Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

8/6/2019
05:30 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Mimecast Rejected Over 67 Billion Emails. Here's What It Learned

New research warns that security pros must guard against updates to older malware and more manipulative social-engineering techniques.

New research released today from Mimecast has found that the bad threat actors are modifying old exploits as well as changing their attack techniques in which they link to documents or landing pages on well-known cloud platforms using URLs that otherwise would appear to be legitimate.

The report, "Mimecast's Threat Intelligence Report, Black Hat Edition 2019," leverages the processing of some 160 billion emails during the period of April 2019 to June 2019. During this time, Mimecast rejected more than 67 billion of those emails and based its subsequent analysis on rejections classified as spam, opportunistic and targeted attacks, and impersonation detections.

"We have seen a marked increase in malware links," says Josh Douglas, Mimecast's vice president of threat intelligence. "We also found that nearly 30% of the impersonation attacks were targeted at the management and consulting sectors and biotechnology."

Peter Firstbrook, a research vice president who covers security at Gartner, says he doesn't worry too much about attachments and links. That's because most vendors are good at detecting them, and most organizations have endpoint protection and secure Web gateways that serve to backstop email security, he explains. However, he say he's very concerned about impersonation attacks, mainly business email compromises (BECs).

"The BEC-type attacks are the most interesting and difficult to detect," Firstbrook says. "There is no payload or URL to detect. It's typically just a person-to-person email from a legitimate account. Users trust email not knowing or understanding that email is not an authentication method. Companies are losing real money to these types of attacks, and few legacy solutions adequately protect them. Even newer solutions are still evolving their techniques to detect these threats."

Mimecast's Douglas says security managers should respond with the following: a layered security strategy, advanced targeted threat protection, and better user awareness training.

The Mimecast report also identifies professional education, which includes private educational companies, colleges, institutes, and training providers, as the most targeted industry. Mimecast believes this is because of higher education's inherent conflict with being open institutions of higher learning. Attackers prey on students who may not have the highest security awareness, plus numerous institutions conduct federal government research, so the attackers are after intellectual property and classified research.

Other highly targeted sectors include software and software-as-a-service (SaaS), which were hit with a number of attacks during this past quarter using Adwind and QRat. Similar to Adwind, QRat is a Trojan that targets Java-based platforms and uses Java Archive (.JAR) attachments in the malicious emails. IT resellers were also hit with a large number of Adwind attacks during the quarter, as well as a mixture of other Trojan downloaders.

The report also found Emotet to be another of the more active campaigns. What started as a banking Trojan in 2014 has evolved and now appears to download secondary malware. This may be because the threat actors behind Emotet have adapted it into a packing and delivery service for other threat actors, the report states, basically using it as a downloader-as-a-service for other malware.

Related Content:

Steve Zurier has more than 30 years of journalism and publishing experience, most of the last 24 of which were spent covering networking and security technology. Steve is based in Columbia, Md. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
tdsan
50%
50%
tdsan,
User Rank: Ninja
8/6/2019 | 11:12:10 AM
Re: Typo

Wow, that is a major difference in number. I glad someone caught that.

Does Mimecast use Machine Learning (ML) as a way to filter emails, if not, this would be a great use case?

Todd
Marilyn Cohodas
100%
0%
Marilyn Cohodas,
User Rank: Strategist
8/6/2019 | 10:40:48 AM
Re: Typo
Thanks for the catch! It's fixed now. -- The Editors
random2127z
100%
0%
random2127z,
User Rank: Apprentice
8/6/2019 | 9:30:04 AM
Typo
Hey DR, 

 

Just a quick heads up, but in the text of the article it says 67 billions instead of milllions like in the title, which is what I am assuming is what was meant. 

 

Best,

Drew
A Realistic Threat Model for the Masses
Lysa Myers, Security Researcher, ESET,  10/9/2019
USB Drive Security Still Lags
Dark Reading Staff 10/9/2019
Virginia a Hot Spot For Cybersecurity Jobs
Jai Vijayan, Contributing Writer,  10/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-14832
PUBLISHED: 2019-10-15
A flaw was found in the Keycloak REST API before version 8.0.0 where it would permit user access from a realm the user was not configured. An authenticated attacker with knowledge of a user id could use this flaw to access unauthorized information or to carry out further attacks.
CVE-2017-10022
PUBLISHED: 2019-10-15
In haml versions prior to version 5.0.0.beta.2, when using user input to perform tasks on the server, characters like < > " ' must be escaped properly. In this case, the ' character was missed. An attacker can manipulate the input to introduce additional attributes, potentially executing ...
CVE-2019-10759
PUBLISHED: 2019-10-15
safer-eval before 1.3.4 are vulnerable to Arbitrary Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code.
CVE-2019-10760
PUBLISHED: 2019-10-15
safer-eval before 1.3.2 are vulnerable to Arbitrary Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code.
CVE-2019-17397
PUBLISHED: 2019-10-15
In the DoorDash application through 11.5.2 for Android, the username and password are stored in the log during authentication, and may be available to attackers via logcat.