Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

9/9/2019
05:00 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

More Than 99% of Cyberattacks Need Victims' Help

Research highlights how most criminals exploit human curiosity and trust to click, download, install, open, and send money or information.

Most cybercriminals target people, not infrastructure: More than 99% of emails distributing malware from 2018 into 2019 required human interaction to click links, open documents, accept security warnings, or complete other tasks to effectively compromise an organization. Instead of targeting systems, criminals focus on people, their roles, and data they can access.

The data comes from Proofpoint, where for 18 months researchers observed attack trends to compile the "Human Factor 2019" report. What they found was an increasing sophistication and prevalence of social engineering across businesses as attackers shift from smash-and-grab ransomware campaigns to well-crafted business email compromise schemes and domain fraud.

"The vast majority of threats we see rely on some sort of human interaction," says Chris Dawson, threat intelligence lead at Proofpoint. "We are still seeing, and occasionally will see, a spike in the use of a hardware or software vulnerability, but it still ends up being embedded in a malicious document." Even with the use of an exploit and macros, human interaction is essential to follow links, open documents, accept security warnings, or complete other actions.

Generic email harvesting made up nearly 25% of all phishing schemes in 2018, Proofpoint reports. Credential collection remains a strong focus this year, with techniques pivoting to Microsoft Office 365 phishing schemes and impostor attacks. Cloud storage, DocuSign, and Microsoft cloud service phishing are this year's hottest phishing lures, replacing last year's trend of "Brain Food," a botnet used to distribute diet-related spam to capture victims' credit cards.

Attackers know companies are moving to the cloud, Dawson says, and if employees see something that looks familiar, they'll click it, even if the sender is unfamiliar. People are used to seeing Office 365 and Dropbox links; the instinct to click precedes the instinct to think twice.

Impostor emails are shifting away from "Request" subject lines and are increasingly showing "Payment" or "Urgent" messages. Subject lines vary seasonally — W-2-related attacks were popular in late 2018 and early 2019 — and by industry. Education, for example, receives a disproportionate number of "Request" and "Greeting" emails, while attacks on engineering firms typically use "Urgent" and "Request" in the subject line. In keeping with business processes, most impostor emails are sent on Monday and trail off throughout the workweek.

What's Inside
Unlike broad campaigns that delivered ransomware in droves, today's attackers leverage more-thoughtful attacks on a smaller scale. Their preference is for malware that can sit on a victim's computer and remain there for a number of days or months without triggering any red flags. Many have taken to distributing sophisticated backdoors to collect data, Dawson explains.

"All of these things are designed to sit on a victim's machine, collect data long term, and maybe do something later on," he says. The industry is seeing a pattern of ransomware attacks in which it appears the organization had been compromised long before the infection began.

The Carbanak group, for example, uses lures and well-crafted file attachments to distribute multiple strains of malware, researchers report. One 2018 campaign included an email, with a file attached, that claimed to be protected with security technology. Instructions to "decrypt" the file enabled macros and installed the Griffon backdoor, which is often used in Carbanak campaigns.

Whose Inboxes Are at Risk?
Today's campaigns are increasingly targeted; however, attackers are demonstrating variety in the types of people they target and how they craft their campaigns.

"The most attacked are people who are much more readily available," says Dawson. This group often does not include C-level executives, who generally keep their online identities hidden. It does include salespeople, marketing teams, and human resources professionals, many of whom have publicly available emails. Of the "very attacked people," or VAPs, identified, 36% of associated identities could be found online via corporate websites, social media, or other sites. In contrast, only 7% of executive email addresses could be found online, researchers report.

Crimes of opportunity, or emails to alias addresses like HR[@]company[.]com, are common. "It's really quite difficult to secure a shared account," Dawson says of alias email accounts.

Attackers are finding success in using more than five spoofed identities to target more than five individuals in each organization. "We see this pendulum swinging," he adds of the switch from one-to-one attacks, to one-to-many attacks, to many-to-many attacks. Attackers may spoof the identities of several executives or senior managers while sending a malicious file to employees, or they could leverage a group of spoofed identities to ask the HR department for W-2 data.

Says Dawson: "They're finding enough success with this technique that they are dramatically increasing the number of identities they use and the number of people they attack."

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "Phishers' Latest Tricks for Reeling in New Victims."

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
REISEN1955
100%
0%
REISEN1955,
User Rank: Ninja
9/10/2019 | 8:50:54 AM
The first firewall
Are PEOPLE - IF YOU DON'T NEED IT, DON'T READ IT, DELETE IT. 
US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
Fed Kaspersky Ban Made Permanent by New Rules
Dark Reading Staff 9/11/2019
NetCAT Vulnerability Is Out of the Bag
Dark Reading Staff 9/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16395
PUBLISHED: 2019-09-17
GnuCOBOL 2.2 has a stack-based buffer overflow in the cb_name() function in cobc/tree.c via crafted COBOL source code.
CVE-2019-16396
PUBLISHED: 2019-09-17
GnuCOBOL 2.2 has a use-after-free in the end_scope_of_program_name() function in cobc/parser.y via crafted COBOL source code.
CVE-2019-16199
PUBLISHED: 2019-09-17
eQ-3 Homematic CCU2 before 2.47.18 and CCU3 before 3.47.18 allow Remote Code Execution by unauthenticated attackers with access to the web interface via an HTTP POST request to certain URLs related to the ReGa core process.
CVE-2019-16391
PUBLISHED: 2019-09-17
SPIP before 3.1.11 and 3.2 before 3.2.5 allows authenticated visitors to modify any published content and execute other modifications in the database. This is related to ecrire/inc/meta.php and ecrire/inc/securiser_action.php.
CVE-2019-16392
PUBLISHED: 2019-09-17
SPIP before 3.1.11 and 3.2 before 3.2.5 allows prive/formulaires/login.php XSS via error messages.