Story image

Mac malware on WatchGuard’s top ten list for first time

18 Dec 2018

Mac-based malware has appeared on the list of the top ten most common types of malware for the first time in WatchGuard’s quarterly Internet Security Report.

The Mac scareware appeared in sixth place in WatchGuard’s latest Q3 2018 report and is primarily delivered by email to trick victims into installing fake cleaning software.

The new report also found that 6.8% of the world’s top 100,000 websites still accept old, insecure versions of the SSL encryption protocol, while more malware hits were seen in Asia-Pacific than in any other geographical region, reflecting a significant increase in attacks targeted at this area throughout 2018.

The report is based on data from active WatchGuard Firebox unified threat management (UTM) appliances around the world and covers the major malware campaigns, network attacks and security threats targeting midmarket businesses and distributed enterprises.

WatchGuard Technologies CTO Corey Nachreiner says, “Outside of a few surprising finds, like Mac scareware in our top ten malware list, we saw attackers stick to what they know in Q3 by reusing and modifying old attacks like cross-site scripting, Mimikatz and cryptominers.

“It’s a good reminder that the vast majority of attacks aren’t ultra-advanced zero-days and can be prevented by using a layered security approach with advanced malware detection capabilities and investing in secure Wi-Fi and multi-factor authentication (MFA) solutions.”

“However, we are quite concerned at how many major websites are still using the insecure SSL protocol. This is a basic security best practice that should be implemented across 99.9% of the internet by now – it puts hundreds of thousands of users at risk.”

The insights, research and security best practices included in WatchGuard’s quarterly Internet Security Report help organisations of all sizes understand the current cybersecurity landscape and better protect themselves, their partners and customers from emerging security threats.

The top takeaways from the Q3 2018 report include: 

  • 6.8% of the top 100,000 websites still support old, insecure versions of the SSL protocol. Despite it being deprecated by the Internet Engineering Task Force (SSL 2.0 was deprecated in 2011 and SSL 3.0 in 2015), 5,383 websites in the top 100,000 via Alexa still accept SSL 2.0 and SSL 3.0 encryption. Also, 20.9% of the top 100,000 websites still do not use web encryption at all.  
  • Mac malware cracks the top ten for the first time ever. A piece of Mac scareware appeared in sixth place in WatchGuard’s top ten malware list. It is primarily delivered by email and tries to trick victims into installing fake cleaning software.  
  • Hackers target APAC. For the second time ever, APAC reported more total malware hits than EMEA or the USA. Top variants included Razy, which targeted APAC almost exclusively, Win32/Heur and MAC.OSX.AMCleanerCA.  
  • Cryptominers remain popular. Razy, the second most common piece of malware detected by WatchGuard, evolved into a cryptominer in Q3 and made up 4% of all malware blocked by WatchGuard antivirus service worldwide.  
  • Mimikatz remains the most popular malware in Q3. This popular password theft kit has dominated WatchGuard’s top ten malware list for multiple quarters and shows no sign of slowing down.  
  • Attackers go after web applications with cross-site scripting. Cross-site scripting accounted for 39.3% of the top ten exploits in Q3, primarily targeting web applications. 

The complete Q3 ISR also includes an analysis of the Facebook “View As” data breach.

It explains how chaining vulnerabilities together allowed hackers to steal personal information from 50 million Facebook accounts, as well as best practices for security professionals based on the malware and network attack trends explained in this report.

These findings are based on anonymised Firebox Feed data from over 40,000 active WatchGuard UTM appliances worldwide

ZombieLoad: Another batch of flaws affect Intel chips
“This flaw can be weaponised in highly targeted attacks that would normally require system-wide privileges or a complete subversion of the operating system."
Forget endpoints—it’s time to secure people instead
Security used to be much simpler: employees would log in to their PC at the beginning of the working day and log off at the end. That PC wasn’t going anywhere, as it was way too heavy to lug around.
DimData: Fear finally setting in amongst vulnerable orgs
New data ranking the ‘cybermaturity’ of organisations reveals the most commonly targeted sectors are also the most prepared to deal with the ever-evolving threat landscape.
IXUP goes "post-quantum" with security tech upgrade
The secure analytics company has also partnered with Deloitte as a reseller, and launched a SaaS offering on Microsoft Azure.
Infoblox appoints channels head for A/NZ
Kenneth Cartwright’s appointment extends Infoblox’s position in secure cloud-managed network services throughout the region.
ExtraHop’s new partner program for enterprise security
New accreditations and partner portal enable channel partners to fast-track their expertise and build their security businesses.
Hackers increasingly ‘island hopping’ – so what does it mean?
Carbon Black's Rick McElroy discusses this new trend and what it means for the new age of cybercrime.
Trust without visibility is blind – Avi Networks
Enterprises are wanting to gain the trust of their customers, but are often found blindly defending themselves.