Threat Intelligence
10/2/2017
03:15 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Cyber Criminals Focused on Credential Theft: Report

28 September 2017 – Criminal tactics used to access user credentials are growing in prevalence and sophistication, according to the findings of WatchGuard’s latest quarterly Internet Security Report, which explores computer and network security threats affecting SMBs and distributed enterprises. The findings also show that a record 47 percent of all malware is now new or zero day and able to evade signature-based antivirus solutions.

“The global Firebox Feed data from Q2 shows that threat actors are more focused on credential theft than ever before,” said Corey Nachreiner, chief technology officer at WatchGuard Technologies. “From JavaScript-enabled phishing attacks and attempts to steal Linux passwords, to brute force attacks against web servers, the common theme here is that login access is a top priority for criminals. Knowing this, businesses must harden exposed servers, seriously consider multi-factor authentication, train users to identify phishing attacks and implement advanced threat prevention solutions to protect their valuable data.”

Mimikatz, a popular open source tool used for credential theft, accounted for 36 percent of the top 10 malware in Q2, earning it the number one position. Often used to steal and replace Windows credentials, this is the first time Mimikatz has appeared in the familiar group of top malware variants, showing that attackers are constantly adjusting tactics.

The report also shows that phishing attacks are increasingly using malicious JavaScript to fool users. For several quarters attackers have leveraged JavaScript code and downloaders to deliver malware in web and email-based attacks. But in Q2, attackers were seen to use JavaScript in HTML attachments to phishing emails that mimic login pages for popular legitimate sites like Google, Microsoft and others to trick users into willingly giving up their credentials.

Other key findings from the Q2 2017 report include:

  • Attackers target Linux passwords in Northern Europe. Cyber criminals used an old Linux application vulnerability to target several Nordic countries and the Netherlands with attacks designed to steal password hash files. More than 75 percent of attacks leveraging a remote file inclusion vulnerability to access /etc/passwd were aimed at Norway (62.7 percent) and Finland (14.4 percent). With such a high volume of incoming attacks, users should update Linux servers and devices as a basic precaution.
  • Brute force attacks against web servers climb. This summer, attackers used automated tools against web servers to crack user credentials. With the heightened prevalence of web-based attacks against authentication in Q2, brute force login attempts against web servers were present among the top 10 network attacks. Web servers without protections that monitor failed logins leave automated attacks unchecked to guess thousands of passwords each second.
  • Nearly half of all malware is able to circumvent legacy AV solutions. At 47 percent, more new or zero day malware is making it past legacy AV than ever before. The data shows that older, signature-based AV is increasingly unreliable when it comes to catching new threats, illustrating the need for behavioral detection solutions in order to catch advanced persistent threats.

WatchGuard’s Internet Security Report provides threat intelligence, research and security best practices in order to inform and educate readers about online adversaries so they can better protect themselves and their organizations. It is based on anonymised Firebox Feed data from more than 33,500 active WatchGuard UTM appliances worldwide. In total, these appliances blocked more than 16 million malware variants in Q2, with an average of 488 samples blocked by each individual device. Over the course of the quarter, WatchGuard’s Gateway AV solution stopped nearly 11 million malware variants (a 35 percent increase over Q1), while APT Blocker caught an additional 5,484,320 malware variants (a 53 percent spike compared to Q1). Additionally, WatchGuard Firebox appliances stopped nearly three million network attacks in Q2, at a rate of 86 attacks blocked per device.

The complete report details the top malware and attack trends from Q2 2017, a comprehensive breakdown of the notorious WannaCry ransomware attacks, and key information security best practices for readers. In this report, the latest research project from WatchGuard’s Threat Lab focuses on threat trends from SSH and Telnet honeypots that are constantly targeted by automated attacks. The key take-aways from this project highlight the dangers associated with default credentials and the importance of IoT device protection.

For more information, download the full report here: https://www.watchguard.com/wgrd-resource-center/security-report

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Printers: The Weak Link in Enterprise Security
Kelly Sheridan, Associate Editor, Dark Reading,  10/16/2017
20 Questions to Ask Yourself before Giving a Security Conference Talk
Joshua Goldfarb, Co-founder & Chief Product Officer, IDDRA,  10/16/2017
Why Security Leaders Can't Afford to Be Just 'Left-Brained'
Bill Bradley, SVP, Cyber Engineering and Technical Services, CenturyLink,  10/17/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.