Internet Security Threat Report Volume 24 | February 2019

Internet Security Threat Report Volume 24 | February 2019

ISTRInternet Security Threat Report Volume 24 | February 2019 THE DOCUMENT IS PROVIDED “AS IS” AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENT. THE INFORMATION CONTAINED IN THIS DOCUMENT IS SUBJECT TO CHANGE WITHOUT NOTICE. INFORMATION OBTAINED FROM THIRD PARTY SOURCES IS BELIEVED TO BE RELIABLE, BUT IS IN NO WAY GUARANTEED. SECURITY PRODUCTS, TECHNICAL SERVICES, AND ANY OTHER TECHNICAL DATA REFERENCED IN THIS DOCUMENT (“CONTROLLED ITEMS”) ARE SUBJECT TO U.S. EXPORT CONTROL AND SANCTIONS LAWS, REGULATIONS AND REQUIREMENTS, AND MAY BE SUBJECT TO EXPORT OR IMPORT REGULATIONS IN OTHER COUNTRIES. YOU AGREE TO COMPLY STRICTLY WITH THESE LAWS, REGULATIONS AND REQUIREMENTS, AND ACKNOWLEDGE THAT YOU HAVE THE RESPONSIBILITY TO OBTAIN ANY LICENSES, PERMITS OR OTHER APPROVALS THAT MAY BE REQUIRED IN ORDER FOR YOU TO EXPORT, RE-EXPORT, TRANSFER IN COUNTRY OR IMPORT SUCH CONTROLLED ITEMS. TABLE OF CONTENTS 1 2 3 BIG NUMBERS YEAR-IN-REVIEW FACTS AND FIGURES METHODOLOGY Formjacking Messaging Cryptojacking Malware Ransomware Mobile Living off the land Web attacks and supply chain attacks Targeted attacks Targeted attacks IoT Cloud Underground economy IoT Election interference MALICIOUS URLS ONE IN TENURLS ARE MALICIOUS WEB ATTACKS 56 % FORMJACKING ATTACKS BLOCKED FORMJACKING ATTACKS ON ENDPOINTS AVERAGE NUMBER OF WEBSITES COMPROMISED WITH FORMJACKING CODE EACH MONTH 4,800 3.7M CRYPTOJACKING 8M $362 4XMORE CRYPTOJACKING EVENTS BLOCKED IN 2018 VS 2017, BUT TRENDING DOWN 4M % 52DROP IN CRYPTOJACKING EVENTS BETWEEN JAN AND DEC 2018 % $48 9DROP IN0 CRYPTOCURRENCY JAN VALUE (MONERO) DEC ENTERPRISE MOBILE RANSOMWARE RANSOMWARE UP 12% % 20% DOWN OVERALL 33 RANSOMWARE SUPPLY CHAIN ATTACKS % MALICIOUS EMAIL POWERSHELL % % 48OF MALICIOUS EMAIL ATTACHMENTS ARE OFFICE FILES, UP FROM 5% IN 2017 1000 INCREASE IN MALICIOUS POWERSHELL SCRIPTS NUMBER OF AVERAGE NUMBER ATTACK GROUPS OF ORGANIZATIONS USING DESTRUCTIVE TARGETED BY EACH MALWARE ATTACK GROUP % 55 2 with one another. Magecart is believed to be behind several high-profile attacks, including those on British Airways and CYBER CRIMINALS TARGET Ticketmaster, as well as attacks against British electronics retailer Kitronik and contact lens seller VisionDirect. PAYMENT CARD DATA. This increase in formjacking reflects the general growth in supply chain attacks that we discussed in ISTR 23, with Magecart in many cases targeting third-party services in order to get its code onto targeted websites. In the high-profile Incidents of formjacking—the use of malicious JavaScript breach of Ticketmaster, for example, Magecart compromised a code to steal credit card details and other information third-party chatbot, which loaded malicious code into the web from payment forms on the checkout web pages of browsers of visitors to Ticketmaster’s website, with the aim of eCommerce sites—trended upwards in 2018. harvesting customers’ payment data. Symantec data shows that 4,818 unique websites were While attacks on household names make headlines, compromised with formjacking code every month in 2018. Symantec’s telemetry shows that it is often small and With data from a single credit card being sold for up to medium sized retailers, selling goods ranging from clothing $45 on underground markets, just 10 credit cards stolen to gardening equipment to medical supplies, that have had from compromised websites could result in a yield of up to formjacking code injected onto their websites. This is a global $2.2 million for cyber criminals each month. The appeal of problem with the potential to affect any business that accepts formjacking for cyber criminals is clear. payments from customers online. Symantec blocked more than 3.7 million formjacking The growth in formjacking in 2018 may be partially explained attempts in 2018, with more than 1 million of those by the drop in the value of cryptocurrencies during the year: blocks occurring in the last two months of the year alone. cyber criminals who may have used websites for cryptojacking Formjacking activity occurred throughout 2018, with an may now be opting for formjacking. The value of stolen credit anomalous spike in activity in May (556,000 attempts in card details on the cyber underground is probably more that month alone), followed by a general upward trend in assured than the value of cryptocurrencies in the current activity in the latter half of the year. climate. Much of this formjacking activity has been blamed on actors dubbed Magecart, which is believed to be several groups, with some, at least, operating in competition Back to ToC ISTR 24 | February 2019 Year-in-Review 14 still think cryptojacking is worth their time. We also saw some cryptojacking criminals targeting enterprises in 2018, with TRENDING DOWN, BUT the WannaMine (MSH.Bluwimps) cryptojacking script, which uses the Eternal Blue exploit made famous by WannaCry to CERTAINLY NOT OUT. spread through enterprise networks, rendering some devices unusable due to high CPU usage. The majority of cryptojacking activity continued to originate from browser-based coinminers in 2018. Browser-based coin Cryptojacking—where cyber criminals surreptitiously run mining takes place inside a web browser and is implemented coinminers on victims’ devices without their knowledge using scripting languages. If a web page contains a coin- and use their central processing unit (CPU) power to mine mining script, the web page visitors’ computing power will be cryptocurrencies—was the story of the final quarter of 2017 used to mine for cryptocurrency for as long as the web page and continued to be one of the dominant features in the is open. Browser-based miners allow cyber criminals to target cyber security landscape in 2018. even fully patched devices and can also allow them to operate Cryptojacking activity peaked between December 2017 and stealthily without the activity being noticed by victims. February 2018, with Symantec blocking around 8 million We predicted that cryptojacking activity by cyber criminals cryptojacking events per month in that period. During 2018, would be largely dependent on cryptocurrency values we blocked more than four times as many cryptojacking remaining high. As cryptocurrency values have fallen, we events as in 2017—almost 69 million cryptojacking events have also observed a decline in the volume of cryptojacking in the 12-month period, compared to just over 16 million in events. However, they haven’t fallen at the same rate as 2017. However, cryptojacking activity did fall during the year, cryptocurrency values—in 2018, the value of Monero dropping by 52 percent between January and December dropped by almost 90 percent while cryptojacking dropped 2018. Despite this downward trend, we still blocked more by around 52 percent. This means some cyber criminals must than 3.5 million cryptojacking events in December 2018. still find it profitable or are biding their time until another This is still significant activity, despite the fact that surge in cryptocurrency values. It also shows that there are cryptocurrency values—which were at record-breaking other elements of cryptojacking that make it attractive to highs at the end of 2017 and played a major role in driving cyber criminals, such as the anonymity it offers and the low the initial growth of cryptojacking—dropped significantly in barriers to entry. It looks like cryptojacking is an area that will 2018. While this may have led some of the initial adopters of continue to have a role in the cyber crime landscape. cryptojacking to turn to other ways to make money, such as formjacking, it’s clear a significant cohort of cyber criminals Back to ToC ISTR 24 | February 2019 Year-in-Review 15 For the first time since 2013, we observed a decrease in ransomware activity during 2018, with the overall number of ransomware infections on endpoints dropping by 20 percent. ACTIVITY BEGINS TO DROP, WannaCry, copycat versions, and Petya, continued to inflate infection figures. When these worms are stripped out from BUT REMAINS A CHALLENGE the statistics, the drop in infection numbers is steeper: a 52 percent fall. FOR ORGANIZATIONS. However, within these overall figures there was one dramatic change. Up until 2017, consumers were the hardest hit by ransomware, accounting for the majority of infections. In 2017, the balance tipped towards enterprises, with the majority Another factor behind the drop in overall ransomware Additional targeted threats have also emerged. Activity of infections occurring in businesses. In 2018, that shift activity is Symantec’s increased efficiency at blocking involving Ryuk (Ransom.Hermes) increased significantly in accelerated and enterprises accounted for 81 percent of all ransomware earlier in the infection process, either via email late 2018. This ransomware was responsible for an attack in ransomware infections. While overall ransomware infections protection or using technologies such as behavioral analysis December where the printing and distribution of several well- were down, enterprise infections were up by 12 percent in or machine learning. Also contributing to the decline is known U.S. newspapers was disrupted. 2018. the fact that some cyber crime gangs are

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    61 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us