Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

2/26/2019
11:00 AM
Robert Lemos
Robert Lemos
News
50%
50%

Attackers Continue to Focus on Users, Well-Worn Techniques

From WannaCry and phishing to credential stuffing and cryptomining, attackers relied on many oldie-but-goodie attacks in 2018, according to a pair of new security threat reports.

Traditional attacks, such as phishing and credential stuffing, continue to dominate the threat landscape for most industries, while well-known malware, such as WannaCry, remain a threat for behind-the-curve companies, according to two annual cyberthreat reports released today.

In 2018, security firm Trend Micro detected 20.6 million phishing URLs, an increase of 82% over 2017, according to the firm's "2018 Annual Security Roundup." And in its Q4 2018 "Quarterly Threat" report, security firm Rapid7 found that suspicious attempts to log in were the most common attack detected by companies.

The data underscores that attackers are still focused on taking advantage of users and user accounts, says Jon Clay, director of global threat communications for security firm Trend Micro.

"We are seeing the threat actors are still targeting employees and targeting consumers with phishing attacks," he says. "We are seeing a little more targeting in their approach, in terms of victims." 

The data from the reports presents a multifaceted view of the threat landscape that most companies face, but those threats depend a great deal on the level of maturity of a company's security program and its industry.

For example, the utilities sector most often saw phishing attacks and attempts to compromise systems via Trojan horse programs, while most other industries typically had to deal with suspicious log-in attempts. Technology can help users make better decisions about events that could could compromise their systems.

"Most of these attacks are, if not user-driven, user-assisted," says Tod Beardsley, director of research for Rapid7. Education and training are necessary, but not sufficient, he says. "I don't think we want users to have to be forensic scientist to do their jobs," he adds.

Here are some of the trends seen by Trend Micro and Rapid7 in 2018 and what they mean for 2019.

Old Attacks Still Work
Some of the most popular attacks — representing the most attack traffic detected by security firms — are older attacks. According to Rapid7, traffic containing attacks targeting the vulnerability exploited by EternalBlue and default passwords on telnet services were the most-detected attacks in 2018.

The EternalBlue exploit is most famously used by WannaCry, a self-propagating ransomware worm, that began spreading in 2017, but continues to attempt to infect other systems today. 

"WannaCry is one of the top malware we are seeing every month detected through our sensors, mainly because it is a worm, and it tries to spread itself all the time," Trend Micro's Clay says.

Self-propagating malicious programs tend to stick around the Internet, infecting older, unpatched systems and continuing their automated spread. Conficker, for example, started spreading a decade ago, and infected systems continue to attempt to spread the program. Trend Micro detects 20,000 to 40,000 communications from those systems every month, Clay says.

Cryptomining and the Android Debug Bridge
In 2018, attackers often tried to monetize insecure systems by compromising them and installing cryptomining software to turn processing power into potential digital currency. 

One key campaign targeted any Android device with an exposed service, known as the Android Debug Bridge. The attackers kicked off the operation last February, targeting Internet TV boxes (IPTV).

"It exploded in July because there was one specific mining campaign that was using it," Rapid7's Beardsley says. "Eventually it was blocked, in part, because IPTV was the focus of some lawsuits for piracy and not because of security."

By December, Internet service providers started blocking the port, which hobbled the attack. 

"Be mindful of new threat vectors," Rapid7 stated in its report. "This was the first of many examples of attackers showing their skill, creativity, and flexibility when it comes to discovering and exploiting new areas of attack."

Attackers Still Use the Front Door
By far, however, the most common types of attacks are bad actors logging into a service using stolen or commonly used credentials — "suspicious authentication" dominated the attack detections for most industries in 2018, according to Rapid7's report. And with more than 1.5 billion working credentials in the hands of attackers, according to Rapid7 estimates, there is a lot of opportunity for attackers to just walk in the front door.

Making the situation more dire, most companies still do not require two-factor authentication (2FA) to harden their systems against credential stuffing and password guessing. As a result, such attacks still deliver acceptable risk-reward trade-offs for attackers, Rapid7's Beardsley says.

"The status quo today is that most people have an OK password with no 2FA," he says. "If I [as an attacker] can be very focused in my attacks, I can reach success rates that are really high with credential-based attacks — around 25%."

The most popular default password combinations vary by service: Admin/admin is popular for Web servers, while root/123456 is popular for telnet services, according to Rapid7.

Companies should focus on consistent and frequent training of employees, adopt 2FA, and focus on the threats that are most common for their industries, the company stated in its report.

"Your humans are both your organization’s greatest assets and, unfortunately, the prime attack vector for attackers," Rapid7 stated. "Heed the knowledge gained and reinforced about attackers relying on humans to focus on enabling your workforce to be co-defenders of your enterprise."

Related Links

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
2/26/2019 | 4:00:25 PM
Focus on users
What a novel concept!   They are the weakest link in the front line - and need enormous amounts of education that is basic and reality based.  I have a simple email rule that works - If you don't need it, don't read it, delete it.  That alone would save the world a ton of pain.  But still they reply and click and open stuff they should not.  Curiosity killed the cat or they just want to see what it may do.  That is an odd thing but I saw it at work ages ago with the Anna Kournikovia virius pic.  They want to see how bad it is.  HAH!!!   So the user is always the easiest place to gain entry.  Always will be.  One user, just one, brought down the State of North Carlolina last year.  So ... fact of life. 
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
SOC 2s & Third-Party Assessments: How to Prevent Them from Being Used in a Data Breach Lawsuit
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC,  12/5/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-4095
PUBLISHED: 2019-12-10
IBM Cloud Pak System 2.3 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 158015.
CVE-2019-4244
PUBLISHED: 2019-12-10
IBM SmartCloud Analytics 1.3.1 through 1.3.5 could allow a remote attacker to gain unauthorized information and unrestricted control over Zookeeper installations due to missing authentication. IBM X-Force ID: 159518.
CVE-2019-4521
PUBLISHED: 2019-12-10
Platform System Manager in IBM Cloud Pak System 2.3 is potentially vulnerable to CVS Injection. A remote attacker could execute arbitrary commands on the system, caused by improper validation of csv file contents. IBM X-Force ID: 165179.
CVE-2019-4663
PUBLISHED: 2019-12-10
IBM WebSphere Application Server - Liberty is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 171245...
CVE-2019-19251
PUBLISHED: 2019-12-10
The Last.fm desktop app (Last.fm Scrobbler) through 2.1.39 on macOS makes HTTP requests that include an API key without the use of SSL/TLS. Although there is an Enable SSL option, it is disabled by default, and cleartext requests are made as soon as the app starts.