Story image

Proofpoint unveils the biggest cyber threat hotspots from Q4 2016

10 Feb 2017

Proofpoint has released its Quarterly Threat Summary looking back at 2016, and it’s a case of more sophisticated evolution, more email malware, more social engineering, more BEC scams and more of a market for cyber exploit kits.

Q4 saw the biggest malicious email campaign yet, which was 6.7 times bigger than those seen in Q3.  Both campaigns used zipped JavaScript attachments to distribute the notorious Locky, which Proofpoint says explains the increase in Locky campaign volumes.

Business Email Compromise (BEC) scams were also on the rise, but CEO-CFO spoofing dropped 28%, down from its 39% high in Q3.

Social media phishing attacks have jumped by 500% in 2016 alone. Angler phishing was a popular method, which intercepts customer support channels on social media.

Fraudulent accounts on social channels also jumped by 100% between Q3 and Q4 alone, which Proofpoint says may be indicative of use in phishing, social spam and malware distribution and other attacks.

Mobile devices were not shielded from malware, as hundreds of thousands were exposed to malvertising, ad redirection and potential attack vectors through DNSChanger EK, which used SOHO router exploits that exposed all connected devices via DNS redirection.

More than 4500 mobile apps that tied themselves to the Summer Olympics and associated sponsor brands were also malicious. Proofpoint says that popular events and culture are common targets for risky apps.

Proofpoint’s top tips for organisations:

  • Assume users will click on links: Social engineering is popular, effective and rapidly evolving. Use a solution that identifies and quarantines inbound threats that target employees and outbound email threats that target customers.
  • Protect your brand reputation and customers: Look out for attacks – especially from fraudulent piggyback accounts - that target your customers over social media, email and mobile. Use a social media solution that can scan and report fraudulent activity.
  • Keep your mobile app environments secure: Mobile environments increase the risk of unauthorised apps that can steal critical information. Use a data-driven solution that works with mobile device management to show app behaviour and the data they are accessing.
  • Partner with a threat intelligence vendor: As attacks are getting more targeted, partnering with a vendor gives organisations a solution that combines static and dynamic techniques to protect and learn from threats.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
WatchGuard announces A/NZ partners awards
Four Australian companies were named partner award winners at the WatchGuard conference in Vietnam.
Telstra’s 2019 cybersecurity report
Cybersecurity remains a top business priority as the estimated number of undetected security breaches grows.
Why AI and behaviour analytics should be essential to enterprises
Cyber threats continue to increase in number and severity, prompting cybersecurity experts to seek new ways to stop malicious actors.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Why cybersecurity remains a top business priority
One in two Australian businesses estimated that they will receive fines for being in breach of new legislation.