Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

11:00 AM
Robert Lemos
Robert Lemos

Attackers Continue to Focus on Users, Well-Worn Techniques

From WannaCry and phishing to credential stuffing and cryptomining, attackers relied on many oldie-but-goodie attacks in 2018, according to a pair of new security threat reports.

Traditional attacks, such as phishing and credential stuffing, continue to dominate the threat landscape for most industries, while well-known malware, such as WannaCry, remain a threat for behind-the-curve companies, according to two annual cyberthreat reports released today.

In 2018, security firm Trend Micro detected 20.6 million phishing URLs, an increase of 82% over 2017, according to the firm's "2018 Annual Security Roundup." And in its Q4 2018 "Quarterly Threat" report, security firm Rapid7 found that suspicious attempts to log in were the most common attack detected by companies.

The data underscores that attackers are still focused on taking advantage of users and user accounts, says Jon Clay, director of global threat communications for security firm Trend Micro.

"We are seeing the threat actors are still targeting employees and targeting consumers with phishing attacks," he says. "We are seeing a little more targeting in their approach, in terms of victims." 

The data from the reports presents a multifaceted view of the threat landscape that most companies face, but those threats depend a great deal on the level of maturity of a company's security program and its industry.

For example, the utilities sector most often saw phishing attacks and attempts to compromise systems via Trojan horse programs, while most other industries typically had to deal with suspicious log-in attempts. Technology can help users make better decisions about events that could could compromise their systems.

"Most of these attacks are, if not user-driven, user-assisted," says Tod Beardsley, director of research for Rapid7. Education and training are necessary, but not sufficient, he says. "I don't think we want users to have to be forensic scientist to do their jobs," he adds.

Here are some of the trends seen by Trend Micro and Rapid7 in 2018 and what they mean for 2019.

Old Attacks Still Work
Some of the most popular attacks — representing the most attack traffic detected by security firms — are older attacks. According to Rapid7, traffic containing attacks targeting the vulnerability exploited by EternalBlue and default passwords on telnet services were the most-detected attacks in 2018.

The EternalBlue exploit is most famously used by WannaCry, a self-propagating ransomware worm, that began spreading in 2017, but continues to attempt to infect other systems today. 

"WannaCry is one of the top malware we are seeing every month detected through our sensors, mainly because it is a worm, and it tries to spread itself all the time," Trend Micro's Clay says.

Self-propagating malicious programs tend to stick around the Internet, infecting older, unpatched systems and continuing their automated spread. Conficker, for example, started spreading a decade ago, and infected systems continue to attempt to spread the program. Trend Micro detects 20,000 to 40,000 communications from those systems every month, Clay says.

Cryptomining and the Android Debug Bridge
In 2018, attackers often tried to monetize insecure systems by compromising them and installing cryptomining software to turn processing power into potential digital currency. 

One key campaign targeted any Android device with an exposed service, known as the Android Debug Bridge. The attackers kicked off the operation last February, targeting Internet TV boxes (IPTV).

"It exploded in July because there was one specific mining campaign that was using it," Rapid7's Beardsley says. "Eventually it was blocked, in part, because IPTV was the focus of some lawsuits for piracy and not because of security."

By December, Internet service providers started blocking the port, which hobbled the attack. 

"Be mindful of new threat vectors," Rapid7 stated in its report. "This was the first of many examples of attackers showing their skill, creativity, and flexibility when it comes to discovering and exploiting new areas of attack."

Attackers Still Use the Front Door
By far, however, the most common types of attacks are bad actors logging into a service using stolen or commonly used credentials — "suspicious authentication" dominated the attack detections for most industries in 2018, according to Rapid7's report. And with more than 1.5 billion working credentials in the hands of attackers, according to Rapid7 estimates, there is a lot of opportunity for attackers to just walk in the front door.

Making the situation more dire, most companies still do not require two-factor authentication (2FA) to harden their systems against credential stuffing and password guessing. As a result, such attacks still deliver acceptable risk-reward trade-offs for attackers, Rapid7's Beardsley says.

"The status quo today is that most people have an OK password with no 2FA," he says. "If I [as an attacker] can be very focused in my attacks, I can reach success rates that are really high with credential-based attacks — around 25%."

The most popular default password combinations vary by service: Admin/admin is popular for Web servers, while root/123456 is popular for telnet services, according to Rapid7.

Companies should focus on consistent and frequent training of employees, adopt 2FA, and focus on the threats that are most common for their industries, the company stated in its report.

"Your humans are both your organization’s greatest assets and, unfortunately, the prime attack vector for attackers," Rapid7 stated. "Heed the knowledge gained and reinforced about attackers relying on humans to focus on enabling your workforce to be co-defenders of your enterprise."

Related Links



Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Ninja
2/26/2019 | 4:00:25 PM
Focus on users
What a novel concept!   They are the weakest link in the front line - and need enormous amounts of education that is basic and reality based.  I have a simple email rule that works - If you don't need it, don't read it, delete it.  That alone would save the world a ton of pain.  But still they reply and click and open stuff they should not.  Curiosity killed the cat or they just want to see what it may do.  That is an odd thing but I saw it at work ages ago with the Anna Kournikovia virius pic.  They want to see how bad it is.  HAH!!!   So the user is always the easiest place to gain entry.  Always will be.  One user, just one, brought down the State of North Carlolina last year.  So ... fact of life. 
A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/11/2021
Cybersecurity: What Is Truly Essential?
Joshua Goldfarb, Director of Product Management at F5,  5/12/2021
3 Cybersecurity Myths to Bust
Etay Maor, Sr. Director Security Strategy at Cato Networks,  5/11/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-18
Buffer overflow vulnerability in libsolv 2020-12-13 via the Solver * testcase_read(Pool *pool, FILE *fp, const char *testcase, Queue *job, char **resultp, int *resultflagsp function at src/testcase.c: line 2334, which could cause a denial of service
PUBLISHED: 2021-05-18
WebSVN before 2.6.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the search parameter.
PUBLISHED: 2021-05-18
In Pluck-4.7.10-dev2 admin background, a remote command execution vulnerability exists when uploading files.
PUBLISHED: 2021-05-18
A heap-based buffer overflow vulnerability exists in LibreDWG 0.10.1 via the read_system_page function at libredwg-0.10.1/src/decode_r2007.c:666:5, which causes a denial of service by submitting a dwg file.
PUBLISHED: 2021-05-18
An issue was discovered in Pluck 4.7.10-dev2. There is a CSRF vulnerability that can editpage via a /admin.php?action=editpage