Cyber Attack Trends - Mid-Year Report

11 September 2017
Content from a Premium Partner
African Media Agency (New York)
press release

2017 has proved to be a lucrative year for cybercrime. Prominent malware and attack methods continue to evolve, creatively bypassing existing security solutions. In 2016, we witnessed sophisticated new malware emerging on a regular basis, exposing new capabilities, distribution methods, and attack services offered for sale through multiple platforms. 2017 is shedding light on a new trend - simple, yet highly effective malware families are causing rapid destruction globally.

So far, in 2017 cyber-attacks are occurring at a higher frequency than previous years. Recent infiltrations have demonstrated the agility, scale and persistence of an attack that criminals are capable of executing. All regions have suffered from these large-scale attacks, reinforcing the need for proactive solutions. Massive attack campaigns such as WannaCry, NotPetya and Fireball showcase the nature of today's threat landscape. As the year progressed, we were able to witness the reoccurring global trends listed below:

1. Nation-state cyber weapons are now in the hands of criminals

Data leakage incidents have significantly evolved in sophistication, frequency and volume of data being accessed. As seen in several incidents throughout the first half of 2017, the theft and consequent availability of key nation-state hacking tools, combined with wide scale zero-day vulnerabilities, now enable unskilled hackers to carry out highly sophisticated attack campaigns.

2. The line between Adware and malware is fading, and mobile adware botnets are on the rise

Adware, which automatically displays or downloads advertising material on an infected machine, was until recently not among our greatest concerns, as while sometimes annoying, its sole purpose is to generate revenue and not to cause actual damage. In parallel, mobile adware botnets continue to expand and dominate the mobile malware arena. In the first half of 2017, we witnessed a persistent rise in the spread and technical capabilities of mobile adware botnets.

3. Macro-based downloaders continue to evolve

As malware continues to evolve, the same is true for its delivery methods. During the past six months, we have seen some new methods for exploiting Microsoft Office files, which no longer require victims to open the door for the attackers by enabling macros.

4. A new wave of mobile bankers on GooglePlay

On top of the large adware campaigns which we have grown accustomed to finding on Google Play, a new wave of mobile bankers, most of which belong to the BankBot family managed to enter the play store undetected and infect users. This is an alarming development as the bankers malware harm users directly, and supposed to be easier to detect. However, the perpetrators combined open-sourced banking malware code with complex obfuscation techniques to successfully and repeatedly bypass Google's protections.

When we look at the main malware categories - banking, mobile an ransomware - we see that ransomware is by far the most prevalent across all regions, including Europe, Middle East and Africa. The below infographic clearly shows the prominent spread of ransomware in each region:

Even with massive outbreaks such as WannaCry and NotPetya making global news, most organisations continue to rely on a strategy of detection and response after an attack has occurred rather than prevention. Many of these prominent attacks use known malware variants that could easily have been blocked had the proper security been implemented before the attack had occurred. To stay one step ahead of cybercriminals, organisations should remain attuned to the ever-changing threat landscape.

By understanding emerging threats and implementing the latest prevention technologies, organizations can create a solid cyber security defensive posture. The Cyber Attack Trends: Mid-Year Report provides you with a comprehensive overview of the cyber landscape; ransomware, banking and mobile threats based on data drawn from the ThreatCloud World Cyber Threat Map between January and June of 2017.

You can download the Report for more information regarding the Mid-Year Report; Cyber Attack Trends.

Distributed by African media Agency on behalf of Check Point Software Technologies

Follow Check Point via:

Twitter: http://www.twitter.com/checkpointsw

Facebook: https://www.facebook.com/checkpointsoftware

Blog: http://blog.checkpoint.com

YouTube: http://www.youtube.com/user/CPGlobal

LinkedIn: https://www.linkedin.com/company/check-point-software-technologies

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (www.checkpoint.com) is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyber attacks with an unmatched catch rate of malware and other types of threats. Check Point offers a complete security architecture defending enterprises - from networks to mobile devices - in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organisations of all sizes.

AllAfrica publishes around 400 reports a day from more than 100 news organizations and over 500 other institutions and individuals, representing a diversity of positions on every topic. We publish news and views ranging from vigorous opponents of governments to government publications and spokespersons. Publishers named above each report are responsible for their own content, which AllAfrica does not have the legal right to edit or correct.

Articles and commentaries that identify allAfrica.com as the publisher are produced or commissioned by AllAfrica. To address comments or complaints, please Contact us.