Faced with diminishing returns from ransomware and cryptojacking, cyber criminals are doubling down on alternative methods such as formjacking to make money, according to Symantec’s (Nasdaq: SYMC) Internet Security Threat Report (ISTR) Volume 24.

 

Symantec’s ISTR provides an overview of the threat landscape, including insights into global threat activity, cyber criminal trends and motivations for attackers. The report analyzes data from Symantec’s Global Intelligence Network, the largest civilian threat intelligence network in the world, which records events from 123 million attack sensors worldwide, blocks 142 million threats daily and monitors threat activities in more than 157 countries.

 

The key highlights from this year’s report include:

 

Formjacking Is the New Get-Rich Quick Scheme for Cyber Criminals

 

Formjacking attacks are simple – essentially virtual ATM skimming where cyber criminals inject malicious code into retailers’ websites to steal shoppers’ payment card details. On average, more than 4,800 unique websites are compromised with formjacking code every month. Symantec blocked more than 3.7 million formjacking attacks on endpoints in 2018, with nearly a third of all detections occurring during the busiest online shopping period of the year – November and December.

 

While a number of well-known retailers’ online payment websites, including Ticketmaster and British Airways, were compromised with formjacking code in recent months, Symantec’s research reveals small and medium-sized retailers are, by and large, the most widely compromised.

 

By conservative estimates, cyber criminals may have collected tens of millions of dollars last year, stealing consumers’ financial and personal information through credit card fraud and sales on the dark web. Just 10 credit cards stolen from each compromised website could result in a yield of up to $2.2 million each month as a single credit card can fetch up to $45 in underground selling forums. With more than 380,000 credit cards stolen, the British Airways attack alone may have allowed criminals to net more than $17 million.

 

“Formjacking represents a serious threat for both businesses and consumers,” said Symantec CEO Greg Clark. “Without using a comprehensive security solution, consumers have no way to know if they are visiting an infected online retailer, leaving their valuable personal and financial information vulnerable to potentially devastating identity theft. For enterprises, the skyrocketing increase in formjacking reflects the growing risk of supply chain attacks, not to mention the reputational and liability risks businesses face when compromised.”

 

Diminishing Returns from Cryptojacking and Ransomware

 

In recent years, ransomware and cryptojacking, with which cyber criminals harness stolen processing power and cloud CPU usage from consumers and enterprises to mine cryptocurrency, were the go-to methods for cyber criminals looking to make easy money. 2018 saw a decline in activity and diminishing returns, primarily due to declining cryptocurrency values and the increasing adoption of cloud and mobile computing, rendering attacks less effective. For the first time since 2013, ransomware infections declined, dropping by 20 percent. Despite this, however, enterprises should not let their guard down: Enterprise ransomware infections jumped by 12 percent in 2018, bucking the overall downward trend and demonstrating ransomware’s ongoing threat to organizations. In fact, more than eight in ten ransomware infections impact organizations.

 

Although cryptojacking activity peaked early last year, cryptojacking activity declined by 52 percent throughout the course of 2018. Even with cryptocurrency values dropping by 90 percent and significantly reducing profitability, cryptojacking nonetheless continues to appeal to attackers because of the low entry barrier, minimal overhead and the anonymity it offers. Symantec blocked 3.5 million cryptojacking events on endpoints in December 2018 alone.

 

When It Comes to Security, the Cloud Is the New PC

 

The same security mistakes made on PCs during their initial adoption by the enterprise are now happening in the cloud. A single misconfigured cloud workload or storage instance could cost a company millions of dollars or land it in a compliance nightmare. In the past year alone, more than 70 million records were stolen or leaked from poorly configured S3 buckets. There are also numerous easily accessible tools that allow attackers to identify misconfigured cloud resources on the internet.

 

The recent discoveries of hardware chip vulnerabilities, including Meltdown, Spectre and Foreshadow, also place cloud services at risk of being exploited to gain access to the protected memory spaces of other companies’ resources hosted on the same physical server.

 

Living off the Land Tools and Supply Chain Weaknesses Spur Stealthier, More Ambitious Attacks

 

Supply chain and living off the land (LotL) attacks are now a mainstay in the modern threat landscape, widely adopted by both cyber criminals and targeted attack groups. In fact, supply chain attacks ballooned by 78 percent in 2018.

 

LotL techniques allow attackers to maintain a low profile and hide their activity in a mass of legitimate processes. For example, the use of malicious PowerShell scripts increased by 1,000 percent last year. While Symantec blocks 115,000 malicious PowerShell scripts each month, this actually accounts for less than 1 percent of overall PowerShell usage. A sledgehammer approach toward blocking all PowerShell activity would be disruptive to organizations, further illustrating why LotL techniques have become the preferred tactic for many targeted attack groups.

 

Identifying and blocking these attacks require the use of advanced detection methods like analytics and machine learning such as Symantec’s Managed Endpoint Detection and Response (MEDR) service, its enhanced EDR 4.0 technology and its advanced AI solution Targeted Attack Analytics (TAA). TAA has allowed Symantec to uncover dozens of stealthy targeted attacks, including those from the Gallmaker group who conducted their cyber espionage campaigns completely without malware.

 

In addition to LotL and weaknesses in the software supply chain, attackers are increasing their use of conventional attack methods such as spear-phishing to infiltrate organizations. While intelligence gathering remains the primary motive of targeted attacks, the number of attack groups using malware designed to destroy and disrupt business operations increased by 25 percent in 2018.

 

Internet of Things in the Crosshairs of Cyber Criminals and Attack Groups
While the volume of Internet of Things (IoT) attacks remains high and consistent with 2017 levels, the profile of IoT attacks is changing dramatically. Although routers and connected cameras make up the largest percentage of infected devices (90 percent), almost every IoT device has been proven vulnerable, with everything from smart light bulbs to voice assistants creating additional entry points for attackers.

 

Targeted attack groups are increasingly focusing on IoT as a key entry point. The emergence of the VPNFilter router malware represents an evolution in traditional IoT threats. Conceived by a skilled and well-resourced threat actor, it allows its creators to destroy or wipe a device, steal credentials and data, and intercept SCADA communications.

 

“With the growing trend toward the convergence of IT and industrial IoT, the next cyber battlefield is operational technology,” said Sherif El-Nabawi, Vice President, Sales Engineering & Service Provider Sales, Asia Pacific & Japan, Symantec. “A growing number of groups such as Thrip and Triton display interest in compromising operational systems and industrial control systems to potentially prepare for cyber warfare.”

 

The Great Privacy Awakening
With the recent Cambridge Analytica data scandal and the Facebook data privacy hearings, the implementation of the General Data Privacy Regulation (GDPR), and revelations about app location tracking and privacy bugs in widely used apps such as Apple’s FaceTime feature, consumer privacy has entered the spotlight the past year.

 

Smartphones could arguably be the greatest spying device ever created – a camera, a listening device and location tracker all in one that is willingly carried and used wherever its owner goes. While already targeted by nation states for traditional spying, smartphones have also become a lucrative means by which to collect consumers’ personal information, with mobile app developers existing as the worst offenders.

 

According to Symantec research, 45 percent of the most-popular Android apps and 25 percent of the most-popular iOS apps request location tracking, 46 percent of popular Android apps and 24 percent of popular iOS apps request permission to access your device’s camera, and email addresses are shared with 44 percent of the top Android apps and 48 percent of the most-popular iOS apps.

 

Digital tools that gather cell phone data for tracking children, friends or lost phones are also on the rise and clearing the way for abuse to track others without consent. More than 200 apps and services offer stalkers a variety of capabilities, including basic location tracking, text harvesting and even secret video recording.

 

Visit go.symantec.com/ISTR to view this year’s key findings and to download the full report.

 


RECOMMENDED ARTICLE FOR TECHWORLD


 
Grade School Students, Big Winner in Power Mac Center App Contest
Techworld Date Posted: 27 February 2019 3:51 PM | 86 Views
A game app that will help toddlers and grade school students build their passion for learning bagged the grand prize in Power Mac Center’s recently concluded “emPOWER UP! Design a Better World: App Development.... See More
 
Grade School Students, Big Winner in Power Mac Center App Contest
Techworld Date Posted: 3:51 PM | 86 Views
A game app that will help toddlers and grade school students build their passion for learning bagged the grand prize in Power Mac Center’s recently concluded “emPOWER UP! Design a Better World: App Development...See More

 
New Forces Join Popular Team Group Gaming T-FORCE Series
Techworld Date Posted: 30 September 2017 9:35 AM | 469 Views
Team Group, world renowned memory solutions and accessory provider, is proud to announce today the addition of new products as to their prestigious T-FORCE gaming line of products. See More
 
New Forces Join Popular Team Group Gaming T-FORCE Series
Techworld Date Posted: 9:35 AM | 469 Views
Team Group, world renowned memory solutions and accessory provider, is proud to announce today the addition of new products as to their prestigious T-FORCE gaming line of productsSee More

 
Get into the Christmas Vibe with IEP x Transcend DrivePro Raffle
Techworld Date Posted: 15 December 2017 10:37 AM | 246 Views
To share the honor of being recognized as one of Taiwan's Top 20 Global Brands for over ten consecutive years, Transcend cooperates with Taiwan Excellence’s IEP to hold a Christmas raffle with BIG prizes.... See More
 
Get into the Christmas Vibe with IEP x Transcend DrivePro Raffle
Techworld Date Posted: 10:37 AM | 246 Views
To share the honor of being recognized as one of Taiwan's Top 20 Global Brands for over ten consecutive years, Transcend cooperates with Taiwan Excellence’s IEP to hold a Christmas raffle with BIG prizes...See More

 
From Cloud Growth to a Cloud Mess: Two Out of Three SMBs Struggle with Over-Complicated IT Infrastructure
Techworld Date Posted: 5 July 2018 2:01 PM | 352 Views
As their businesses grow, companies increasingly embrace new business tools and cloud services in an attempt to make their employees’ working lives more efficient and flexible, as well as reduce expenditures. . See More
 
From Cloud Growth to a Cloud Mess: Two Out of Three SMBs Struggle with Over-Complicated IT Infrastructure
Techworld Date Posted: 2:01 PM | 352 Views
As their businesses grow, companies increasingly embrace new business tools and cloud services in an attempt to make their employees’ working lives more efficient and flexible, as well as reduce expenditures. See More

 
Connectivity Issues Lead to Damaged Relationships in 1-in-6 Cases
Techworld Date Posted: 21 September 2018 9:33 AM | 152 Views
Staying connected is now an obligatory part of showing you care. According to a study from Kaspersky Lab, connectivity is now a vital part of our duty to family, friends and loved ones. . See More
 
Connectivity Issues Lead to Damaged Relationships in 1-in-6 Cases
Techworld Date Posted: 9:33 AM | 152 Views
Staying connected is now an obligatory part of showing you care. According to a study from Kaspersky Lab, connectivity is now a vital part of our duty to family, friends and loved ones. See More

 
Millennials Need More than Just a Smartphone
Techworld Date Posted: 24 August 2017 11:58 AM | 736 Views
Millennials know what they want when it comes to smartphones. These highly-digital individuals no longer choose their device solely on looks. Nowadays, what drives their choice is whether the smartphone allows them to capture.... See More
 
Millennials Need More than Just a Smartphone
Techworld Date Posted: 11:58 AM | 736 Views
Millennials know what they want when it comes to smartphones. These highly-digital individuals no longer choose their device solely on looks. Nowadays, what drives their choice is whether the smartphone allows them to capture...See More

 
FEW DAYS BEFORE THE RELEASE OF DRAGON BALL FIGHTERZ
Techworld Date Posted: 23 January 2018 4:58 PM | 176 Views
The most anticipated fighting game is about to be launched on PlayStation®4, Xbox One, and PCs via STEAM®.. See More
 
FEW DAYS BEFORE THE RELEASE OF DRAGON BALL FIGHTERZ
Techworld Date Posted: 4:58 PM | 176 Views
The most anticipated fighting game is about to be launched on PlayStation®4, Xbox One, and PCs via STEAM®.See More

 
Heat Up Summer with the Latest Nokia Smartphone Promos
Techworld Date Posted: 5 April 2018 5:01 PM | 613 Views
Charge up the vacation season with the hottest and freshest deals this month for Nokia smartphones on Android from HMD Global, the home of Nokia phones. From April 1 to 30, enjoy P500 off.... See More
 
Heat Up Summer with the Latest Nokia Smartphone Promos
Techworld Date Posted: 5:01 PM | 613 Views
Charge up the vacation season with the hottest and freshest deals this month for Nokia smartphones on Android from HMD Global, the home of Nokia phones. From April 1 to 30, enjoy P500 off...See More

 
Fortinet Positioned Furthest for Completeness of Vision in the Challengers Quadrant of Gartner’s First Magic Quadrant for WAN Edge Infrastructure
Techworld Date Posted: 28 November 2018 1:24 PM | 123 Views
Fortinet® (NASDAQ: FTNT), a global leader in broad, integrated and automated cybersecurity solutions, has announced their inclusion in Gartner’s first Magic Quadrant for WAN Edge Infrastructure as a Challenger with the furthest placement for.... See More
 
Fortinet Positioned Furthest for Completeness of Vision in the Challengers Quadrant of Gartner’s First Magic Quadrant for WAN Edge Infrastructure
Techworld Date Posted: 1:24 PM | 123 Views
Fortinet® (NASDAQ: FTNT), a global leader in broad, integrated and automated cybersecurity solutions, has announced their inclusion in Gartner’s first Magic Quadrant for WAN Edge Infrastructure as a Challenger with the furthest placement for...See More

 
Why is there a need for surveillance solutions? Synology has the answers.
Techworld Date Posted: 9 January 2019 4:57 PM | 114 Views
Video surveillance solutions are safety tools that help reduce crime and protect people and properties. Synology, as a network attached storage (NAS) vendor, provides reliable video management system through their Surveillance Station. See More
 
Why is there a need for surveillance solutions? Synology has the answers.
Techworld Date Posted: 4:57 PM | 114 Views
Video surveillance solutions are safety tools that help reduce crime and protect people and properties. Synology, as a network attached storage (NAS) vendor, provides reliable video management system through their Surveillance StationSee More


Power by

Download Free AZ | Free Wordpress Themes