Fortinet® (NASDAQ: FTNT), a global leader in broad, integrated, and automated cybersecurity solutions, has announced the findings of its latest quarterly Global Threat Landscape Report. The research reveals that cybercriminals are constantly evolving the sophistication of their attacks — from continuing to exploit the vast insecurity of IoT devices, to morphing open source malware tools into new threats. For a detailed view of the Threat Landscape Indices for exploits, botnets, and malware, as well as some important takeaways for CISOs, read the blog. Highlights of the report follow:

 

• Exploit Index All-time High: According to the Fortinet Threat Landscape Index, cybercriminals remained hard at work even during a holiday season. After a dramatic start, the Exploit Index settled in the latter half of the quarter. While cyber adversary activity overall subsided slightly, the number of exploits per firm grew 10%, while unique exploits detected increased 5%. At the same time, botnets become more complex and harder to detect. Time for infection of botnets increased by 15%, growing to an average of nearly 12 infection days per firm. As cybercriminals employ automation and machine learning to propagate attacks, security organizations need to do the same to combat these advanced methods.

• Monitor the Monitoring Devices: The convergence of physical things and cybersecurity is creating an expanded attack surface, one that cybercriminals are increasingly targeting. Half of the top 12 global exploits targeted IoT devices, and four of the top 12 were related to IP-enabled cameras. Access to these devices could enable cybercriminals to snoop on private interactions, enact malicious onsite activities, or gain an entry point into cyber systems to launch DDoS or ransomware attacks. It is important to be aware of hidden attacks even in devices we use to monitor or provide security.

• Tools Open to Anyone: Open source malware tools are very beneficial to the cybersecurity community, enabling teams to test defenses, researchers to analyze exploits, and instructors to use real-life examples. These openware tools are generally available from sharing sites such as GitHub, and as these are available to anyone, adversaries can also access them for nefarious activities. They are evolving and weaponizing these malware tools into new threats, with ransomware comprising a significant number of them. An example where openware source code has been weaponized is the Mirai IoT botnet. An explosion of variants and activity continues to be catalogued since its release in 2016. For cybercriminals innovation continues to be the land of opportunity.

• The Proliferation of Steganography: Developments in steganography are bringing new life into an old attack type. While steganography is typically not used in high-frequency threats, the botnet Vawtrak made the list of “bursty” botnets. This demonstrates increased persistence for this attack type. In addition, during the quarter, malware samples were found to use steganography to conceal malicious payloads in memes passed along on social media. During the attack process after attempting to contact a C2 host, the malware looks for images in an associated Twitter feed, downloads those images, and looks for hidden commands within the images to propagate activity. This undercover approach demonstrates that adversaries continue to experiment in how they advance their malware while evading detection.

• Adware Infiltration: Adware is not just a nuisance, it has become a pervasive threat. Globally, adware sits at the top of the list of malware infections for most regions — exceeding one-quarter of all infection types for North America and Oceania, and almost one-quarter for Europe. With adware now found to be in published apps and posted on authorized app stores, this attack type can pose a serious threat especially to unsuspecting mobile device users.

• Keeping an Eye on Operational Technology: With the ongoing convergence of Information Technology (IT) and Operations Technology (OT), a year in review shows the relative change in prevalence and frequency in attacks targeting industrial control systems (ICS). Unfortunately, most attacks gained ground on both scales of volume and prevalence. A cyberattack that successfully targets an OT system, could result in devastating physical consequences to such things as critical infrastructure and services, the environment, and even human life.

 

The Need for Integrated and Automated Security
The threat data in this quarter’s report once again reinforces many of the threat prediction trends unveiled by the FortiGuard Labs global research team. To stay ahead of the ongoing efforts of cybercriminals, organizations need to transform their security strategies as part of their digital transformation efforts. A security fabric is needed to span the entire networked environment from the IoT endpoint to multi-clouds, to integrate each security element to address today’s growing threat environment, and to protect the expanding attack surface. This approach enables actionable threat intelligence to be shared at speed and scale across the entire distributed network, shrinks the necessary windows of detection, and provides the automated remediation required for today’s threats.

 

Report and Index Overview
The latest Fortinet Threat Landscape Report is a quarterly view that represents the collective intelligence of FortiGuard Labs, drawn from Fortinet’s vast array of global sensors during Q4 2018. Research data covers global and regional perspectives. Also included in the report is the Fortinet Threat Landscape Index (TLI), comprised of individual indices for three central and complementary aspects of that landscape which are exploits, malware, and botnets, showing prevalence and volume in a given quarter. The report also examines important zero-day vulnerabilities and infrastructure trends to add context about the trajectory of cyberattacks affecting organizations over time.

 

 

“The age of Cy-Phy” — the convergence of cybersecurity things and physical spaces — is here. Although the appeal of this convergence to our digital economy is almost sci-fi in terms of imagination, unfortunately, the cybersecurity risks are very real. Cybercriminals are closely watching and developing exploits that target this emerging digital convergence. Fundamental elements of cybersecurity, including visibility, automation, and agile segmentation, are more critical than ever to enable us to thrive in our Cy-Phy digital future, and to protect us against the malicious activities of our cyber adversaries,” Phil Quade, Chief Information Security Officer, Fortinet.

 

Additional Resources:

 

  • Read our blog for more information about this research or to access the full threat report.

 

  • View the Fortinet Threat Landscape Indices for botnets, malware, and exploits for Q4, 2018.

 

 

 

 

 

 

 


RECOMMENDED ARTICLE FOR TECHWORLD


 
Lax Security Leaves Car Sharing Apps Vulnerable to Attack
Techworld Date Posted: 2 August 2018 1:33 PM | 538 Views
Kaspersky Lab researchers have examined the security of 13 car sharing applications from household manufacturers across the globe – including those from Russia, the US, and Europe.. See More
 
Lax Security Leaves Car Sharing Apps Vulnerable to Attack
Techworld Date Posted: 1:33 PM | 538 Views
Kaspersky Lab researchers have examined the security of 13 car sharing applications from household manufacturers across the globe – including those from Russia, the US, and Europe.See More

 
Lenovo™ Sees Intelligence Transforming Everything at MWC 2018, From Devices to Data Center
Techworld Date Posted: 27 February 2018 4:51 PM | 1274 Views
Today, at MWC 2018, Lenovo reinforced its 2018 vision for technology innovations, moving its core strategy to Augmented Intelligence.. See More
 
Lenovo™ Sees Intelligence Transforming Everything at MWC 2018, From Devices to Data Center
Techworld Date Posted: 4:51 PM | 1274 Views
Today, at MWC 2018, Lenovo reinforced its 2018 vision for technology innovations, moving its core strategy to Augmented Intelligence.See More

 
Kaspersky Lab Appeals U.S. Department of Homeland Security Debarment
Techworld Date Posted: 19 December 2017 11:46 AM | 254 Views
Kaspersky Lab announced today that it is seeking an appeal in federal court of U.S. Department of Homeland Security’s (DHS) decision on Binding Operational Directive 17-01 banning the use of the company’s products in.... See More
 
Kaspersky Lab Appeals U.S. Department of Homeland Security Debarment
Techworld Date Posted: 11:46 AM | 254 Views
Kaspersky Lab announced today that it is seeking an appeal in federal court of U.S. Department of Homeland Security’s (DHS) decision on Binding Operational Directive 17-01 banning the use of the company’s products in...See More

 
Lenovo Opens 20th Concept Store in the Philippines
Techworld Date Posted: 30 July 2018 3:47 PM | 494 Views
Lenovo, the world’s leading PC manufacturer, recently opened its 20th concept store in the Philippines and the second one in Cebu City, located at the third floor of Ayala Center Cebu.. See More
 
Lenovo Opens 20th Concept Store in the Philippines
Techworld Date Posted: 3:47 PM | 494 Views
Lenovo, the world’s leading PC manufacturer, recently opened its 20th concept store in the Philippines and the second one in Cebu City, located at the third floor of Ayala Center Cebu.See More

 
Kaspersky Lab Warns of Dangers of ‘Balkanisation’ at Its 4th APAC Cyber Security Summit
Techworld Date Posted: 26 September 2018 4:00 PM | 189 Views
Kaspersky Lab presented the cybersecurity risks that can result from Balkanisation in cyberspace — the fragmentation of the world wide web, during its 4th Asia Pacific (APAC) Cyber Security Weekend in Siem Reap, Cambodia.. See More
 
Kaspersky Lab Warns of Dangers of ‘Balkanisation’ at Its 4th APAC Cyber Security Summit
Techworld Date Posted: 4:00 PM | 189 Views
Kaspersky Lab presented the cybersecurity risks that can result from Balkanisation in cyberspace — the fragmentation of the world wide web, during its 4th Asia Pacific (APAC) Cyber Security Weekend in Siem Reap, Cambodia.See More

 
New Kaspersky CyberTrace Streamlines Threat Intelligence Flows for Better Initial Response to Cyberthreats
Techworld Date Posted: 21 February 2019 2:00 PM | 99 Views
With the number of available threat intelligence sources continuing to grow, a third of Chief Information Security Officers (CISOs) feel under pressure as they cannot consume cybercrime intelligence easily or effectively. . See More
 
New Kaspersky CyberTrace Streamlines Threat Intelligence Flows for Better Initial Response to Cyberthreats
Techworld Date Posted: 2:00 PM | 99 Views
With the number of available threat intelligence sources continuing to grow, a third of Chief Information Security Officers (CISOs) feel under pressure as they cannot consume cybercrime intelligence easily or effectively. See More

PCBG  Writing Staff
Role of Wireless in Cybercrime
Techworld • By: PCBG  Writing Staff | Date Posted: 6 April 2018 3:59 PM | 654 Views
Wi-Fi and Bluetooth® are useful. They are there for a reason: so we can communicate without the need for data coverage. Though much of what we see today with Wi-Fi is good use, sometimes,.... See More
PCBG  Writing Staff
Role of Wireless in Cybercrime
Techworld • By: PCBG  Writing Staff | Date Posted: 3:59 PM | 654 Views
Wi-Fi and Bluetooth® are useful. They are there for a reason: so we can communicate without the need for data coverage. Though much of what we see today with Wi-Fi is good use, sometimes,...See More

 
Mobile Malware Attacks Double in 2018, as Cybercriminals Sharpen Their Distribution Strategies
Techworld Date Posted: 8 March 2019 1:48 PM | 83 Views
Kaspersky Lab researchers have seen the number of attacks using malicious mobile software nearly double in just a year. In 2018, there were 116.5 million attacks compared to 66.4 million in 2017, with a.... See More
 
Mobile Malware Attacks Double in 2018, as Cybercriminals Sharpen Their Distribution Strategies
Techworld Date Posted: 1:48 PM | 83 Views
Kaspersky Lab researchers have seen the number of attacks using malicious mobile software nearly double in just a year. In 2018, there were 116.5 million attacks compared to 66.4 million in 2017, with a...See More

 
DreamHack and CORSAIR Enter Strategic Partnership
Techworld Date Posted: 15 December 2017 10:06 AM | 283 Views
CORSAIR®, a world leader in enthusiast memory, high-performance gaming hardware and PC components, and DreamHack, the world’s largest digital festival, are excited to announce a groundbreaking new partnership which will see CORSAIR and DreamHack.... See More
 
DreamHack and CORSAIR Enter Strategic Partnership
Techworld Date Posted: 10:06 AM | 283 Views
CORSAIR®, a world leader in enthusiast memory, high-performance gaming hardware and PC components, and DreamHack, the world’s largest digital festival, are excited to announce a groundbreaking new partnership which will see CORSAIR and DreamHack...See More

 
Kaspersky Lab Wins ‘Best Industrial Cyber Security Provider’ at Asian Manufacturing Awards 2017
Techworld Date Posted: 27 September 2017 5:23 PM | 253 Views
David Tiong, Asia Pacific (APAC) Marketing Director of Kaspersky Lab (left) receives the award from Raymond Wong, CEO of Contineo Media (right). Kaspersky Lab is proud to bring home the ‘Best Industrial Cyber.... See More
 
Kaspersky Lab Wins ‘Best Industrial Cyber Security Provider’ at Asian Manufacturing Awards 2017
Techworld Date Posted: 5:23 PM | 253 Views
David Tiong, Asia Pacific (APAC) Marketing Director of Kaspersky Lab (left) receives the award from Raymond Wong, CEO of Contineo Media (right). Kaspersky Lab is proud to bring home the ‘Best Industrial Cyber...See More


Power by

Download Free AZ | Free Wordpress Themes