CYBERSECURITY
New Mimecast Report reveals analysis of 67 billion rejected emails Report discovers trojans made up 71 per cent of opportunistic attacks, and education as the most targeted sector.
M
imecast, a leading email attacks using obfuscation, layering and data security company, and bundling of malware were often has launched its first Threat used. Researchers found that threat Intelligence Report: Black Hat actors using these types of attacks Edition 2019. The report provides technical are familiarising themselves with analysis of emerging threats identified their target’s security environment, as attempts to get through the security then implementing multiple environment of Mimecast customers. evasion techniques in efforts to Within the report, Mimecast Threat avoid detection. Center researchers outline tactics and The report also gives specific techniques of emerging threats, active examples of emerging threats, active threat campaigns observed, primary threat campaigns observed, primary threat categories and volume, and the top threat categories and volume, Black Hat Edition 2019 targeted sectors. Researchers also offer their and the top targeted sectors. A insights into how the threat landscape may large number of known malware change over the next 6-18 months based campaigns were observed, including on observations made during this time. ones incorporating Emotet, Adwin, There are two opposing themes that ran Necurs, and Gandcrab malware. through their analysis: attackers are using Microsoft Excel was one of the most either (1) simple, opportunistic attacks or popular file types used to distribute threat landscape, so they can make more (2) complex, targeted attacks based on malicious activity, as more than 40 per cent informed decisions on how to strengthen necessity to impact the target. of threats detected were using files their security posture.” The Threat Intelligence Report covers the associated with it. File types associated Other key findings include outlined period between April and June 2019 and with Microsoft Word were seen in nearly within the Threat Intelligence Report: leverages the processing of nearly 160 15 per cent of threats. • Threat actors are becoming more billion emails, 67 billion of which “The cyberthreat landscape will organised and business-like by were rejected for displaying continue to evolve as threat actors implementing subscription and as-ahighly malicious attack continue to look for new ways service-based business models to deliver techniques. A significant to bypass security channels malware in an effort to reduce their work and improve their return-on-investments. increase in impersonation to breach their targets. We’ve • Spam is heavily used by threat actors attacks was observed, observed malware-centric as a conduit to distribute malware. leveraging well-known basic campaigns becoming more Professional education was the most social engineering techniques sophisticated, often using targeted sector for spam, as they are likely to target individuals for different types of malware Josh Douglas, vice seen as a prime target due to constantly fast and easy financial gain. in different phases of an president of threat changing student populations that are Interestingly, the report attack – yet, at the same time intelligence at Mimecast. not likely to have high security awareness cites that threat actors are very simple attacks are also “The cyberthreat and the potential for attackers to get adapting how they engage increasing significantly,” said access to personal data. their targeted victims, landscape will continue Josh Douglas, vice president • Attacks on management and consulting initiating through email of threat intelligence at to evolve as threat first, then shifting to SMS, a Mimecast. and biotechnology industries accounted actors continue to look less secure communications “The mission of the Threat for 30 per cent of all impersonation for new ways to bypass Intelligence Report is to channel. On the other hand, attacks. security channels to an increasing amount of help organisations better • Trojans made up 71 per cent of breach their targets.” understand the global more complex targeted opportunistic attacks.
Threat Intelligence Report
36
SECURITY FOCUS AFRICA SEPTEMBER 2019
securityfocusafrica.com