Mimecast has launched its first Threat Intelligence Report: Black Hat Edition 2019, which provides technical analysis of emerging threats identified as attempts to get through the security environment of Mimecast customers.
Within the report, Mimecast Threat Center researchers outline tactics and techniques of emerging threats, active threat campaigns observed, primary threat categories and volume, and the top targeted sectors.
Researchers also offer their insights into how the threat landscape may change over the next 6-18 months based on observations made during this time.
According to Mimecast, there are two opposing themes that ran through their analysis – attackers are using either (1) simple, opportunistic attacks or (2) complex, targeted attacks based on necessity to impact the target.
The report highlighted that a significant increase in impersonation attacks was observed, leveraging well-known basic social engineering techniques to target individuals for fast and easy financial gain. Interestingly, the report cites that threat actors are adapting how they engage their targeted victims, initiating through email first, then shifting to SMS, a less secure communications channel.
On the other hand, an increasing amount of more complex targeted attacks using obfuscation, layering and bundling of malware were often used. Researchers found that threat actors using these types of attacks are familiarising themselves with their target’s security environment, then implementing multiple evasion techniques in efforts to avoid detection.
The report also gives specific examples of emerging threats, active threat campaigns observed, primary threat categories and volume, and the top targeted sectors. A large number of known malware campaigns were observed, including ones incorporating Emotet, Adwin, Necurs, and Gandcrab malware. Microsoft Excel was one of the most popular file types used to distribute malicious activity, as more than 40% of threats detected were using files associated with it. File types associated with Microsoft Word were seen in nearly 15% of threats.
“The cyberthreat landscape will continue to evolve as threat actors continue to look for new ways to bypass security channels to breach their targets. We’ve observed malware-centric campaigns becoming more sophisticated, often using different types of malware in different phases of an attack – yet, at the same time very simple attacks are also increasing significantly,” said Josh Douglas, vice president of threat intelligence at Mimecast. “The mission of the Threat Intelligence Report is to help organizations better understand the global threat landscape, so they can make more informed decisions on how to strengthen their security posture.”
The Mimecast report also found that threat actors are becoming more organised and business-like by implementing subscription and as-a-service-based business models to deliver malware in an effort to reduce their work and improve their return-on-investments
It also noted Trojans made up 71 percent of opportunistic attacks and that spam is the most used conduit to distribute malware. It revealed that Professional Education was the most targeted sector for spam, as they are likely seen as a prime target due to constantly changing student populations that are not likely to have high security awareness and the potential for attackers to get access to personal data.
Furthermore, it found that attacks on Management & Consulting and Biotechnology industries accounted for 30 percent of all impersonation attacks..