Threat Intelligence Report USA 2020
Total Page:16
File Type:pdf, Size:1020Kb
Threat Intelligence Report Black Hat USA Edition 2020 Threat Intelligence Report Black Hat USA Edition 2020 Table of Contents Key Takeaways: Five Minute Read Attack Campaign Overview: USA How They Did It Recommendations: What can you do? How the U.S. Stacks Up Against the Global The Bottom Line Threat Landscape: January - June 2020 Spam Campaigns Glossary Impersonation Attacks Opportunistic Attacks Appendix Targeted Attacks Mimecast Signature Detections Key Takeaways - 5 Minute Read From January to June 2020, the Mimecast Threat The use of fileless malware continues to increase, Center analyzed more than 195 billion emails in and despite the halt in Emotet activity there has the U.S. and Caribbean region alone, rejecting been a notable increase in the broad use of VB- 92 billion (or 47%). While this report explores based droppers in many more campaigns. how the U.S. threat landscape stacks up against a global backdrop, Mimecast researchers also consistently track threat detections in the four Alongside this malicious software, threat actors primary threat categories across the globe: spam, have increased their sender impersonation impersonation attacks, opportunistic attacks, and efforts, seeking to take advantage of the targeted attacks. circumstances of the ongoing pandemic with 195 bil business email compromise containing multiple Malware-centric campaigns are a fixture of Emails analyzed in U.S. and Caribbean forms of social engineering. In fact, according 2020, becoming increasingly sophisticated and to the Mimecast report 100 Days of COVID, employing a diverse range of malware during the researchers found impersonation detections different phases of an attack. This ongoing trend had increased by 30% from January to April is clearly pronounced in the most persistent, 2020. The ongoing pandemic has increased the days-long attacks. attractiveness of BEC attacks, so that criminals One of the most significant observations of can take advantage of the circumstances this research is that threat actors are launching prevailing during the periods of stay-at-home opportunistic and malware-based campaigns orders across many U.S. states. across multiple verticals at volumes never seen before, yet simultaneously, Emotet activity came to a halt in early February after a meteoric rise in the last few months of 2019. It’s likely this trend will continue, since the subscription-based 92 bil Malware-as-a-Service (MaaS) model provides Emails Rejected in U.S. and Caribbean simple attack methods to a wider audience while keeping older, well-known malware in circulation. Threat Intelligence Report 3 Mimecast researchers’ analysis of the data resulted in the following key takeaways: Significant attacks came from organized Verticals with “essential” status during the Ransomware is on the rise, placing criminal groups for primarily monetary pandemic were repeatedly targeted. businesses at greater risk of gain, instead of focusing on intellectual ransomware attack. property theft. The top verticals for attack in the U.S. and Caribbean region were Manufacturing, Threat actors are focusing on delivering The attacks from January-June incorporated Retail/Wholesale and Finance: Insurance. ransomware more than ever, particularly a vast array of threats, such as Azorult Because this is unusual activity for these since multiple sources of reporting during and Emotet, and which are included in the American verticals, researchers believe it is this period have noted growth, both in the Technical Attack Detail in the appendix highly likely they were subject to the most forms of ransomware deployed, and of this report. These threats involved a significant attack as a consequence of threat the number of threat actors engaging combination of mass generic Trojan delivery actors targeting the industries that remained in this activity. with phishing campaigns and other more operable during stay at home periods, and 5 complex, simultaneous threats preceding which are key to any nation’s recovery from their deployment, at the same the current pandemic. What’s more, the Media and Publishing sector suffered high time or in subsequent days. Impersonation attacks continue to 1 volumes of impersonation attacks, potentially accelerate as threat actors sought to sow as a vehicle for cybercriminals to confusion during stay-at-home orders. spread disinformation across the Attackers chose file compression as their United States. 3 Impersonation attacks increased by 24% main attack delivery format despite from January to June, and since October 2019, Emotet’s halt in activity. this attack vector has been a prominent and increasing threat. Along the same lines, The majority of attacks were hybridized. Compressed files allow for a more complex voice phishing (vishing) also continues to be and potentially multi-malware payload, but an advancing threat with the addition of Cybercriminals used both simple and they also serve as a basic means of hiding SMS-borne threats. the underlying files within the container. The complex forms of attack. This is almost ZIP and RAR formats of file compression certainly a reflection of the ease of access 6 dominated detections – approximately three to online tools and kits for any individual to million throughout the period – and they are launch a cyberattack. The trend also reflects the most commonly detected formats the ongoing challenge of human error – even for attack. the simplest attacks can be successful. As attacks progress, they alter exploits 2 and include more potent forms of malware and ransomware. 4 Threat Intelligence Report 4 Key Takeaways - 5 Minute Read There were 42 significant and often wide-ranging capitalize on the COVID-19 pandemic, as well as Threat actors know security campaigns against various business verticals attempts to exploit the necessity for employees during this quarter targeting the Mimecast to work from home in greater numbers by practices tend to be less customer base in the region. Given the activity initiating high volume and determined Cryxos stringent when employees work increasingly evident across multiple verticals, campaigns – in other words, threat actors know researchers conducted deeper analysis of security practices tend to be less stringent when from home. 92 particular attacks. Some campaigns were employees work from home. primarily conducted in only one- or two-day In many ways, the circumstances of the pandemic periods, as opposed to the multi-day campaigns render organizations more vulnerable to seen in 2019, although hybridized (simple and ransomware, so it remains a significant threat complex attacks) threats evolved to include a going into the second half of 2020. phishing component in almost all attacks, paired with additional forms of malware. Notably, the 42 attack campaigns in this report showed a significant uptick in the use of short- lived, high volume, targeted and hybridized attacks against all all verticals of the U.S. economy, as opposed to days-long attacks. This massive increase in activity is highly likely to be indicative of threat actors’ efforts to Threat Intelligence Report 5 How They Did It In the Mimecast Threat Intelligence Report: Black Hat USA Edition, the Mimecast Threat Center analyzed attack activity targeting Mimecast customers in the U.S. Qualitative Term Probability Range and Caribbean from January 2020 through June 2020. Remote chance ≤≈5% The attack activity highlighted a mixture of U.S. and Caribbean region. Globally, Mimecast Highly unlikely ≈10% - ≈20% simple, low effort and low-cost attacks, and processed over 378 billion emails and made 671 Unlikely ≈25 – ≈35% also showed sophisticated, targeted campaigns million detections during this same period. leveraging a variety of vectors and lasting several Realistic probability ≈40% – <50% The report identifies the trends that emerge days. These sophisticated attacks were likely Probable or Likely ≈55% – 75% from attacks, and assesses likely future activity carried out by organized and determined threat Highly likely ≈80% – ≈90% given threat actors’ current behaviors, events, actors, employing obfuscation, layering, exploits, Almost certain ≥≈ 95% and technology. Taken together, these factors and encryption to evade detection. will impact the cybersecurity landscape going Unsurprisingly, the key threat identified in into the latter part of 2020; businesses must the first half of this year was the multitude be more vigilant than ever about the nature of Fig. A: The Mimecast Threat Center’s of ways cybercriminals sought to exploit the attack campaigns and should follow the set of Uncertainty Yardstick circumstances of the global COVID-19 pandemic. recommendations in this report to help guide Researchers found significant, opportunistic, security decisions accordingly. The team has the capability to research and study mixed threat campaigns in huge volumes across The Mimecast Threat Center Team conducted specific issues using the wealth of detection data multiple verticals, and the mass utilization of internal round-table discussions to produce this collected by Mimecast, but are also trained to use specific malware, to sow confusion and reap the report. Analysts use an uncertainty yardstick open source (OSINT) and research techniques benefits. matrix which would be readily recognizable to designed to provide an in-depth analysis of an This research explores these themes through the any intelligence professional and which seeks issue or attack, giving context to the range of lens of the four main categories