Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

8/6/2019
05:30 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Mimecast Rejected Over 67 Billion Emails. Here's What It Learned

New research warns that security pros must guard against updates to older malware and more manipulative social-engineering techniques.

New research released today from Mimecast has found that the bad threat actors are modifying old exploits as well as changing their attack techniques in which they link to documents or landing pages on well-known cloud platforms using URLs that otherwise would appear to be legitimate.

The report, "Mimecast's Threat Intelligence Report, Black Hat Edition 2019," leverages the processing of some 160 billion emails during the period of April 2019 to June 2019. During this time, Mimecast rejected more than 67 billion of those emails and based its subsequent analysis on rejections classified as spam, opportunistic and targeted attacks, and impersonation detections.

"We have seen a marked increase in malware links," says Josh Douglas, Mimecast's vice president of threat intelligence. "We also found that nearly 30% of the impersonation attacks were targeted at the management and consulting sectors and biotechnology."

Peter Firstbrook, a research vice president who covers security at Gartner, says he doesn't worry too much about attachments and links. That's because most vendors are good at detecting them, and most organizations have endpoint protection and secure Web gateways that serve to backstop email security, he explains. However, he say he's very concerned about impersonation attacks, mainly business email compromises (BECs).

"The BEC-type attacks are the most interesting and difficult to detect," Firstbrook says. "There is no payload or URL to detect. It's typically just a person-to-person email from a legitimate account. Users trust email not knowing or understanding that email is not an authentication method. Companies are losing real money to these types of attacks, and few legacy solutions adequately protect them. Even newer solutions are still evolving their techniques to detect these threats."

Mimecast's Douglas says security managers should respond with the following: a layered security strategy, advanced targeted threat protection, and better user awareness training.

The Mimecast report also identifies professional education, which includes private educational companies, colleges, institutes, and training providers, as the most targeted industry. Mimecast believes this is because of higher education's inherent conflict with being open institutions of higher learning. Attackers prey on students who may not have the highest security awareness, plus numerous institutions conduct federal government research, so the attackers are after intellectual property and classified research.

Other highly targeted sectors include software and software-as-a-service (SaaS), which were hit with a number of attacks during this past quarter using Adwind and QRat. Similar to Adwind, QRat is a Trojan that targets Java-based platforms and uses Java Archive (.JAR) attachments in the malicious emails. IT resellers were also hit with a large number of Adwind attacks during the quarter, as well as a mixture of other Trojan downloaders.

The report also found Emotet to be another of the more active campaigns. What started as a banking Trojan in 2014 has evolved and now appears to download secondary malware. This may be because the threat actors behind Emotet have adapted it into a packing and delivery service for other threat actors, the report states, basically using it as a downloader-as-a-service for other malware.

Related Content:

Steve Zurier has more than 30 years of journalism and publishing experience, most of the last 24 of which were spent covering networking and security technology. Steve is based in Columbia, Md. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
tdsan
50%
50%
tdsan,
User Rank: Ninja
8/6/2019 | 11:12:10 AM
Re: Typo

Wow, that is a major difference in number. I glad someone caught that.

Does Mimecast use Machine Learning (ML) as a way to filter emails, if not, this would be a great use case?

Todd
Marilyn Cohodas
100%
0%
Marilyn Cohodas,
User Rank: Strategist
8/6/2019 | 10:40:48 AM
Re: Typo
Thanks for the catch! It's fixed now. -- The Editors
random2127z
100%
0%
random2127z,
User Rank: Apprentice
8/6/2019 | 9:30:04 AM
Typo
Hey DR, 

 

Just a quick heads up, but in the text of the article it says 67 billions instead of milllions like in the title, which is what I am assuming is what was meant. 

 

Best,

Drew
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
4 Tips to Run Fast in the Face of Digital Transformation
Shane Buckley, President & Chief Operating Officer, Gigamon,  12/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4245
PUBLISHED: 2019-12-11
Orca has arbitrary code execution due to insecure Python module load
CVE-2013-4593
PUBLISHED: 2019-12-11
RubyGem omniauth-facebook has an access token security vulnerability
CVE-2013-6495
PUBLISHED: 2019-12-11
JBossWeb Bayeux has reflected XSS
CVE-2013-7370
PUBLISHED: 2019-12-11
node-connect before 2.8.2 has cross site scripting in methodOverride Middleware
CVE-2019-18935
PUBLISHED: 2019-12-11
Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deserialization vulnerability in the RadAsyncUpload function. This is exploitable when the encryption keys are known due to the presence of CVE-2017-11317 or CVE-2017-11357, or other means. Exploitation can result in remote cod...