VP and GM of Asia Pacific, Wias Issa.

“Cyber-criminals are getting more sophisticated with their attacks. We are now seeing more weaponised code that entails complexities and advanced custom encryption techniques. These attacks then expose, detonate, and wipe the weaponised code from memory in real time.”

Encrypted attacks (those that use SSL/TLS standards) have increased 275% year-to-date increase over 2017 from 1.4 million encrypted attacks across the world.

These attacks are becoming more common as more internet sessions (67.9%) leverage encryption as part of their traffic flow.

The report says that, “Without the ability to inspect encrypted traffic during this 12-month span, the average organization would have missed more than 900 file-based attacks per year hidden by TLS/SSL encryption.”

Conner adds that encrypted attacks are a critical challenge that the industry faces.

“Far too few organisations are aware that cybercriminals are using encryption to circumvent traditional networks security controls, and others aren’t activating new mitigation techniques, such Deep Packet Inspection of SSL and TLS traffic (DPI-SSL). We predict encrypted attacks to increase in scale and sophistication until they become the standard for malware delivery. And we’re not that far off.”

With so much focus on the topic of ransomware over the last few years, the report suggests that businesses should not forget about the virulent malware, as 2018 brought a major resurgence in attacks.

Between 2016 and 2017 attacks dropped from 645 million to 184 million, but so far 2018 has already seen 181.5 million attacks.

2018’s newest ransomware variants include Gandcrab, BitPaymer, Sigrun, PUBG, Satan, Lockcrypt, UselessDisk, Godra, InsaneCrypt, Genasom, and Xorist.

SonicWall also recognises the dangers surrounding Spectre-based chip attacks. SonicWall Real-Time Deep Memory Inspection now blocks those attacks.

“SonicWall has been using machine learning to collect, analyse and leverage cyber threat data since the 90s. This commitment to innovation and emerging technology is part of the foundation that helps deliver actionable threat intelligence, security efficacy and automated real-time breach detection and prevention to our global partners and customers,” Conner concludes.

Data for the 2018 SonicWall Cyber Threat Report mid-year update was gathered by the SonicWall Capture Threat Network, which sources information from global devices and resources including more than one million security sensors in nearly 200 countries and territories; cross‐vector, threat‐related information shared among SonicWall security systems, including firewalls, email security, endpoint security, honeypots, content-filtering systems; SonicWall Capture Advanced Threat Protection multi‐engine sandbox; and SonicWall’s internal malware analysis automation framework.

Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.