SYDNEY, 2 September, 2019 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today published its roundup report for the first half of 2019, revealing a surge in fileless attacks designed to disguise malicious activity. Detections of this threat alone were up 265% compared to the first half of 2018.
The findings in 2019 so far confirm many of the predictions Trend Micro made last year. Namely, attackers are working smarter to target businesses and environments that will produce the greatest return on investment.
“We’re seeing an interesting phenomenon within the threat landscape - sophistication and stealth is now the name of the cybersecurity game, as both corporate technology and criminal attacks become more connected and smarter.” Said Dr Jon Oliver, Director and Data Scientist, Trend Micro. “The attacks aren’t necessarily more frequent, but attackers are using intentional and targeted attacks to maximise profitability through taking advantage of people, processes, and technology.”
“Take ransomware for example. When it’s deployed as part of a strategic attack on a vulnerable industry, a business might find itself powerless. This is when a technology partner that can combine human expertise with advanced security technologies to better detect, correlate, respond to, and remediate threats is most needed.”
Along with the growth in fileless threats in the first half of the year, attackers are increasingly deploying threats that aren’t visible to traditional security filters, as they can be executed in a system’s memory, reside in the registry, or abuse legitimate tools.
Australia continues to be a malware target, with 9.2 million malware detections in the first half of 2019. Malicious URLs also proved a popular form of attack, as the number of times a malicious URL was accessed reached 8.9 million. Business email compromise (BEC) remains a major threat, with Australian businesses encountering more than a quarter (27.2%) of the total number of BEC attempts globally.
On a global scale, cryptomining malware remained the most detected threat with attackers increasingly deploying these threats on servers and in cloud environments. Substantiating another prediction, the number of routers involved in possible inbound attacks jumped 64% compared to the first half of 2018, with more Mirai variants searching for exposed devices.
Additionally, digital extortion schemes soared by 319% from the second half of 2018, which aligns with previous projections. Ransomware-related files, emails and URLs also grew 77% over the same period.
In total, Trend Micro blocked more than 26.8 billion threats in the first half of 2019, over 6 billion more than the same period last year. Of note, 91% of these threats entered the corporate network via email. Mitigating these advanced threats requires smart defence-in-depth that can correlate data from across gateways, networks, servers and endpoints to best identify and stop attacks.
To read the complete report, Evasive Threats, Pervasive Effects: 2019 Midyear Security Roundup, please visit: https://www.trendmicro.com/vinfo/au/security/research-and-analysis/threat-reports/evasive-threats-pervasive-effects
About Trend Micro
Trend Micro Incorporated, a global leader in cybersecurity solutions, helps to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints. All our products work together to seamlessly share threat intelligence and provide a connected threat defence with centralised visibility and control, enabling better, faster protection. With more than 6,000 employees in over 50 countries and the world’s most advanced global threat intelligence, Trend Micro secures your connected world. For more information, visit http://www.trendmicro.com.au/
The primary source of data is Trend Micro’s Smart Protection Network (SPN), a global repository of threat intelligence. The data is collected from Trend Micro customers who have enabled the feedback mechanism from their products and solutions, allowing Trend Micro to collect threat data and provide better protection. All detected threats are subsequently removed from the customers’ IT environment.
Tamara Baker was awarded the CSO Special Recognition award at the 2019 CSO Inaugural Women in Security Awards in September.
Increasing mandates around the security of personal data have made encryption for every business. Australian businesses are leading the world in the use of encryption to protect backups, payment-related data, and laptops – and yet they still have a long way to go before encryption is both ubiquitous and manageable.
If your last access-control update was even a few years ago, you’re probably more exposed to fraud and exploitation than you’d like to be.
It’s not hard to understand why bot management is critical to maintaining business availability and customer satisfaction – but do you know how to properly deal with bots?
Increasing use of encryption has created new challenges for enterprise security managers. Ever more-sophisticated encryption such as Perfect Forward Secrecy (PFS) protects data and may even boost your Google ranking – but it also provides a haven for malicious code that may use encryption to bypass enterprise security controls.