Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

2/26/2019
11:00 AM
Robert Lemos
Robert Lemos
News
50%
50%

Attackers Continue to Focus on Users, Well-Worn Techniques

From WannaCry and phishing to credential stuffing and cryptomining, attackers relied on many oldie-but-goodie attacks in 2018, according to a pair of new security threat reports.

Traditional attacks, such as phishing and credential stuffing, continue to dominate the threat landscape for most industries, while well-known malware, such as WannaCry, remain a threat for behind-the-curve companies, according to two annual cyberthreat reports released today.

In 2018, security firm Trend Micro detected 20.6 million phishing URLs, an increase of 82% over 2017, according to the firm's "2018 Annual Security Roundup." And in its Q4 2018 "Quarterly Threat" report, security firm Rapid7 found that suspicious attempts to log in were the most common attack detected by companies.

The data underscores that attackers are still focused on taking advantage of users and user accounts, says Jon Clay, director of global threat communications for security firm Trend Micro.

"We are seeing the threat actors are still targeting employees and targeting consumers with phishing attacks," he says. "We are seeing a little more targeting in their approach, in terms of victims." 

The data from the reports presents a multifaceted view of the threat landscape that most companies face, but those threats depend a great deal on the level of maturity of a company's security program and its industry.

For example, the utilities sector most often saw phishing attacks and attempts to compromise systems via Trojan horse programs, while most other industries typically had to deal with suspicious log-in attempts. Technology can help users make better decisions about events that could could compromise their systems.

"Most of these attacks are, if not user-driven, user-assisted," says Tod Beardsley, director of research for Rapid7. Education and training are necessary, but not sufficient, he says. "I don't think we want users to have to be forensic scientist to do their jobs," he adds.

Here are some of the trends seen by Trend Micro and Rapid7 in 2018 and what they mean for 2019.

Old Attacks Still Work
Some of the most popular attacks — representing the most attack traffic detected by security firms — are older attacks. According to Rapid7, traffic containing attacks targeting the vulnerability exploited by EternalBlue and default passwords on telnet services were the most-detected attacks in 2018.

The EternalBlue exploit is most famously used by WannaCry, a self-propagating ransomware worm, that began spreading in 2017, but continues to attempt to infect other systems today. 

"WannaCry is one of the top malware we are seeing every month detected through our sensors, mainly because it is a worm, and it tries to spread itself all the time," Trend Micro's Clay says.

Self-propagating malicious programs tend to stick around the Internet, infecting older, unpatched systems and continuing their automated spread. Conficker, for example, started spreading a decade ago, and infected systems continue to attempt to spread the program. Trend Micro detects 20,000 to 40,000 communications from those systems every month, Clay says.

Cryptomining and the Android Debug Bridge
In 2018, attackers often tried to monetize insecure systems by compromising them and installing cryptomining software to turn processing power into potential digital currency. 

One key campaign targeted any Android device with an exposed service, known as the Android Debug Bridge. The attackers kicked off the operation last February, targeting Internet TV boxes (IPTV).

"It exploded in July because there was one specific mining campaign that was using it," Rapid7's Beardsley says. "Eventually it was blocked, in part, because IPTV was the focus of some lawsuits for piracy and not because of security."

By December, Internet service providers started blocking the port, which hobbled the attack. 

"Be mindful of new threat vectors," Rapid7 stated in its report. "This was the first of many examples of attackers showing their skill, creativity, and flexibility when it comes to discovering and exploiting new areas of attack."

Attackers Still Use the Front Door
By far, however, the most common types of attacks are bad actors logging into a service using stolen or commonly used credentials — "suspicious authentication" dominated the attack detections for most industries in 2018, according to Rapid7's report. And with more than 1.5 billion working credentials in the hands of attackers, according to Rapid7 estimates, there is a lot of opportunity for attackers to just walk in the front door.

Making the situation more dire, most companies still do not require two-factor authentication (2FA) to harden their systems against credential stuffing and password guessing. As a result, such attacks still deliver acceptable risk-reward trade-offs for attackers, Rapid7's Beardsley says.

"The status quo today is that most people have an OK password with no 2FA," he says. "If I [as an attacker] can be very focused in my attacks, I can reach success rates that are really high with credential-based attacks — around 25%."

The most popular default password combinations vary by service: Admin/admin is popular for Web servers, while root/123456 is popular for telnet services, according to Rapid7.

Companies should focus on consistent and frequent training of employees, adopt 2FA, and focus on the threats that are most common for their industries, the company stated in its report.

"Your humans are both your organization’s greatest assets and, unfortunately, the prime attack vector for attackers," Rapid7 stated. "Heed the knowledge gained and reinforced about attackers relying on humans to focus on enabling your workforce to be co-defenders of your enterprise."

Related Links

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
2/26/2019 | 4:00:25 PM
Focus on users
What a novel concept!   They are the weakest link in the front line - and need enormous amounts of education that is basic and reality based.  I have a simple email rule that works - If you don't need it, don't read it, delete it.  That alone would save the world a ton of pain.  But still they reply and click and open stuff they should not.  Curiosity killed the cat or they just want to see what it may do.  That is an odd thing but I saw it at work ages ago with the Anna Kournikovia virius pic.  They want to see how bad it is.  HAH!!!   So the user is always the easiest place to gain entry.  Always will be.  One user, just one, brought down the State of North Carlolina last year.  So ... fact of life. 
AI Is Everywhere, but Don't Ignore the Basics
Howie Xu, Vice President of AI and Machine Learning at Zscaler,  9/10/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16349
PUBLISHED: 2019-09-16
Bento4 1.5.1-628 has a NULL pointer dereference in AP4_ByteStream::ReadUI32 in Core/Ap4ByteStream.cpp when called from the AP4_TrunAtom class.
CVE-2019-16350
PUBLISHED: 2019-09-16
ffjpeg before 2019-08-18 has a NULL pointer dereference in idct2d8x8() at dct.c.
CVE-2019-16351
PUBLISHED: 2019-09-16
ffjpeg before 2019-08-18 has a NULL pointer dereference in huffman_decode_step() at huffman.c.
CVE-2019-16352
PUBLISHED: 2019-09-16
ffjpeg before 2019-08-21 has a heap-based buffer overflow in jfif_load() at jfif.c.
CVE-2016-10967
PUBLISHED: 2019-09-16
The real3d-flipbook-lite plugin 1.0 for WordPress has XSS via the wp-content/plugins/real3d-flipbook/includes/flipbooks.php bookId parameter.