Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

5/19/2015
04:45 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

3 'Old' Attack Trends That Dominated Q1

What's old is new as attackers recycle their attack patterns.

Trend Micro TrendLabs released a new report today that summed up the first three months worth of malicious activity as a function of utility rather than ingenuity. As Trend's researchers explained, the high volume of attacks lobbied today against Internet targets relied very heavily on old techniques recycled in slightly new ways.

"Don’t let their age fool you: these threats have come back stronger and more malicious than ever," explained Christopher Budd, global threat communications manager for Trend. "The prevalence and success of these threats shows again that innovation isn’t restricted to developing new threats in new arenas: it’s also in taking old threats and improving them to succeed against the security protections that once thwarted them."

According to Trend analysis, the following three attack techniques were some of the most prevalent in first quarter of 2015.

Malvertising

Abusing third party ad infrastructure to serve up malware in addition to ads on websites is a longstanding technique at this point. But Q1 "saw attackers take up malvertisements once again with a vengeance," says Budd. Malvertising was paired with zero-day vulnerabilities using exploit tools like Angler to give malvertising "a new lease on life," he says.

Attackers are slowly evolving the malvertising methodology by establishing ways to better perpetrate mobile attacks, as was the case with the MDash adware attacks on the Google Play ecosystem.

Cryptoransomware

Similarly, cryptoransomware was huge in 2013 but somewhat dropped off the map toward the end of that year. That changed in the last quarter of 2014 when ransomware attacks in general started picking up and continued to surge in 2015.

According  to Trend researchers, cryptoransomware rose to make up half of all ransomware infections and infected four times as many victims in Q1 2015 as they did during the same time period in 2014. In this latest rise, researchers are seeing cryptoransomware move from consumer targets to focus more squarely on enterprises, encrypting files in network shares, websites and web servers to ensnare more profitable businesses in their malicious scheme.

'Old-School' Macro Malware

It's been more than two decades since macro malware came onto the scene with the spread of the Word Concept virus. The security community has worked to mitigate macro risks, which may have led the community to forget it as an attack vector. Last quarter showed attackers taking advantage of that complacency and a resurgence in attacks using the technique—with a macro malware infection rate nearly double that of the previous quarter. Not only are attackers taking advantage of social engineering to enable and run macros, but they're also finding other end-arounds.

"In the past, cybercriminals would use social engineering to get users to run malicious macros in documents," says Numaan Huq, senior threat researcher for Trend. "Today, they also exploit vulnerabilities in Office to run the macro." 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
xmarksthespot
50%
50%
xmarksthespot,
User Rank: Strategist
5/22/2015 | 3:56:43 AM
Great info
The mention of malvertising led me to read about it.  Apparently, obfuscated Javascript is used to infect systems.  This led me to read more about Javascript deobfuscation tools and other malware analysis tools.  Drive-by downloads are very concerning.  Selectively enabling Javascript helps a lot, I am sure.
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27132
PUBLISHED: 2021-02-27
SerComm AG Combo VD625 AGSOT_2.1.0 devices allow CRLF injection (for HTTP header injection) in the download function via the Content-Disposition header.
CVE-2021-25284
PUBLISHED: 2021-02-27
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
CVE-2021-3144
PUBLISHED: 2021-02-27
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
CVE-2021-3148
PUBLISHED: 2021-02-27
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
CVE-2021-3151
PUBLISHED: 2021-02-27
i-doit before 1.16.0 is affected by Stored Cross-Site Scripting (XSS) issues that could allow remote authenticated attackers to inject arbitrary web script or HTML via C__MONITORING__CONFIG__TITLE, SM2__C__MONITORING__CONFIG__TITLE, C__MONITORING__CONFIG__PATH, SM2__C__MONITORING__CONFIG__PATH, C__M...