The 8 scariest cybercrime tricks of 2019
Cyberattacks are rapidly evolving—with plenty of scary cybercrime tricks to watch out for as we near the end of 2019. The success of WannaCry, NotPetya, GandCrab and others have inspired a new generation of hackers looking for a quick lucrative score.
While it's impossible to predict the next attack scheme and whether you'll be a target, Cybersecurity Awareness Month is a perfect time to review the threat landscape and make sure defenses are ready for the challenge.
Here’s a list of the top threats that all organizations should be prepared to defend against in 2019 and beyond.
The total number of malware infections have been on the rise for the last 10 years, with more than 812 million on record for 2018. Malware is any piece of software that was written with the intent of doing harm to data, devices or people. Types of malware include viruses, trojans, spyware, ransomware, adware, worms, and fileless attacks. Verizon research suggests attackers use email as their malware-delivery system of choice in up to 92% of the cases. And mobile malware is on the rise—the number of new mobile malware variants increased by 54% in 2018 according to Symantec.
On the advanced malware front, the ESET Cybersecurity Trends 2019 Outlook reports that “Cybercriminals are already using automated searches to assist in finding vulnerable machines and online accounts, and gathering massive amounts of disparate data for subsequent targeted reconnaissance. This automation will undoubtedly increase, to make their existing efforts more cost-efficient and better for social engineering attacks.”
Malwarebytes reports that attacks involving Trojans are up 650 percent from the same time last year and attacks increased by 200 percent in the first quarter of this year. This currently makes trojans, like Emotet, the biggest malware threat out there. Malwarebytes describes Emotet as the “most fearsome and dangerous threat to businesses today.” Emotet is an information stealer most commonly spread via phishing emails and the EternalBlue exploit. It has self-propagation functionality and can send copies of itself via email to contacts. It can also download other malware variants such as Ryuk ransomware.
As recent news headlines indicate, many private and public services across the nation have been seriously disrupted in the wake of ransomware attacks this year. The Baltimore City government was hit with a massive ransomware attack in 2019 that left it crippled for more than a month, with a loss value of more than $18 million according to the Baltimore Sun.
Ransomware is a type of malware designed to block access to a computer system or computer files. Most ransomware variants are executed through email or remote desktop protocol and are designed to encrypt files on the affected computer—making them inaccessible until a ransom payment is made to restore access.
According to Malwarebytes, ransomware attacks on organizations increased by 195 percent in the first quarter of 2019. According to Coveware, Ryuk ransomware is responsible for the large rise in ransomware payment costs, as it demands $287,000 per incident, on average, compared with around $10,000 demanded by other ransomware.
Phishing is an attempt to gain sensitive information while posing via email as a trustworthy contact, for example a bank or retailer. Phishing emails have evolved significantly since the early days and often look very convincing—complete with faultless wording and genuine logos. Highly targeted attempts to gain information from an individual are referred to as spear phishing. And when a fake email from a CEO applies pressure on a CFO into making an urgent payment, this has become known as whaling.
According to Hornet Security, on Oct. 25, 2019, “A hacker successfully received payment of $530,000, after tricking a City of Ocala employee with a sophisticated spear phishing email. The hacker was imitating a construction contractor, and had used a legitimate invoice in the email to trick an employee in sending over the payment. The email address from the sender looked to be legitimate but was off by a letter. The city had no loss to their networks, so no malware was used. Law enforcement was immediately notified, and an ongoing investigation is underway.”
Phishing was involved in 87 percent of high-risk email threats in 2018, according to Trend Micro. A survey by Wombat Security found that 76 percent of businesses report they have been a victim of a phishing attack in the past year. Symantec reports that more than 10 percent of malicious emails disguise themselves as a bill. And Verizon found that a 30 percent of US users open phishing emails—of which, 12 percent then open the infected links or attachments.
While cybersecurity in the workplace may seem challenging enough, it is important to remember that security must now extend beyond the office because of the widespread use of smart phones and tablets. The ubiquitous use and low cost of portable storage devices makes them a useful tool for the backup and transportation of data, which means they are also a target for data thieves.
Data leakage is the unauthorized transmission of electronic or physical data from within an organization to an external destination or recipient. If your organization employs staff (full-time or as contractors), there is a possibility they could leak data by mistake or maliciously. Verizon reports that 34 percent of all breaches in 2018 were caused by insiders.
According to specialist insurance provider Beazley, "accidental disclosure" was the top cause (31 percent) of data breaches reported by healthcare organizations in 2018 and was the direct cause of 20 percent of incidents across all industries. By contrast, Beazley found that only 6 percent of incidents were attributed to portable devices and 5 percent from the physical loss of non-electronic records.
Mobility makes preventing data loss especially difficult for enterprises because users often inadvertently making ill-advised decisions about which apps are able to see and transfer their information or blatant errors—like transferring company files onto a public cloud storage service, pasting confidential info in the wrong place or forwarding an email to an unintended recipient.
Gaining access to IT systems from outside an organization still offers attractive payoffs for criminals. In a targeted attack, anonymous threat actors actively pursue and compromise a target entity’s infrastructure. These hackers have sufficient expertise and resources to conduct their schemes over a long-term period, as well as adapt, adjust or improve their attack methods to counter their victim’s defenses. Not surprisingly, some of the costliest data breaches in history have happened in this category, including Experian, Equifax, Target, and CapitalOne to name a few.
Targeted attacks often employ similar methods found in traditional online threats such as malicious emails, compromised or malicious sites, exploits and malware, but are typically conducted in campaigns. Through a series of failed and successful attempts, hackers are able to get deeper and deeper into a target’s network. Bank account information or credit card databases are a common target, but intellectual property can be valuable as well.
Positive Technologies reports that 90 percent of active advanced persistent threat (APT) groups use phishing at the initial access stage, and 14 percent of groups conduct watering hole attacks at the penetration stage. Once breached, organizations may have less than 20 minutes to detect infections and isolate hacked computers before a simple intrusion turns into a compromise of its entire network according to CrowdStrike. Hacking supply chain companies instead of attacking targets directly has become a major trend to watch out for in 2019.
In 2018, more than 70 million records were stolen or leaked from poorly configured S3 buckets according to Symantec. McAfee reports that 21 percent of files in the cloud contain sensitive data and the average organization has 2,200 individual IaaS misconfiguration incidents in the cloud. Off-the-shelf tools on the web enable attackers to identify misconfigured cloud resources. Hardware chip vulnerabilities, including Meltdown, Spectre and Foreshadow, enable intruders to access protected memory spaces on cloud services hosted on the same physical server.
Further, McAfee reports that organizations experience an average of 12.2 incidents each month in which an unauthorized third-party exploits stolen account credentials to gain access to corporate data stored in a cloud service. These incidents affect 80.3 percent of organizations at least once a month. Additionally, 92 percent of companies have cloud credentials for sale on the Dark Web.
Internet of Things (IoT)
Your favorite IoT device is a hacker’s best friend. Targeted attack groups are increasingly focusing on IoT as a soft entry point, they use to destroy or wipe a device, steal credentials and data, and intercept SCADA communications.
Recently, a new IoT bricking worm, malware dubbed Silex, has been hitting Linux-based devices, and it's designed to permanently disable the hardware it infects, effectively rendering the devices useless. SonicWall reports that IoT malware attacks jumped 215.7 percent to 32.7 million in 2018 (up from 10.3 million in 2017). The first two quarters of 2019 have already outpaced the first two quarters of 2018 by 55 percent.
Although routers and connected cameras comprise 90 percent of infected devices according to Symantec, almost every IoT device is vulnerable, from smart light bulbs to voice assistants. On average, it only take five minutes for an IoT device to be attacked once connected to the Internet, according to NETSCOUT’s Threat Intelligence Report. Compounding the problem is the fact that less than 20 percent of risk professionals can identify a majority of their organization’s IoT devices, according to Ponemon.
It is unrealistic to think that you can protect your organizations against all of the threats 100 percent of the time. Prioritizing security investments by focusing on the end goals—whether that be safeguarding intellectual property, protecting client data or avoiding network outages that might disrupt business operations—can help provide the direction you need to smartly allocate your security budget and balance sometimes difficult trade-offs.
Also, an adaptive and layered security approach can help you create a feedback loop of threat visibility, detection and prevention that consistently becomes more effective.