Mimecast Limited, a leading email and data security company, has launched its first Threat Intelligence Report: Black Hat Edition 2019. The report provides technical analysis of emerging threats identified as attempts to get through the security environment of Mimecast customers.
Within the report, Mimecast Threat Center researchers outline tactics and techniques of emerging threats, active threat campaigns observed, primary threat categories and volume, and the top targeted sectors.
Researchers also offer their insights into how the threat landscape may change over the next six-to-18 months based on observations made during this time. There are two opposing themes that ran through their analysis: attackers are using either (1) simple, opportunistic attacks or (2) complex, targeted attacks based on necessity to impact the target.
The Threat Intelligence Report covers the period between April and June 2019 and leverages the processing of nearly 160 billion emails, 67 billion of which were rejected for displaying highly malicious attack techniques.
A significant increase in impersonation attacks was observed, leveraging well-known basic social engineering techniques to target individuals for fast and easy financial gain.
Interestingly, the report cites that threat actors are adapting how they engage their targeted victims, initiating through email first, then shifting to SMS, a less secure communications channel.
On the other hand, an increasing amount of more complex targeted attacks using obfuscation, layering and bundling of malware were often used.
Researchers found that threat actors using these types of attacks are familiarising themselves with their target’s security environment, then implementing multiple evasion techniques in efforts to avoid detection.
The report also gives specific examples of emerging threats, active threat campaigns observed, primary threat categories and volume, and the top targeted sectors.
A large number of known malware campaigns were observed, including ones incorporating Emotet, Adwin, Necurs and Gandcrab malware.
Microsoft Excel was one of the most popular file types used to distribute malicious activity, as more than 40% of threats detected were using files associated with it. File types associated with Microsoft Word were seen in nearly 15% of threats.
“The cyberthreat landscape will continue to evolve as threat actors continue to look for new ways to bypass security channels to breach their targets. We’ve observed malware-centric campaigns becoming more sophisticated, often using different types of malware in different phases of an attack – yet, at the same time very simple attacks are also increasing significantly,” said Josh Douglas, Vice President of Threat Intelligence at Mimecast.
“The mission of the Threat Intelligence Report is to help organisations better understand the global threat landscape, so they can make more informed decisions on how to strengthen their security posture.”
Other key findings include outlined within the Threat Intelligence Report:
- Threat actors are becoming more organised and business-like by implementing subscription and as-a-service-based business models to deliver malware in an effort to reduce their work and improve their return-on-investments
- Spam is heavily used by threat actors as a conduit to distribute malware. Professional education was the most targeted sector for spam, as they are likely seen as a prime target due to constantly changing student populations that are not likely to have high security awareness and the potential for attackers to get access to personal data
- Attacks on Management and Consulting and Biotechnology industries accounted for 30% of all impersonation attacks
- Trojans made up 71% of opportunistic attacks
For the full Threat Intelligence Report, visit here.