Global Threat Intelligence Report: cyber criminals innovate to develop faster and automated attacks
- Published: Wednesday, 20 May 2020 10:28
NTT Ltd, has published its 2020 Global Threat Intelligence Report (GTIR), which reveals that despite efforts by organizations to layer up their cyber defences, attackers are continuing to innovate faster than ever before and automate their attacks. Referencing the current COVID-19 pandemic, the report highlights the challenges that businesses face as cyber criminals look to gain from the global crisis and the importance of secure-by-design and cyber resilience.
The attack data indicates that over half (55 percent) of all attacks in 2019 were a combination of web-application and application-specific attacks, up from 32 percent the year before, while 20 percent of attacks targeted CMS suites and more than 28 percent targeted technologies that support websites. For organizations that are relying more on their web presence during COVID-19, such as customer portals, retail sites, and supported web applications, they risk exposing themselves through systems and applications that cyber criminals are already targeting heavily.
Matthew Gyde, President and CEO of the Security division, NTT Ltd., says: “The current global crisis has shown us that cyber criminals will always take advantage of any situation and organizations must be ready for anything. We are already seeing an increased number of ransomware attacks on healthcare organizations and we expect this to get worse before it gets better. Now more than ever, it’s critical to pay attention to the security that enables your business; making sure you are cyber resilient and maximizing the effectiveness of secure-by-design initiatives.”
Technology tops most attacked list
While attack volumes increased across all industries in the past year, the technology and government sectors were the most attacked globally. Technology became the most attacked industry for the first time, accounting for 25 percent of all attacks (up from 17 percent). Over half of attacks aimed at this sector were application-specific (31 percent) and DoS/DDoS (25 percent) attacks, as well as an increase in weaponization of IoT attacks. Government was in second position, driven largely by geo-political activity accounting for 16 percent of threat activity, and finance was third with 15 percent of all activity. Business and professional services (12 percent) and education (9 percent) completed the top five.
2020 GTIR key highlights:
- Websites posing as ‘official’ source of COVID-19 information, but host exploit kits and/or malware – created at an incredible rate, sometimes exceeding 2000 new sites per day.
- Most common attack types accounted for 88 percent of all attacks: Application-specific (33 percent), web application (22 percent), reconnaissance (14 percent), DoS/DDoS (14 percent) and network manipulation (5 percent) attacks.
- Attackers are innovating: by leveraging artificial intelligence and machine learning and investing in automation. Some 21 percent of malware detected was in the form of a vulnerability scanner, which supports the premise that automation is a key focus point of attackers.
- Weaponization of IoT: Botnets such as Mirai, IoTroop and Echobot have advanced in automation, improving propagation capabilities. Mirai and IoTroop are also known for spreading through IoT attacks, then propagating through scanning and subsequent infection from identified hosts.
- Old vulnerabilities remain an active target: attackers leveraged those that are several years old, but have not been patched by organizations, such as HeartBleed, which helped make OpenSSL the second most targeted software with 19 percent of attacks globally. A total of 258 new vulnerabilities were identified in Apache frameworks and software over the past two years, making Apache the third most targeted in 2019, accounting for over 15 percent of all attacks observed.
- Attacks on content management systems (CMS) accounted for about 20 percent of all attacks: Targeting popular CMS platforms like WordPress, Joomla!, Drupal, and noneCMS, cyber criminals used them as a route into businesses to steal valuable data and launch additional attacks. Additionally, more than 28 percent targeted technologies (like ColdFusion and Apache Struts) support websites.