Rethink security priorities

April 2019 News, Cyber Security

Trend Micro recently released its 2018 Security Roundup Report, which depicts a threat landscape that has evolved heavily through both approach and tactics. One shift in attacks that businesses should be aware of is the rapid growth of cryptocurrency mining, which increased 237%. Overall, attacks that capitalise on the human desire to respond to urgent requests from authority are on the rise, such as business email compromise (BEC) and phishing, with phishing URL detections having increased 269% compared to 2017.

“The changes across the threat landscape in 2018 reflect a change in cybercriminal’s mindset,” said Jon Clay, director of global threat communications for Trend Micro. “Today’s most prevalent attacks are targeted and well planned, as opposed to one-size-fits-all attacks of the past. Knowing this pattern, we’re developing products that can outsmart these attack methods and allow us to be one step ahead of the bad guys.”

The number of BEC attacks in 2018 increased by 28%. While these attacks are less frequent than phishing attacks, they are more sophisticated and take more careful planning for cybercriminals and they yield an average of $132 000 per attack. As these attacks contain no malware and go undetected by traditional security measures, companies need to increase their protection against these attacks with smart solutions that analyse the email writing style of key executives in order to identify whether the email may be fraudulent. Trend Micro’s Writing Style DNA does exactly that and effectively helps detect business email compromise (BEC) attacks.

Another area of change across the threat landscape in 2018 was seen in zero-day vulnerabilities. Trend Micro’s Zero Day Initiative (ZDI) bought and disclosed more vulnerabilities in 2018 than ever before, including 224% more industrial control system bugs. This is particularly significant for organisations that struggle to implement patches across their systems. While zero-day exploits are less and less common, known vulnerabilities were used to execute the largest attacks in 2018. These tactics rely on vulnerabilities that have had patches available for months, even years, yet remain exposed in corporate networks.

Another strong indicator of how the threat landscape is shifting can be seen in the types of threats that decline. Ransomware detections decreased by 91% compared to 2017, along with a 45% decrease in new ransomware families. This reinforces the shift in attack tactics, as ransomware does not require extensive planning, technical skills or ingenuity due to the large number of resources available for malicious hackers in the cybercriminal underground.

To find out more on the key developments in the 2018 threat landscape, please visit: https://www.trendmicro.com/vinfo/gb/security/research-and-analysis/threat-reports/roundup/advanced-defenses-for-advanced-email-threats




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

TAPA: The role of an effective treasury function in business risk management
June 2019, Technews Publishing , News
Neil Le Roux, the Founder of Diligent Advisors will speak at the TAPA SA (Transported Asset Protection Association) annual conference on 26 July 2019.

Read more...
From the Editor's desk: No really, take it seriously
July 2019, Technews Publishing , News
Cybersecurity is a topic that has been done to death in the media. The blanket coverage has been so great that people, even the few that realised the danger, have started to gloss over the issue, barely ...

Read more...
The 4th Industrial Revolution
July 2019, Wolfpack Information Risk , Editor's Choice, Cyber Security, Security Services & Risk Management, Industrial (Industry)
Most major industries have turned to and are reliant on technology to run their operations. This is a time of great promise, but also one of frightening peril.

Read more...
Four essential cloud security concepts
July 2019 , Cyber Security, IT infrastructure
Security is a critical a component of any cloud environment, but to be effective, it needs to be as agile and dynamic as the cloud infrastructure being protected.

Read more...
Cyber-attacks target operational technology
July 2019 , Editor's Choice, Cyber Security, Industrial (Industry)
Focus on operational technology security increasing as around 74% of OT organisations come under attack in the past year, finds a new Fortinet report.

Read more...
Industrial cybersecurity delivers ROI
July 2019, Kaspersky Lab , Industrial (Industry), Cyber Security
Industrial company achieves 368% ROI with Kaspersky Industrial CyberSecurity reveals global research and advisory firm.

Read more...
AI to grow in MEA
July 2019 , News
Annual spending on artificial intelligence in the Middle East and Africa to top $530 million by 2022.

Read more...
Ingo Mutinelli moves to IDEMIA
July 2019, Technews Publishing, IDEMIA , Editor's Choice, News
IDEMIA, the security and identity management company has announced that Ingo Mutinelli will be taking on the post of regional sales director for the southern Africa region.

Read more...
TAPA EMEA appoints Thorsten Neumann as president and CEO
July 2019, TAPA (Transported Asset Protection Association) , News, Asset Management, EAS, RFID
The Transported Asset Protection Association (TAPA) has appointed Thorsten Neumann as its first full-time president & CEO.

Read more...
Transom Capital Group Acquires Pelco
July 2019 , News, CCTV, Surveillance & Remote Monitoring
Transom Capital Group (Transom), an operations-focused middle market private equity firm, announced it has acquired Pelco from Schneider Electric.

Read more...