Story image

Report finds legacy cybersecurity a cinch for modern cybercrime

23 Mar 18

The message from Webroot’s recent annual threat report is clear – stay on top of your cybersecurity or be breached.

Data collected throughout 2017 shows that attacks such as ransomware and cryptojacking are easily bypassing legacy security solutions due to businesses neglecting patch, update, or replace their current products.

Webroot chief technology officer Hal Lonas says it is concerning to see the relentless innovation of cybercriminals.

“Over the past year, news headlines have revealed that attackers are becoming more aggressive and getting extremely creative,” says Lonas.

“Cryptojacking made our threat report for the first time this year as an emerging threat that combines everything an attacker could want: anonymity, ease of deployment, low-risk, and high-reward. Organisations need to use real-time threat intelligence to detect these types of emerging threats and stop attacks before they strike.”

Some of the notable findings and analysis from the report include:

  • Cryptojacking has rapidly gained popularity as it is profitable, anonymous and requires minimal effort. Since September 2017 more than 5,000 websites have been compromised with JavaScipt cryptocurrency miner CoinHive to mine Monero by hijacking site visitors’ CPU power.
  • Windows 10 is almost twice as safe as Windows 7. Despite this the operating system migration rate has been slow with only 32 percent of corporate devices running Windows 10 by the end of 2017.
  • Creating slightly different variants of malicious or unwanted files (polymorphism) has become mainstream. In 2017, 93 percent of the malware encountered and 95 percent of potentially unwanted applications (PUAs) were only seen on one machine.
  • Ransomware continues its meteoric rise with new and reused ransomware variants distributed with a variety of purposes. Together, WannaCry and NotPetya infected more than 200,000 machines in over 100 countries within just 24 hours.
  • There are hundreds of thousands of websites created every day, and of these 25 percent were deemed malicious, suspicious, or moderately risky.
  • Phishing attacks remain one of the most used and successful attack vectors. Phishing is becoming increasingly targeted, using social engineering and IP masking to get greater results. Only 62 domains were responsible for 90 percent of the phishing attacks observed in 2017.
  • Mobile devices continue to be a prime target for attackers with 32 percent of mobiles apps found to be malicious. Of these, Trojans continue to be the most prevalent (67 percent) followed by PUAs (20 percent).
  • Ten countries accounted for 62 percent of all malicious IPs globally. These were the United States (12 percent), China (12 percent), Indonesia (8 percent), France (6 percent), Russia (4 percent), Ukraine (4 percent), Iraq (4 percent), Vietnam (4 percent), Germany (3 percent), and India (3 percent). The other 38 percent was made up of more than 200 countries.

Looking at these statistics it would appear the power lies well and truly with the cybercriminal, which is why Lonas says it’s vital that businesses roll their sleeves up and ensure their cybersecurity defences are up to scratch.

Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Verifi takes spot in Deloitte Asia Pacific Fast 500
"An increasing amount of companies captured by New Zealand’s Anti-Money laundering legislation are realising that an electronic identity verification solution can streamline their customer onboarding."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.
What disaster recovery will look like in 2019
“With nearly half of all businesses experiencing an unrecoverable data event in the last three years, current backup solutions are no longer fit for purpose."
Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”
McAfee named Leader in Magic Quadrant an eighth time
The company has been once again named as a Leader in the Gartner Magic Quadrant for Security Information and Event Management.
Symantec and Fortinet partner for integration
The partnership will deliver essential security controls across endpoint, network, and cloud environments.
Is Supermicro innocent? 3rd party test finds no malicious hardware
One of the larger scandals within IT circles took place this year with Bloomberg firing shots at Supermicro - now Supermicro is firing back.