Page 56 - Cyber Defense eMagazine for September 2020
P. 56

This data clearly shows that HTTPS inspection and advanced behavior-based threat detection
                   and response solutions are now requirements for every security-conscious organization. Many IT
                   and security teams are unenthusiastic about setting up HTTPS inspection because it requires
                   extra work with certificates on individual endpoints – it’s not just a feature within security tools that
                   can  be  switched  on  and  off.  HTTPS  inspection  can  also  slow  down  the  throughput  of  some
                   network security tools, so some organizations aren’t able to maintain high network speeds while
                   inspecting encrypted traffic. While I’m sympathetic to these concerns (especially for midmarket
                   businesses  with  limited IT  and  security  expertise),  letting  this traffic  though  a  firewall  without
                   inspecting it is no longer a safe option and there are network security platforms that offer HTTPS
                   inspection while maintaining good network speeds. Given the magnitude of the threat, the only
                   reliable  approach  to  defense  is  implementing  a  set  of  layered  security  services  that  include
                   advanced threat detection methods and HTTPS inspection.

               2.  COVID-19 Impacts Security in a BIG way. Q1 2020 was only the start of the massive changes
                   to the cyber threat landscape brought on by the COVID-19 pandemic. Even in just these first three
                   months of 2020, we saw a dramatic rise in remote workers and attacks targeting those individuals.
                   Phishing  attempts  increased,  and  the  greater  number  of  employees  operating  outside  the
                   traditional  network  perimeter  led  to  more  attacks  aimed  at  remote  desktop  technologies.  We
                   strongly recommend that all organizations follow phishing best practices and make sure to secure
                   remote  access  technologies  by  requiring  employees  to  use  a  mobile  VPN  and  not  exposing
                   services to the internet that shouldn’t be. Additionally, companies should deploy secure MFA as
                   an additional protection layer against password-based attacks.


               3.  Cryptominers are on the rise. Five of the top ten domains (identified by our DNS filtering service)
                   distributing  malware  either  hosted  or  controlled  Monero  cryptominers.  This  sudden  jump  in
                   cryptominer popularity could simply be due to its utility; adding a cryptomining module to malware
                   is an easy way for online criminals to generate passive income.

               4.  Flawed-Ammyy  and  Cryxos  malware  grow  in  popularity.  The  Cryxos  trojan  was  third  on
                   WatchGuard’s  top-five  encrypted  malware  list  and  also  third  on  its  top-five  most  widespread
                   malware detections list, primarily targeting Hong Kong. It is delivered as an email attachment
                   disguised as an invoice and will ask the user to enter their email and password, which it then
                   stores. Flawed-Ammyy is a support scam where the attacker uses the Ammyy Admin support
                   software to gain remote access to the victim’s computer.

               5.  Ancient  Adobe  vulnerability  surfaces  as  top  network  attack.  An  Adobe  Acrobat  Reader
                   exploit that was patched in Aug. 2017 has appeared in WatchGuard’s top network attacks list for
                   the first time. This vulnerability reappearing several years after being discovered and resolved
                   illustrates the critical importance of regularly patching and updating systems.

               6.  Attackers  use  reputable  domains  to launch  spear  phishing  attacks.  Three  new  domains
                   hosting phishing campaigns appeared as top attacks. These domains convincingly impersonated
                   digital  marketing  and  analytics  product Mapp  Engage,  online  betting  platform  Bet365  and  an
                   AT&T login page (this campaign is no longer active at the time of the report’s publication).







            Cyber Defense eMagazine – September 2020 Edition                                                                                                                                                                                                         56
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   51   52   53   54   55   56   57   58   59   60   61