Tag Archive for: WatchGuard

WatchGuard uncovers top cyber threat trends of Q4 2020


Fireless malware attacks and cryptominers are coming back in force, while ransomware attacks are on the decline.

This is according to WatchGuard Technologies’ new Internet Security Report for Q4 2020.

Among its most notable findings, the report reveals that fileless malware and cryptominer attack rates grew by nearly 900% and 25% respectively, while unique ransomware payloads plummeted by 48% in 2020 compared to 2019.

Additionally, the WatchGuard Threat Lab found that Q4 2020 brought a 41% increase in encrypted malware detections over the previous quarter and network attacks hit their highest levels since 2018.

WatchGuard’s report looked more closely at various trends and attack types, including fileless malware, cryptominers, ransomware, encrypted and evasive malware, botnet malware, supply chain attacks, trojan dupes and network attacks. 

Fileless malware

Fileless malware rates in 2020 increased by 888% over 2019.

According to WatchGuard, these threats can be particularly dangerous due to their ability to evade detection by traditional endpoint protection clients and because they can succeed without victims doing anything beyond clicking a malicious link or unknowingly visiting a compromised website.

Toolkits such as PowerSploit and CobaltStrike allow threat actors to easily inject malicious code into other running processes and remain operational even if the victims defences identify and remove the original script.

Deploying endpoint detection and response solutions alongside preventative anti-malware can help identify these threats.

Cryptominers

After virtually all cryptocurrency prices crashed in early 2018, cryptominer infections became far less prevalent and reached a low of 633 unique variant detections in 2019.

According to the researchers, attackers continued adding cryptominer modules to existing botnet infections and extract passive income from victims while abusing their networks for other cyber crime.

As a result, and with prices trending upward again in Q4 2020, the volume of cryptominer malware detections climbed more than 25% over 2019 levels to reach 850 unique variants last year.

Ransomware

For the second year in a row, the number of unique…

Source…

WatchGuard: Hackers Target Corporate Networks Despite Shift to Remote Work


Despite the shift to remote work, hackers continue to aggressively target corporate networks. Moreover, the rise of COVID-19-related malicious domains and phishing campaigns continues, WatchGuard said in its recent Internet Security Report for Q3 2020.

Key findings from the report include:

Network attacks. Rose by 90% from Q2 to 3.3 million, the highest level in two years. Unique network attack signatures also hit a two-year high in Q3. Takeaway: Businesses must prioritize maintaining and strengthening protections for network-based assets and services even as work forces become increasingly remote.

COVID-19. In Q3, a COVID-19 adware campaign running on websites used for legitimate pandemic support made WatchGuard’s list of the top 10 compromised websites. WatchGuard also uncovered a phishing attack hosting a bogus login page with an email lure around small business COVID-19 relief from the United Nations. Takeaway: Attackers will continue to exploit fear, uncertainty, and doubt from the pandemic to victimize organizations.

Phishing attacks and malicious links. In Q3, WatchGuard’s DNSWatch service blocked a combined 2.8 million malicious domain connections, or roughly 500 blocked connections per organization in total. Takeaway: A closer look shows that each organization would have reached 262 malware domains, 71 compromised websites, and 52 phishing campaigns.

Industrial control systems. In Q3, attackers exploited a previously-patched authentication bypass vulnerability in a popular supervisory control and data acquisition (SCADA) control system. Takeaway: Attackers targeted nearly 50% of U.S. networks with SCADA threats in Q3, a sign that bad actors could focus on industrial control systems in 2021.

LokiBot look-a-like. Farelt, a password stealer that resembles LokiBot was one of the most widespread malware detections in Q3. It’s not clear if the Farelt botnet uses the same command and control structure as LokiBot but it’s likely the SilverTerrier malware group created both malware variants. Takeaway: WatchGuard found solid evidence that Farelt has likely targeted many more victims than the data shows.

Emotet. The infamous banking…

Source…

Zero-day threats make up 30% of malware in new WatchGuard cybersecurity study – GeekWire


GeekWire

Zeroday threats make up 30% of malware in new WatchGuard cybersecurity study
GeekWire
The WatchGuard Technologies Internet Security Report found that 30 percent of malware detected globally by the Seattle-based company in the last three months of 2016 was classified as new or “zero day” code, which antivirus companies had not yet …

and more »

zero day – read more

WatchGuard Launches New Quarterly Internet Security Report – Consumer Electronics Net

WatchGuard Launches New Quarterly Internet Security Report
Consumer Electronics Net
SEATTLE, March 30, 2017 /PRNewswire/ — WatchGuard® Technologies, a leader in advanced network security solutions, today released the findings of its inaugural quarterly Internet Security Report, which explores the latest computer and network security …

and more »

internet security news – read more