Security Focus Africa September 2019

Page 38

CYBERSECURITY

New Mimecast Report reveals analysis of 67 billion rejected emails Report discovers trojans made up 71 per cent of opportunistic attacks, and education as the most targeted sector.

M

imecast, a leading email attacks using obfuscation, layering and data security company, and bundling of malware were often has launched its first Threat used. Researchers found that threat Intelligence Report: Black Hat actors using these types of attacks Edition 2019. The report provides technical are familiarising themselves with analysis of emerging threats identified their target’s security environment, as attempts to get through the security then implementing multiple environment of Mimecast customers. evasion techniques in efforts to Within the report, Mimecast Threat avoid detection. Center researchers outline tactics and The report also gives specific techniques of emerging threats, active examples of emerging threats, active threat campaigns observed, primary threat campaigns observed, primary threat categories and volume, and the top threat categories and volume, Black Hat Edition 2019 targeted sectors. Researchers also offer their and the top targeted sectors. A insights into how the threat landscape may large number of known malware change over the next 6-18 months based campaigns were observed, including on observations made during this time. ones incorporating Emotet, Adwin, There are two opposing themes that ran Necurs, and Gandcrab malware. through their analysis: attackers are using Microsoft Excel was one of the most either (1) simple, opportunistic attacks or popular file types used to distribute threat landscape, so they can make more (2) complex, targeted attacks based on malicious activity, as more than 40 per cent informed decisions on how to strengthen necessity to impact the target. of threats detected were using files their security posture.” The Threat Intelligence Report covers the associated with it. File types associated Other key findings include outlined period between April and June 2019 and with Microsoft Word were seen in nearly within the Threat Intelligence Report: leverages the processing of nearly 160 15 per cent of threats. • Threat actors are becoming more billion emails, 67 billion of which “The cyberthreat landscape will organised and business-like by were rejected for displaying continue to evolve as threat actors implementing subscription and as-ahighly malicious attack continue to look for new ways service-based business models to deliver techniques. A significant to bypass security channels malware in an effort to reduce their work and improve their return-on-investments. increase in impersonation to breach their targets. We’ve • Spam is heavily used by threat actors attacks was observed, observed malware-centric as a conduit to distribute malware. leveraging well-known basic campaigns becoming more Professional education was the most social engineering techniques sophisticated, often using targeted sector for spam, as they are likely to target individuals for different types of malware Josh Douglas, vice seen as a prime target due to constantly fast and easy financial gain. in different phases of an president of threat changing student populations that are Interestingly, the report attack – yet, at the same time intelligence at Mimecast. not likely to have high security awareness cites that threat actors are very simple attacks are also “The cyberthreat and the potential for attackers to get adapting how they engage increasing significantly,” said access to personal data. their targeted victims, landscape will continue Josh Douglas, vice president • Attacks on management and consulting initiating through email of threat intelligence at to evolve as threat first, then shifting to SMS, a Mimecast. and biotechnology industries accounted actors continue to look less secure communications “The mission of the Threat for 30 per cent of all impersonation for new ways to bypass Intelligence Report is to channel. On the other hand, attacks. security channels to an increasing amount of help organisations better • Trojans made up 71 per cent of breach their targets.” understand the global more complex targeted opportunistic attacks.

Threat Intelligence Report

36

SECURITY FOCUS AFRICA SEPTEMBER 2019

securityfocusafrica.com


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Editors comment: "Touch times never last, but tough people do."

3min
page 6

CRIME STATISTICS 2018-2019

5min
pages 39-40

New Mimecast Report reveals analysis of 67 billion rejected emails

2min
page 38

Nemtek new product feature 24 volt perimeter alarm light

1min
page 37

HomeTronix is the master distributor of the FIBARO Smart Home

1min
page 37

IDIS launches advanced Lightmaster PTZ Camera

2min
page 36

New Panomera® W camera series from Dallmeier

4min
pages 34-35

Matrix biometric readers

2min
page 33

SearchInform releases FileAuditor

2min
page 32

Deepfakes: what they are and how to spot them

4min
pages 30-31

Virtually irreplaceable Cash is a public good

2min
page 29

The latest #crimestatssa Retail businesses still operate in a danger zone

3min
pages 28-29

Protecting women needs to become a top priority

2min
page 27

Invixium and Pyro-Tech announce distribution partnership

1min
page 26

Hensoldt embarks on consolidation and expansion

4min
pages 24-25

New partnership for supply of CIT tamper evident solutions

1min
page 23

In conversation with... Gareth Newham

4min
pages 21-22

South Africa’s mining sector and the cost of crime

5min
pages 18-20

SA’s crime nightmare

2min
page 14

What’s happening with wage negotiations in the private security industry

1min
page 7

Mining security

6min
pages 15-17
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.