Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

4/15/2021
09:00 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Malicious PowerShell Use, Attacks on Office 365 Accounts Surged in Q4

There was also a sharp increase in overall malware volumes in the fourth quarter of 2020, COVID-19 related attack activity, and mobile malware, new data shows.

For security teams, there was a lot more of everything to defend against in the final quarter of 2020 compared to previous months.

PowerShell threats grew 208%; Microsoft Office malware increased by 199%, while malware targeting mobile devices rose 118% between the third and fourth quarters of 2020. And COVID-19 related malware and threats surged 114%.

Related Content:

Global Dwell Time Drops as Ransomware Attacks Accelerate

Special Report: How Data Breaches Affect the Enterprise

New From The Edge: 9 Modern-Day Best Practices for Log Management

A new analysis by McAfee of threat data during the period showed similar increases on several other fronts as well. The volume of malware threats detected on enterprise networks rose 10% to 648 threats per minute compared to 588 in Q3, 2020; ransomware once again grew in volume, this time by 69% and adversaries hammered cloud user accounts belonging to McAfee's customers with an astounding 3.1 million attacks in the last quarter of 2020.

McAfee's analysis showed that technology companies were the most targeted entities in Q4, followed by organizations in the public sector. Publicly reported attacks targeting the technology sector surged 100%, while those targeting public sector entities went up 93% in the last three months of 2020.

Sandeep Chandana, director at McAfee’s MVISION Cloud group, says a large portion of the cloud attacks in Q4 were targeted at Microsoft Office 365 accounts. The attacks could be classified as either distributed login attacks on hundreds or thousands of Office 365 accounts via compromised consumer devices, or targeted attacks on a small number of potentially high-value accounts.

Other security vendors have reported a similar increase in cloud attacks targeted at Office 365 environments over the past year. A March 2021 Vectra AI report based on a global survey of over 1,100 IT security professionals, for instance, showed that many organizations have increased their use of Office 365 because of the pandemic. More than seven-in-10 (71%) of the respondents said they had experienced an average of seven incidents where attackers had taken over a legitimate Office 365 account.

Chandana says there were other patterns around cloud native attacks in Q4 2020. "Recent cloud native attacks could also be categorized by the types of region-of-origin and target-industry-vertical," he says. "Attacks on financial organizations seemed to originate from one part of the world, while attacks on public sector tend to originate from a relatively different part of the world," he says.

Malware volumes overall increased 43% and continued to be the primary attack vector for most security incidents detected in Q4, followed by account hijackings of the sort targeted at Office 365 accounts. Exploits targeting new vulnerabilities meanwhile shot up 100% in Q4, while targeted attacks increased 43%.

PowerShell Surge

One factor complicating detection efforts at many companies was the sharp—and continued--use of PowerShell in attacks. A recent investigation by Red Canary showed that attackers commonly use command and script interpreters such as Windows Command Shell and PowerShell to execute malicious commands, and run scripts and binaries when carrying out an attack. Over 48% of organizations in Red Canary's study reported encountering incidents where PowerShell was part of the attack chain.

Raj Samani, chief scientist at McAfee, says there were specific campaigns in the fourth quarter of 2020 that dramatically increased reporting of incidents in this category. "PowerShell is a tool with both good and bad uses," he says. Organizations should consider their risk appetite when weighing decisions on whether to permit its use or not, he says. "If you are going to run PowerShell, you need to have mechanisms in place to monitor its usage," Samani notes.

And, he says, just because enterprise policies might not permit the use of PowerShell does not mean that PowerShell isn't being used anyway. "Anticipate it and monitor it within your environment."

The increase in malware and attack volumes that McAfee observed in the last three months of 2020 came amid signs that organizations are getting better at detecting security incidents on their own—something that has been a longstanding problem for many. A new analysis of a year's worth of intrusion data by FireEye Mandiant showed that in 59% of the incidents, the organization itself detected the intrusion initially—an improvement of 12% over the prior year.

However, in many cases organizations appear to have detected breaches only because they had been hit with ransomware, rather than because of improved threat detection capabilities.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
tdsan
50%
50%
tdsan,
User Rank: Ninja
4/15/2021 | 5:48:17 PM
Powershell and Windows 10 has numerous restrictive capabilities
If the user did not want to allow PowerShell (PS) scripts from running (especially from a Web or email server), then why not add lines like the following:
  • $exec = get-executionpolicy ; if ($exec -eq "Bypass" -or $exec -eq "Unrestricted") { set-executionpolicy -executionpolicy "Restricted"}
  • Run "Get-ExecutionPolicy" again just to make sure it is set to "Restricted"

In addition, all ports (if web-server) should be blocked, except port 443 or 80 in some respects (Windows firewall can do that but there are ofcourse better options - PaloAlto is a good one that we use), not sure why the execution policy (if configured properly) would even allow remove exploits like this to penetrate the initial defenses).

  • netsh advfirewall firewall add rule name="Require Encryption for Inbound TCP/80" protocol=TCP dir=in localport=80 security=authdynenc action=allow

I would also go to "taskschd.msc" and look at the "Task Scheduler Library" to ensure there are no running "PS" scripts. The user can create a script to run to ensure the setting is always set to "Restricted"
  • schtasks /create /TN restrict /SC Daily /TR "powershell -c restrict.ps1" /ST 06:00

This ensures the system is set to restrict executionpolicy or set it to Restricted.

Also, Windows 10 uses Windows Defender Security Center to protect against these types of Attacks, this could have been overlookewell, lessons learned.

Todd

News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-35519
PUBLISHED: 2021-05-06
An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel version v5.12-rc5. A bounds check failure allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel i...
CVE-2021-20204
PUBLISHED: 2021-05-06
A heap memory corruption problem (use after free) can be triggered in libgetdata v0.10.0 when processing maliciously crafted dirfile databases. This degrades the confidentiality, integrity and availability of third-party software that uses libgetdata as a library. This vulnerability may lead to arbi...
CVE-2021-30473
PUBLISHED: 2021-05-06
aom_image.c in libaom in AOMedia before 2021-04-07 frees memory that is not located on the heap.
CVE-2021-32030
PUBLISHED: 2021-05-06
The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_chec...
CVE-2021-22209
PUBLISHED: 2021-05-06
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.8. GitLab was not properly validating authorisation tokens which resulted in GraphQL mutation being executed.