Check Point has released its Cyber Attack Trends: 2018 Mid-Year Report, revealing that cybercriminals are aggressively targeting organisations using cryptomining malware to develop illegal revenue streams. Cloud infrastructures are also a growing target for threat actors according to the research.
Between January and June 2018, the number of organisations impacted by cryptomining malware doubled to 42%, compared to 20.5% in the second half of 2017. Cryptomining malware enables cybercriminals to hijack the victim’s CPU or GPU power and existing resources to mine cryptocurrency, using as much as 65% of the end-user’s CPU power. The top three most common malware variants seen during H1 2018 were all cryptominers.
In a new trend, Check Point detected an increasing number of attacks targeting cloud infrastructures. With organisations moving more of their IT estates and data to cloud environments, criminals are turning to the cloud to exploit its vast computational power and multiply their profits.
The Cyber Attack Trends: 2018 Mid-Year Report gives a detailed overview of the cyberthreat landscape in the top malware categories – cryptominers, ransomware, banking and mobile. These findings are based on data drawn from Check Point’s ThreatCloud intelligence between January and June 2018, highlighting the key tactics cybercriminals are using to attack businesses.
Maya Horowitz, Threat Intelligence Group Manager at Check Point, said: “The first half of this year saw criminals continue the trend we observed at the end of 2017, and take full advantage of stealthy cryptomining malware to maximise their revenues.
“We’ve also seen increasingly sophisticated attacks against cloud infrastructures and multi-platform environments emerging. These multi-vector, fast-moving, large-scale Gen V attacks are becoming more and more frequent and organisations need to adopt a multi-layered cybersecurity strategy that prevents these attacks from taking hold of their networks and data.”
Top cryptominers during H1 2018
- Coinhive (30%) – A cryptominer designed to perform online mining of the Monero cryptocurrency without the user’s approval when a user visits a web page. Coinhive only emerged in September 2017 but has hit 12% of organsations worldwide
- JSEcoin (17%) – Web-based cryptominer designed to perform online mining of Monero cryptocurrency when a user visits a web page without the user’s approval
Top ransomware during H1 2018
- Locky (40%) – Ransomware that spreads mainly via spam emails containing a downloader, disguised as a Word or zip attachment, before installing malware that encrypts the user files
- WannaCry (35%) – Ransomware that was spread in a large-scale attack in May 2017, utilising the Windows SMB exploit, EternalBlue, to propagate within and between networks
- Globeimposter (8%) – Distributed by spam campaigns, malvertising and exploit kits. Upon encryption, the ransomware appends the .crypt extension to each encrypted file
Top mobile malware during H1 2018
- Triada (51%) – A modular backdoor for Android which grants superuser privileges to downloaded malware, as it helps it to get embedded into system processes. Triada has also been seen spoofing URLs loaded in the browser
- Lokibot (19%) – A mobile banking trojan which targets Android smartphones and turns into a ransomware, upon an attempt of the victim trying to remove its admin privileges
- Hidad (10%) – Android malware which repackages legitimate apps and then releases them to a third-party store. It is able to gain access to key security details built into the OS, allowing an attacker to obtain sensitive user data
Top banking malware during H2 2017
- Ramnit (29%) – A banking trojan that steals banking credentials, FTP passwords, session cookies and personal data
- Dorkbot (22%) – A banking trojan which steals the victim’s credentials using web-injects, activated as the user tries to login to their banking website
- Zeus (14%) – A trojan that targets Windows platforms and often uses them to steal banking information by man-in-the-browser keystroke logging and form grabbing
Key malware trends in H1 2018
Check Point researchers detected a number of key malware trends during the period, including:
- Cryptocurrency miners evolve – In 2018, cryptominers have been upgraded with vastly improved capabilities, becoming more sophisticated and even destructive. Motivated by a clear interest to increase the percentage of computational resources leveraged and be even more profitable, cryptominers today target anything that could be perceived as being in their way. Cryptominers have also highly evolved recently to exploit high profile vulnerabilities and to evade sandboxes and security products in order to expand their infection rates
- Hackers move to the cloud – So far this year, there have been a number of sophisticated techniques and tools exploited against cloud storage services. Several cloud-based attacks, mainly those involving data exfiltration and information disclosure, derived from poor security practices, including credentials left available on public source code repositories or the use of weak passwords. Cryptominers are also targeting cloud infrastructures to exploit its computational power and multiply profits for threat actors
- Multi-platform attacks on the rise – Up until the end of 2017, multi-platform malware was rare. However, the rise in the number of consumer connected devices and the growing market share of non-Windows operating systems has led to an increase in cross-platform malware. Campaign operators implement various techniques in order to take control over the campaigns’ different infected platforms
- Mobile malware spread via the supply chain – In the first half of this year, there have been several incidences where mobile malware that has not been downloaded from a malicious URL but instead arrived already installed within the device. In addition, there was an increase in applications readily available on app stores that were actually malware under disguise, including banking trojans, adware and sophisticated remote access trojans (RATs)
Check Point’s ThreatCloud intelligence is the largest collaborative network to fight cybercrime and delivers threat data and attack trends from a global network of threat sensors.
The ThreatCloud database holds over 250 million addresses analysed for bot discovery, more than 11 million malware signatures and over 5.5 million infected websites and identifies millions of malware types daily.