sb-au logo
Story image

BlackBerry Cylance: Latest report reveals global attack surface expansion

The continued evolution of nation-state backed threat actor groups and the increased availability of sophisticated attack toolsets were amongst the key findings in the latest BlackBerry 2020 Threat Report.

The annual report examines the latest adversarial techniques and tactics analysed by BlackBerry Cylance threat researchers, and provides guidance on how organisations can leverage to mitigate risk. 

The report also details more select threats focused on targets like embedded technologies in connected vehicles, manufacturing and mobile devices, and those taking advantage of misconfigurations in cloud computing deployments.  

"New techniques to obscure malicious payloads and distribute attacks across multiple organisations paid off for threat actors in 2019," says Eric Cornelius, chief technology officer at BlackBerry Cylance. 

"With the increasing ease of access to attack toolkits combined with the explosion of endpoints connected to organisations networks, the global threat landscape for emerging threats will only continue to escalate in 2020.," he says.

Automotive and Retail Industries Should Brace for More Threats  

The search to find and exploit vulnerabilities in the expanding attack surface has caused a shift in the industries most often targeted by malicious actors, particularly towards the automotive sector. For example, BlackBerry Cylance researchers discovered new backdoors being deployed by APT group OceanLotus (APT 32) in a 2019 campaign targeting multinational automotive manufacturers. As more vehicles become connected and the attention given to potential outcomes of cyberattacks on vehicles increases attacks against this sector are anticipated to grow. As such, the industry must continue investing in cybersecurity processes and secure connected software to ensure public trust in the transportation technologies of the future.  

Additionally, Cylance researchers found that retail and wholesale remained the most targeted sectors, where almost a quarter (23%) of all retailers suffered a compromise of sensitive financial information.  Three of the most prevalent threats of 2019  Emotet, Ramnit and Upatre  all focused on retail organisations. Coinmining operations also had a focus on retailers, with 47% of attacks impacting that sector.  

The report also spotlighted other unique threats facing a range of industry verticals including: 

  • Technology/Software: Where attacks typically have a focus on stealing intellectual property, over a quarter (26%) were victims of ransomware specifically. 
  • Service Providers: This industrys customer base was leveraged by threat actors to increase malicious distributions using remote management tools like Go2Assist and NinjaRMM. 
  • Healthcare: Healthcare organisations were more likely to pay ransoms than other industries due to the critical nature of the targeted data. 
  • Government: Attacks against government entities can have cascading effects that not only impact critical national infrastructure, but impact individuals as well given the significant quantities of personally identifiable information they store. 
     

"Threat intelligence on APT groups can help organisations understand who is attacking their enterprise, and the actors mode of operations and motives, in order to be more proactive in protecting vulnerable systems against advanced threats," says Brian Robison, chief evangelist at BlackBerry Cylance. 

"In 2020, AI and machine learning will continue to prove critical for threat prevention and remediation strategies because of the advantage they offer through continuous learning and proactive threat modelling of attacks that continue to become more complex."

Additional Key Findings in the 2020 Annual Threat Report  

  • Coinmining attacks become more commonplace as cryptocurrency prevails: Criminals recognized an opportunity to passively generate revenue by infecting cryptocurrency machines.  
  • MSSPs are becoming high-value targets for threat actors: New ransomware called Sodinokibi caused mass disruption by infiltrating hosted environments. 
  • Data loss is increasing because of cloud misconfiguration: Misconfigured cloud resources led to a total of over seven billion records being publicly exposed in 2019. This number is only expected to increase with cloud investments estimated to reach $49.1 billion in 2020.      
  • Continued evolution of ransomware tactics: An increased availability of Ransomware-as-a-Service (RaaS) offerings, and instances where ransomware developers have collaborated with banking trojan developers to exfiltrate data prior to encryption, are being used to further extort victims. 
  • Increased use of host-encrypted malware: Static analysis of host-encrypted malware is almost impossible in a lab, decreasing defenders' understanding of the malicious code and the ability for security solutions to block it. 
     


 

 

Story image
Research: 61% of companies have suffered an insider attack in last 12 months
It comes as rapid migration to cloud and remote working and BYOD scenarios leave organisations increasingly vulnerable to insider attacks as a result of the upheaval caused by the COVID-19 pandemic.More
Story image
Malware and email scams targeting employees spread rapidly in Q2
"Businesses must stay alert and should employ defense-in-depth tactics and equip themselves with multilayered security mechanisms, including high-sensor spam filters and a VPN connection, which would prevent malicious pages from opening."More
Story image
Exabeam and Code42 partner up to launch insider threat solution
The solution will give customers a fuller picture of their environment, and will leverage automated incident response to obstruct insider threat before data loss occurs.More
Story image
Fujitsu recognised a leader in Australian cyber security
"The company is well positioned to serve new businesses in the managed security services market in Australia."More
Story image
Cryptomining trojan malware discovered by ESET researchers
The malware, primarily targeting victims in Czechia and Slovakia, prioritises subterfuge through deployment of multiple techniques to avoid detection, and leans heavily on the Tor network and BitTorrent protocol to achieve its goals.More
Story image
75% of IT execs 'worried' about being targeted in cyber-attack
A new report from ConnectWise has shed light on the widespread concern about cyber-attacks, with 91% of SMB executives considering a move to an MSP if it provided the 'right' solution.More