Rethink security priorities

1 April 2019 News, Cyber Security

Trend Micro recently released its 2018 Security Roundup Report, which depicts a threat landscape that has evolved heavily through both approach and tactics. One shift in attacks that businesses should be aware of is the rapid growth of cryptocurrency mining, which increased 237%. Overall, attacks that capitalise on the human desire to respond to urgent requests from authority are on the rise, such as business email compromise (BEC) and phishing, with phishing URL detections having increased 269% compared to 2017.

“The changes across the threat landscape in 2018 reflect a change in cybercriminal’s mindset,” said Jon Clay, director of global threat communications for Trend Micro. “Today’s most prevalent attacks are targeted and well planned, as opposed to one-size-fits-all attacks of the past. Knowing this pattern, we’re developing products that can outsmart these attack methods and allow us to be one step ahead of the bad guys.”

The number of BEC attacks in 2018 increased by 28%. While these attacks are less frequent than phishing attacks, they are more sophisticated and take more careful planning for cybercriminals and they yield an average of $132 000 per attack. As these attacks contain no malware and go undetected by traditional security measures, companies need to increase their protection against these attacks with smart solutions that analyse the email writing style of key executives in order to identify whether the email may be fraudulent. Trend Micro’s Writing Style DNA does exactly that and effectively helps detect business email compromise (BEC) attacks.

Another area of change across the threat landscape in 2018 was seen in zero-day vulnerabilities. Trend Micro’s Zero Day Initiative (ZDI) bought and disclosed more vulnerabilities in 2018 than ever before, including 224% more industrial control system bugs. This is particularly significant for organisations that struggle to implement patches across their systems. While zero-day exploits are less and less common, known vulnerabilities were used to execute the largest attacks in 2018. These tactics rely on vulnerabilities that have had patches available for months, even years, yet remain exposed in corporate networks.

Another strong indicator of how the threat landscape is shifting can be seen in the types of threats that decline. Ransomware detections decreased by 91% compared to 2017, along with a 45% decrease in new ransomware families. This reinforces the shift in attack tactics, as ransomware does not require extensive planning, technical skills or ingenuity due to the large number of resources available for malicious hackers in the cybercriminal underground.

To find out more on the key developments in the 2018 threat landscape, please visit: https://www.trendmicro.com/vinfo/gb/security/research-and-analysis/threat-reports/roundup/advanced-defenses-for-advanced-email-threats





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Quantum secret sharing
Issue 6 2020 , News
Wits researchers have demonstrated a new quantum approach for sharing a secret amongst many parties, setting a new record for the highest dimensions and parties to date.

Read more...
Three cash-in-transit heists in half an hour
Issue 6 2020, Fidelity Security Group , News
Over the past six weeks the cash-in-transit industry has experienced a spike in the number of heists across the country.

Read more...
Programme to assist smaller MSSPs
Issue 6 2020 , News
Networks Unlimited launches new MSSP partnership with SentinelOne to make endpoint defence more accessible.

Read more...
Fake uniforms and using falsely branded security vehicle
Issue 6 2020 , News
On Monday 10 August, six to ten armed suspects driving what appeared to be a branded Fidelity ADT vehicle and wearing security uniforms entered a business park.

Read more...
From the editor's desk: Covid consolidation
Issue 6 2020, Technews Publishing , News
The global security industry has seen quite a few high-profile mergers and acquisitions over the past year or two, with an even greater number of smaller companies that don’t get the headlines also merging, ...

Read more...
ONVIF adopts open source development
Issue 6 2020 , News
ONVIF announced it is open sourcing its network interface specifications for physical security technology.

Read more...
Hored networking solutions now in South Africa
Issue 6 2020, LD Africa , News
LD Africa is the sole South African distributor for Hored smart networks and smart transmission solutions.

Read more...
Suprema wins SIA award
Issue 6 2020, Suprema , News
Suprema Airfob Patch wins Judges’ Choice Award from SIA New Product Showcase.

Read more...
Digitisation during COVID-19
Issue 6 2020, PSIRA (Private Security Ind. Regulatory Authority) , News
The COVID-19 pandemic has forever changed how business is conducted globally and PSIRA adapted to serve its community.

Read more...
Datacentrix boosts security portfolio
Issue 6 2020 , News
Datacentrix has joined the Tenable Assure Partner Programme, strengthening its security portfolio with cyber exposure solutions from Tenable.

Read more...