Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

9/25/2019
11:15 AM
50%
50%

Web Attacks Focus on SQL Injection, Malware on Credentials

Attackers continue to focus on bread-and-butter tactics, according to a quarterly threat report.

Attackers continued to stick to a well-known playbook for the second quarter of 2019, focusing on attacking websites using SQL injection attacks and stealing passwords and credentials via malware and phishing attacks, according to the latest quarterly threat report from security firm WatchGuard. 

While the company saw a slight decline in many threat metrics — with antivirus detections declining 6% between quarters and more sophisticated threats declining 2% — each of the top 10 network attacks on WatchGuard's list increased in volume, with the frequency of the top attack, SQL injection, jumping by a factor of 12. Overall, the two types of SQL injection attacks included on the list counted for more than a third of all network attacks detected by the firm's devices. 

Only two of the other top 10 attacks — exploits focused on vulnerabilities in Adobe Flash and Shockwave — were not Web-based threats, the report found.

"The top network attacks have remained Web-based attacks for many, many quarters — either a direct vulnerability in Web server software; a Web-client attack, where it is a drive-by download that affects the client; or a Web-application attack on a vulnerability in either a framework that you installed or in your custom code," says Corey Nachreiner, chief technology officer at WatchGuard.

In addition to focusing on attacking Web applications, attackers aimed to harvest credentials from compromised machines and users. The top threat, Mimikatz, is an open source tool originally created in 2014 as a project to learn coding but whose purpose is to harvest several different types of credentials, including plain-text password, hashes, kerberos tickets, and PIN codes.

In addition, a phishing attack that aims to harvest users' credentials also made the top 10 threat list. "The trend of authentication being a target, while not a new one this quarter, remains big," Nachreiner says.

WatchGuard's report is not the first to note the all-out assault that online attackers are waging on user and administrator credentials. Earlier this year, security firms Trend Micro and Rapid7 noted that phishing attacks and credential-stuffing attacks had both taken off. In April, Akamai also reported that it had detected some 30 billion attempts to login to services using the wrong credentials.

"It is a constant problem," said Martin McKeay, a security researcher and editorial director at Akamai, at the time.

Three of WatchGuard's top 10 malware detections by volume were also the most widespread, affecting a large share of WatchGuard customers rather than just inundating a few customers with a deluge of attacks, Nachreiner says.

"When we started do this, there was not much overlap between the lists," he says. "The fact that three of the most widespread piece of malware were also on the top 10 list is interesting — and when something is both widespread and high-volume, that should give you some pause. The trend of authentication being a target, while not a new one this quarter, remains big."

The top of the detection list is Mimikatz, which does not show up on the widespread list. 

"The credential-theft tool Mimikatz has remained a top threat for the last two years, mirroring the threat landscape trend of attacks most commonly leveraging stolen credentials," the report states. "These days, it isn't enough to simply use a strong and unique password. Attackers have too many ways to steal that password right out from under you, whether it be from tools like Mimikatz or through clever phishing attacks."

Mimikatz is not the only penetration tool used by online attackers. Two modules for the Kali Linux distribution for penetration testers made the top 10 list as well.

WatchGuard advises workers to use two-factor authentication to reduce the impact of stolen credentials. In addition, the security firm recommends that companies train their workers to spot phishing attacks and deploy breach detection technology. 

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "The Beginner's Guide to Denial-of-Service Attacks: A Breakdown of Shutdowns."

 

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8144
PUBLISHED: 2020-04-01
The UniFi Video Server v3.9.3 and prior (for Windows 7/8/10 x64) web interface Firmware Update functionality, under certain circumstances, does not validate firmware download destinations to ensure they are within the intended destination directory tree. It accepts a request with a URL to firmware u...
CVE-2020-8145
PUBLISHED: 2020-04-01
The UniFi Video Server (Windows) web interface configuration restore functionality at the “backup� and “wizard� endpoints does not implement sufficient privilege checks. Low privileged users, belonging to the PUBLIC_GROUP ...
CVE-2020-8146
PUBLISHED: 2020-04-01
In UniFi Video v3.10.1 (for Windows 7/8/10 x64) there is a Local Privileges Escalation to SYSTEM from arbitrary file deletion and DLL hijack vulnerabilities. The issue was fixed by adjusting the .tsExport folder when the controller is running on Windows and adjusting the SafeDllSearchMode in the win...
CVE-2020-6009
PUBLISHED: 2020-04-01
LearnDash Wordpress plugin version below 3.1.6 is vulnerable to Unauthenticated SQL Injection.
CVE-2020-6096
PUBLISHED: 2020-04-01
An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the 'num' parameter results in a signed comparison vulnerability. If an attacker ...