Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

4/21/2017
10:52 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

Exploits Targeting Corporate Users Surged Nearly 30% In 2016

At same time, number of attacks targeting software vulnerabilities in systems used by consumers declined over 20%, Kaspersky Lab says in new report.

A new report from Kaspersky Lab this week holds some mixed news for individuals and organizations on a couple of fronts.

The report is based on an analysis of the threats detected and blocked worldwide by Kaspersky Lab’s antimalware products in 2016.

It showed that attacks against individual users decreased nearly 21% last year, from around 5.5 million users in 2015 to just over 4.3 million users in 2016.  

During the same period though, attacks against systems used by corporate users jumped sharply from around 540,000 in 2015 to 690,000 last year, representing a 28.4% increase in 12 months. For purposes of classification, Kaspersky Lab counted users of all systems protected by the company’s enterprise antimalware suite as corporate users.

Kaspersky Lab’s data revealed a similar dichotomy in exploit activity data. During 2016, several widely used exploit kits including Neutrino and Angler exited the underground scene and in the process significantly impacted the capabilities of many cybercrime groups to spread malware.

At the same time, and somewhat counter-intuitively, there were over 702 million attacks with exploits in 2016, a substantial 25% increase over 2015. What that meant was that though the number of individuals who encountered exploits decreased overall in 2016, the likelihood of their encountering an attack was actually higher.

“In other words, the number of websites infected with exploits and the number of spam messages with malicious attachments keeps growing,” the Kaspersky Lab report noted.

Alexander Liskin, a security expert at Kaspersky Lab says there are a couple of plausible reasons why corporate users ended up getting targeted more than consumers in 2016.

The slowdown in exploit kit activity, the proliferation of bug bounty programs and redoubled efforts by software vendors to address security bugs last year significantly increased the cost to cybercriminals of developing new exploits, Liskin says. So instead of targeting consumers, there appears to have been heightened interest in going after higher value corporate users.  

“Apparently, criminals consider these users valuable targets and are willing to invest into attacking them with exploits. This could be the reason for an increased amount of attacked corporate users,” Liskin says.

The trend is worrisome. The underground economy is driven by nearly the same principles as a legit one, he says. “Cybercriminals put efforts only into potentially profitable areas. If the number of corporate users attacked with exploits is growing, it means that it makes sense for bad guys to invest into exploits for such attacks.”

 

Stuxnet Flaw Still A Mark

Kaspersky Lab’s review of exploit activity in 2016 uncovered other important trends as well.

Exploits targeting Windows and browser vulnerabilities for instance dropped sharply by 21.56% and 33.4% respectively in 2016. But the number of users attacked with exploits targeting security flaws in Microsoft’s Office software surged by nearly 103%.

Similarly, attacks seeking to exploit vulnerabilities in Adobe Flash and Android jumped in 2016, but by relatively much smaller percentage. Adobe Flash exploits increased about 12% while Android exploits increased 23%.

Interestingly enough though, the vulnerability that was most targeted in 2016 was the Stuxnet LNK flaw that was exploited in the cyber attack on Iran’s nuclear enrichment facility in Natanz seven years ago. Though Microsoft first patched the issue back in 2010 and issued a more comprehensive patch for it in 2015, attackers have kept going at the flaw and have made it the most attacked vulnerability for the past several years in a row.

It’s hard to say exactly why that is happening, Liskin says. It is possible that many users are still using legacy systems with unpatched or pirated Windows versions. The fact that the LNK vulnerability gives malware authors a relatively easy way to make self-spreading malware could be another issue, he said.

“There are a lot of networks around the world that are unprotected and infected with LNK equipped malware endpoints,” Liskin said. “These endpoints pose a constant threat to other parts of the network and also generate lots of detections.”

The Stuxnet LNK flaw is not the only vulnerability that is being exploited in this manner. Another example is CVE-2012-0158 in Microsoft Office’s Active X control. That 2012 flaw, like Stuxnet LNK, continues to be widely exploited by ordinary cybercriminals and targeted attack actors because a lot of individuals and organizations are still running vulnerable versions of the software, Liskin said.

The key takeaway from the research is an old one. “Patch the software you have on your PC or corporate endpoints in time,” he says.” Even this single measure would significantly decrease the risk exploits pose to your private or corporate data.” 

Related stories:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
News
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
News
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31607
PUBLISHED: 2021-04-23
In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the snapper.diff function...
CVE-2021-31597
PUBLISHED: 2021-04-23
The xmlhttprequest-ssl package before 1.6.1 for Node.js disables SSL certificate validation by default, because rejectUnauthorized (when the property exists but is undefined) is considered to be false within the https.request function of Node.js. In other words, no certificate is ever rejected.
CVE-2021-2296
PUBLISHED: 2021-04-22
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromi...
CVE-2021-2297
PUBLISHED: 2021-04-22
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromi...
CVE-2021-2298
PUBLISHED: 2021-04-22
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attac...