Ransomware is increasingly being used as a 'canary in a coal mine' by attackers who are testing victims' defences in preparation for more insidious targeted attacks later on, the head of Cisco's regional security practice has warned as the company's latest cybersecurity report warns businesses to improve their detection capabilities and security hygiene or risk immolation by online attackers.
The Cisco 2016 Midyear Cybersecurity Report warned that a “highly vulnerable hodgepodge of web browsers, applications, and infrastructure has created a fragile foundation” for security. The problem was compounded, the report warned, because businesses become less likely to upgrade the more complex their network infrastructure becomes.
With businesses falling well behind the curve in applying patches to cover vulnerabilities – Internet devices had 28 known vulnerabilities each on average, with 885,918 of 3 million observed Apache httpd server installs for example, noted to have vulnerabilities.
Cisco's security team highlighted concerns that an increase in vulnerabilities involving cryptography and authorisation “are signs that treat actors are now seeking to tamper with secure connections” – often undetected, with studied organisations taking an average of 200 days to detect malware infections; Cisco claimed its median time to detection (TTD) was 13 hours in the six months through April.
The firm's analysis of ransomware actors highlighted the “resilient” attacks they had created, noting that “innovators in the space... took their malware to an entirely new level of effectiveness when they began using cryptographically sound file encryption.” Indeed, ever more-resourceful attackers were proving themselves highly resilient and flexible at adapting attacks to be ever more effective.
This, ANZ general manager of security Anthony Stitt said in a statement, created interplay between ransomware and malware strains that used similar vectors of attack and used ransomware to test victims' defences before launching follow-up stealth attacks.
“If a business or individual is having problems with ransomware, this is sending the message that their IT environment is vulnerable and being exploited,” Stitt said. “Once inside, threats are able to move around unseen for hundreds of days at a time. Practically every major breach is an example of this, which is demonstrative of the need for organisations to dramatically improve their ability to find 'in-progress' problems before they escalate.” “'Point-in-time' solutions just don't cut it anymore; visibility and control are crucial for organisations, whether it be before, during or after attacks.”
Government guidance The report flagged “regulatory complexity and contradictory cybersecurity policies” at the national level as causing problems for international commerce, with “unconstrained” attackers sending profits from malware activities skyrocketing thanks to an expanding focus for attacks, evolving attack methods, and success in using encryption to obscure their operations from discovery.
Ransomware remains the most financially successful style of malware attack – a recent CyberArk study pegged losses to ransomware at $US325m last year alone – attackers are successfully monetising new aspects of the malware ecosystem, with adware recently found to be providing a modest profit for its purveyors.
This success is also creating ethical issues for victims – especially Australian businesses that may be inadvertently funding organised crime in deciding to accept ransomware as a cost of doing business. “Poorly protected devices and software open up operational space to adversaries,” the report warned. “It's up to you to eliminate it. Priority must be placed on reducing unconstrained operational space and making adversary presence known.”
- How to staff your team across the security kill chain
- The week in security: Cybercrims hacking for gold in Rio; Caution on 100% ransomware blocking
- Security is more than User Education – it’s About Cultural Change
- Attack on Australian Census site didn’t register on global DDoS sensors
- To detect and manage the insider threat, companies need to deploy advanced threat intelligence
- Scammers put a bogus Android security patch app in Google Play
- With network perimeters porous, virtualise app components to regain control
- Mac malware inside BitTorrent app, signed with legit Apple developer ID
- Google kicks off Chrome plan to mark all HTTP pages as "Not secure"
- Can European 'trust labels' tackle IoT's security woes?