www.mcafee.com Open in urlscan Pro
104.92.89.46  Public Scan

Submitted URL: https://pdt.mcafee.com/e/479502/pient-ID-smcid-EM-eid-O3YF3938/hyjq59/388634670/?h=Bo3wU3v9Xh1vrE6vQJwZbyfOHDkicJ3boXjZ...
Effective URL: https://www.mcafee.com/enterprise/en-us/lp/threats-reports/oct-2021.html?contactid=&smcid=EM&eid=O3YF3938
Submission: On January 25 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

#

<form action="#" class="search-form">
  <div class="input-group">
    <label class="invisible hide">Search For</label>
    <input type="search" class="search" placeholder="Search McAfee Enterprise" id="q" autocomplete="off">
    <span class="close"></span>
  </div>
  <a href="#" class="search-btn icon-searchnew" id="header-search-button" data-result-path="/enterprise/en-us/search.html" title="Search">Search</a>
</form>

Text Content

McAfee Enterprise
 * Products
   MVISION Platform
   Log In 60-Day Trial
    * Endpoint
      * Complete Endpoint Protection
      * Endpoint Detection & Response
      * Mobile Security
      * Data Loss Prevention
    * Cloud
      * Cloud Security
      * Unified Cloud Edge (SASE)
      * MVISION Private Access (ZTNA)
      * Next-Gen Secure Web Gateway (SWG)
      * Cloud Access Security Broker (CASB)
      * Cloud-Native Protection Platform (CNAPP)
      * Container Security
      * Workload Protection
    * SecOps
      * Security Operations
      * eXtended Detection and Response (XDR)
      * Proactive Security - MVISION Insights
      * ePolicy Orchestrator
      * Marketplace
      * Developer Portal
   
   Additional Products
    * * Data Protection
      * Web Gateway
      * Network Security
      * Security Management
    * * Server Security
      * Web Security
      * SIEM
    * * All Products
      * Free Trials

 * Why McAfee Enterprise
    * Innovations
      * Evolve with XDR
      * Fastest Route to SASE
      * Above and Beyond ZTNA
      * Industry First for CNAPP
      * Getting Ahead of Adversaries
      * Remote Working
    * Versus the Competition
      * MITRE: McAfee vs Crowdstrike
      * McAfee Enterprise vs Netskope
      * McAfee Enterprise vs SentinelOne
      * McAfee Enterprise vs CrowdStrike
      Industry News & Recognitions
      * Gartner Magic Quadrant for EPP
      * Gartner Magic Quadrant for CASB
      * Gartner Scorecard for CASB
      * FedRamp/DoD Certifications
    * Services
      * Customer Success Plans
      * Education Services
      * Consulting Services

 * Resources
    * Resources
      * Resource Library
      * Voice of the Customer
      * Threats Reports
      * Cloud Security Reports
      * SOCwise
      * GDPR
      Our Company
      * Awards & Reviews
      * About Us
      * Press Releases
      * Inclusion & Diversity
    * Connect with Us
      * MPOWER
      * Events
      * Webinars
      * Blogs
      * Podcasts
      * Cyber Threat Alliance
      * Open DXL
      * Support Community
      * McAfee Executive Briefing Center
    * Security Awareness
      * What Is Cloud Security?
      * What Is a CASB?
      * What Is SSE?
      * What Is SASE?
      * What Is CNAPP?
      * What Is ZTNA?
      * What Is Endpoint Security?
      * What Is EDR?
      * What Is XDR?
      * What Is MITRE?
      * What Is Ransomware?
      * All Security Awareness Articles

 * Threats
    * Threat Research
      * Threat Center
      * Threat Predictions
      * Threats Reports
      * McAfee ATR Blogs
      Our Researchers
      * Advanced Threat Research
    * Threat Landscape
      * COVID-19 Threats
      * Latest Threats Dashboard
      Tools
      * Product Security Bulletins
      * Free Security Tools
    * Contact Us
      * Report a Vulnerability
      * Detection Dispute Form
      * Submit a Sample

 * Support
    * Support
      * Service Portal
      * My Support Account
      * Tools
      * Program and Policies
    * Product Help
      * Product Downloads
      * Product Updates
      * Product Documentation
      * Knowledge Center
      * Migrations
      * Free Trials
      * End-of-Life Products
    * Connect with Us
      * Subscriptions
      * Security Updates
      * Support Community

 * Search For
   Search
 * Account & Contacts
   * MVISION Log In
   * MVISION Trial
   * Find a Reseller
   * 1-888-847-8766
   * Contact Sales
   * 
   * Global Contacts
 * All McAfee
    * Blogs
    * 
    * Downloads
    * 
    * Partners
    * 
    * Careers

Copied link to clipboard.


ADVANCED
THREAT
RESEARCH
REPORT
OCT⋅2021




Writing & Research

 * Christiaan Beek
 * Ashley Dolezal
 * John Fokker
 * Melissa Gaffney
 * Tracy Holden
 * Tim Hux
 * Phillippe Laulheret
 * Douglas McKee
 * Lee Munson
 * Chris Palm
 * Tim Polzer
 * Steve Povolny
 * Raj Samani
 * Pankaj Solanki
 * Leandro Velasco

We’ve shifted new focus to prevalence. In other words, the team is now paying
attention to how often do we see the threat in the globe, and more importantly
who does it target?

Jump to Section

 * Letter from Our Chief Scientist
 * Ransomware
 * B. Braun: Uncovering Vulnerabilities In Globally used Infusion Pump
 * Cloud Threats
 * Threats To Countries, Continents, Sectors And Vectors
 * TOP MITRE ATT&CK TECHNIQUES Q2 2021
 * How To Defend Against These Threats
 * Resources

Letter from Our Chief Scientist

Welcome to a NEW Threat Report, and a NEW Company.

So much has changed since our last threat report. We learned that despite a
rebrand the DarkSide ransomware group did not walk away and thought we would
miss the (alleged) connection to BlackMatter! Not only that but our recent
findings into infusion pumps demonstrates the importance of security research
(more on this later in the report!).

As for the team and I, we made our move to McAfee Enterprise, a newly dedicated
Enterprise Cybersecurity company, which means we will no longer publish our work
under McAfee Labs. But don’t worry, you can still find us on our new McAfee
Enterprise ATR Twitter feed: @McAfee_ATR.

Of course, the changes are more substantial than a simple Twitter feed, and some
of these are reflected in our new threat report. We’ve shifted focus to
prevalence. In other words, the team is now paying attention to how often do we
see the threat around the globe, and more importantly who does it target? These
findings are backed up with additional analysis, which will be detailed in the
report to incorporate active research against threat actors, as well as the
vulnerabilities they are currently exploiting now and potentially in the future.

We hope you enjoy this new format and welcome your feedback about what you loved
and were less enthusiastic about. More importantly, what would you like to see
in the future?

 * Letter from Our Chief Scientist
 * Ransomware
 * B. Braun: Uncovering Vulnerabilities In Globally used Infusion Pump
 * Cloud Threats
 * Threats To Countries, Continents, Sectors And Vectors
 * TOP MITRE ATT&CK TECHNIQUES Q2 2021
 * How To Defend Against These Threats
 * Resources

Please do keep in touch.

—Raj Samani
McAfee Enterprise Chief Scientist and Fellow

Twitter @Raj_Samani


#RANSOMWARE

Ransomware’s Increasing Prevalence

As 2021 progressed through its second quarter and into the third, cyber
criminals introduced new—and updated—threats and tactics in campaigns targeting
prominent sectors. Ransomware campaigns maintained their prevalence while
evolving their business models to extract valuable data and millions in ransoms
from enterprises big and small.

DarkSide’s highly publicized attack on Colonial Pipeline’s gas distribution
dominated cybersecurity headlines in May. MVISION Insights quickly identified
DarkSide’s early prevalence of targets within the United States, primarily Legal
Services, Wholesale and Manufacturing, Oil, Gas, and Chemical sectors.

Shutting down a major U.S. gas supply chain grabbed the attention of public
officials and Security Operations Centers but equally concerning were other
ransomware groups operating similar affiliate models. Ryuk, REvil, Babuk, and
Cuba ransomware actively deployed business models supporting others’ involvement
to exploit common entry vectors and similar tools. These, and other groups and
their affiliates, exploit common entry vectors and, in many cases, the tools we
see being used to move within an environment are the same. Not long after
DarkSide’s attack, the REvil gang stole the spotlight using a Sodinokibi payload
in its ransomware attack on Kaseya, a global IT infrastructure provider. REvil/
Sodinokibi topped our list of ransomware detections in Q2 of 2021.


RANSOMWARE FAMILY DETECTIONS

REvil/Sodiniokibi

RansomeXX

Ryuk

Netwalker

Thanos

MountLocker

WastedLocker

Exorcist

Conti

Maze

Figure 01. REvil/Sodinokibi topped our ransomware detections in Q2 of 2021,
accounting for 73% of our top-10 ransomware detections.

While DarkSide and REvil stepped back into the shadows after their high-profile
attacks, an heir to DarkSide emerged in July. BlackMatter Ransomware surfaced
primarily in Italy, India, Luxembourg, Belgium, the United States, Brazil,
Thailand, the United Kingdom, Finland, and Ireland as a Ransomware-as-a-Service
affiliate program incorporating elements from DarkSide, REvil, and Lockbit
Ransomware. Based on the code similarity of the binary and their resemblance of
their public page to DarkSide, it is common consensus that BlackMatter
Ransomware is most likely a continuation of DarkSide Ransomware—which
BlackMatter has denied.

Another “old” ransomware with a twist was discovered in mid-2021. LockBit 2.0
Ransomware is an updated version of 2020’s LockBit with new features that
automatically encrypt devices across the domain, exfiltrates data and accesses
systems over RDP, as well as the ability to recruit new affiliates from inside a
target enterprise.

Ransomware developers introduced new campaigns as well. The Hive ransomware
family was first observed in June of 2021 with prevalence in India, Belgium,
Italy, the United States, Turkey, Thailand, Mexico, Germany, Colombia, and
Ukraine, operating as a Ransomware-as-a- Service written in Go language
compromising healthcare and critical infrastructure organizations.

Our team takes a deeper dive into ransomware including an unexpected reaction
among underground forums, targeted sectors and the delta between open-source
intelligence and telemetry.

Thriving Ransomware Expelled from Underground Forums

The second quarter of 2021 was a vibrant quarter for ransomware earning its
place as a high-profile cyber agenda item for the U.S. administration, but
things have also shifted in the historically safe cybercriminal underground
forums.

The impact of a ransomware attack became very clear when the Colonial Pipeline
was forced to shut down by a DarkSide ransomware attack. This abrupt halt in the
supply chain affected much of the eastern U.S., creating a frantic consumer run
on fuel. The attack and resulting consumer and economic impact showed the true
lethality of ransomware and grabbed the full attention of security authorities.

The political response to the impact of the Colonial Pipeline attack caused the
DarkSide ransomware group to abruptly halt its operation. Several additional
threat groups announced they would vet future targets and exclude certain
sectors.

A week later, two of the most influential underground forums, XSS and Exploit,
announced a ban on ransomware advertisements. For years, these same forums
provided a safe haven for cybercrime and the ransomware boom that sparked a
lively trade in breached networks, Stealer logs, and Crypter services among
others. Considering that many of the threat actors behind the major ransomware
families are career criminals and often have a close relationship with forum
administrators and moderators, we believe that this gesture was done to save the
existence of the forums.

Even though the ransomware associated online personas were banned, our team has
observed that the threat actors are still active on several forums under
different other personas.


Figure 02. the Admin of XSS calling for the ban on Ransomware

During this period, the Babuk ransomware group was going through their own
issues, one of which, a defect *nix ESXi locker, we have described extensively
in our blog.

Ultimately the Babuk team’s internal struggles led to a separation and the start
of a new forum dedicated to ransomware known as RAMP, where many of
ransomware-focused cyber criminals now gather to do business and share TTPs.
Despite the ban on some of the larger cybercriminal forums, ransomware has shown
no indication of slowing down and still must be considered as one of the most
impactful cyberthreats any size organization can face.

Ransomware Target Sectors: The Delta of Data Between Open-Source Intelligence
and Telemetry

Many ransomware crews have portals in which they announce the victims they have
breached and samples of data they have gathered, to force the victims to pay the
ransom, otherwise their data will be leaked and, in some cases, sold. Leak sites
are showcases of failed negotiations and do not reflect the full extent of
attacks executed by the ransomware crews, however insights into reported sectors
and geo’s are interesting data to observe.

Our team monitors many of those pages and gathers the ransomware family name,
maps victim to sector and country. Gathering this data and compile, we observe
the following ransomware families targeting the below top 10 sectors in the
United States:

Government

Telecom

energy

media

industrial

education

accounting

technology

finance

transportation

Figure 03. Government was the sector most targeted by ransomware in Q2 of 2021,
followed by Telecom, Energy, and Media & Communications.

Our telemetry point of view, gathered from U.S. sensors, mapped ransomware
activity observed and against the Open-Source Intelligence (OSINT) reported
sectors:

Telemetry Reported Sectors OSINT Reported Sectors Government Manufacturing
Finance Retail Education Healthcare Telecom Construction Energy Transportation
Media Education Industrial Business Real-Estate Legal Legal Finance Tech IT

Table 01. The more distance between the two sectors, the better they are
protected; the closer the distance, the more the sector needs to pay attention
to the risk of ransomware.

What does the difference mean? What is the delta? From our telemetry
perspective, we observe ransomware activity that has been detected and blocked
in the sector where we have customers. Identifying Government as the No. 1
targeted sector in our telemetry reveals the many attempts targeted toward this
sector, that are NOT successful. In the OSINT reported sectors, we observe that
sectors requiring high demands on IT service capabilities to support critical
business services are high on the target list of ransomware crews.

MITRE ATT&CK Patterns/Techniques Used by Ransomware Families: Q2 2021


     Attack Pattern/Technique

     

 1.  Data Encrypted for ImpactData Encrypted for Impact% of List - 14%
 2.  File and Directory DiscoveryFile and Directory Discovery% of List - 13%
 3.  Obfuscated Files or InformationObfuscated Files or Information% of List -
     11%
 4.  Process InjectionProcess Injection% of List - 11%
 5.  Deobfuscate/Decode Files or InformationDeobfuscate/Decode Files or
     Information% of List - 10%
 6.  Process DiscoveryProcess Discovery% of List - 10%
 7.  Inhibit System RecoveryInhibit System Recovery% of List - 9%
 8.  PowerShellPowerShell% of List - 9%
 9.  System Information DiscoverySystem Information Discovery% of List - 9%
 10. Modify RegistryModify Registry% of List - 9%

Table 02. Data Encrypted for Impact was the most detected attack pattern in Q2
2021.


#B BRAUN: UNCOVERING VULNERABILITIES IN GLOBALLY USED INFUSION PUMP

The medical industry is faced with unique security challenges. Potential attacks
on medical centers could amount to an even bigger threat than a system-wide
ransomware assault. Our team, in partnership with Culinda, discovered a set of
vulnerabilities in B. Braun Infusomat Space Large Pump and the B. Braun
SpaceStation.

Our research led us to discover five previously unreported vulnerabilities in
the medical system which include:

 1. CVE-2021-33886: Use of Externally-Controlled Format String (CVSS 7.7)
 2. CVE-2021-33885: Insufficient Verification of Data Authenticity (CVSS 9.7)
 3. CVE-2021-33882: Missing Authentication for Critical Function (CVSS 8.2)
 4. CVE-2021-33883: Cleartext Transmission of Sensitive Information (CVSS 7.1)
 5. CVE-2021-33884: Unrestricted Upload of File with Dangerous Type (CVSS 5.8)

Together, these vulnerabilities could be used by a malicious actor to modify a
pump’s configuration while the pump is in standby mode, resulting in an
unexpected dose of medication being delivered to a patient on its next use—all
with zero authentication.

Shortly after our team reported our initial findings to B. Braun, the company
responded and worked with our team to adopt the mitigations we outlined in our
disclosure report.

These findings present an overview and some technical detail of the most
critical attack chain along with addressing unique challenges faced by the
medical industry. For a brief summary, please see our blog.


#CLOUD THREATS

Cloud Threat Prevalence

The challenges of shifting cloud security to accommodate a more flexible
pandemic workforce while still maintaining and even increasing workloads
presented cybercriminals even more potential exploits and targets in Q2 of 2021.

Our team’s cloud threat research found that Financial Services faced the
greatest challenge against cloud threat campaigns in Q2 of 2021.


    Most Common Cloud Threats Q2 2021
 1. Excessive Usage From Anomalous LocationExcessive Usage From Anomalous
    Location% of List - 62%
 2. Insider Data ExfiltrationInsider Data Exfiltration% of List - 28%
 3. Privilege Access MisusePrivilege Access Misuse% of List - 8%
 4. High Risk Data ExfiltrationHigh Risk Data Exfiltration% of List - <1%
 5. Privilege Access ExfiltrationPrivilege Access Exfiltration% of List - <1%
 6. Land Expand ExfiltrationLand Expand Exfiltration% of List - <1%
 7. Suspicious SuperhumanSuspicious Superhuman% of List - <1%
 8. Data Exfiltration by Privileged UserData Exfiltration by Privileged User% of
    List - <1%

Table 03. Excessive Usage From Anomalous Location definition: The user has
accessed or downloaded a very large volume of data within a short span of time.
This is severe because 1) Enterprise users have previously never accessed such a
large volume, and 2) Data volume is high even when referenced to a large pool of
users. Excessive Usage From Anomalous Location threats ranked highest among
Global Cloud Threats, followed by Insider Data Exfiltration and Privilege Access
Misuse. Excessive Usage From Anomalous Location composed 62% of threats
recorded.

Global Targeted Cloud Vertical Q2 2021

     Enterprise
 1.  Financial ServicesFinancial Services% of List - 33%
 2.  HealthcareHealthcare% of List - 13%
 3.  ManufacturingManufacturing% of List - 9%
 4.  RetailRetail% of List - 9%
 5.  Professional ServicesProfessional Services% of List - 8%
 6.  Travel & HospitalityTravel & Hospitality% of List - 7%
 7.  Software & InternetSoftware & Internet% of List - 6%
 8.  TechnologyTechnology% of List - 5%
 9.  Computers & ElectronicsComputers & Electronics% of List - 4%
 10. Non-Profit OrganizationNon-Profit Organization% of List - 3%

Table 04. Financial Services were targeted most among reported cloud incidents,
followed by Healthcare, Manufacturing, Retail, and Professional Services. Cloud
incidents targeting the Financial Services accounted for 33% of the top 10
industries reported, followed by Healthcare and Manufacturing (8%).

VERTICAL TOTAL CLOUD INCIDENTS GLOBAL

GLOBAL CLOUD VERTICAL COUNTRY 1. Financial ServicesFinancial Services/US% of
List - 23% U.S. 2. Financial ServicesFinancial Services/Singapore% of List - 15%
Singapore 3. HealthcareHealthcare/U.S.% of List - 14% U.S. 4. RetailRetail/U.S.%
of List - 12% U.S. 5. Professional ServicesProfessional Services/U.S.% of List -
8% U.S. 6. Financial ServicesFinancial Services/China% of List - 7% China 7.
ManufacturingManufacturing/U.S.% of List - 5% U.S. 8. Financial
ServicesFinancial Services/France% of List - 5% France 9. RetailRetail/Canada%
of List - 5% Canada 10. Financial ServicesFinancial Services/Australia% of List
- 4% Australia

Table 05. Financial Services were globally targeted in 50% of the top 10 cloud
incidents of Q2 2021 including incidents in the United States, Singapore, China,
France, Canada, and Australia. Cloud incidents targeting verticals in the United
States accounted for 34% of incidents recorded in the top 10 countries.



     United States Cloud Vertical
 1.  Financial ServicesFinancial Services/Australia% of List - 29%
 2.  HealthcareHealthcare% of List - 17%
 3.  RetailRetail% of List - 15%
 4.  Professional ServicesProfessional Services% of List - 10%
 5.  ManufacturingManufacturing% of List - 7%
 6.  Media & EntertainmentMedia & Entertainment% of List - 5%
 7.  Travel & HospitalityTravel & Hospitality% of List - 5%
 8.  GovernmentGovernment% of List - 4%
 9.  Software & InternetSoftware & Internet% of List - 4%
 10. EducationalEducational% of List - 3%

Table 06. Financial Services were the top target of cloud threat incidents in
the U.S. in Q2 of 2021. Incidents targeting Financial Services represented 29%
of total cloud incidents among top 10 sectors.

Vertical Cloud Incidents By Country: Q2 2021

     Country
 1.  United StatesUnited States% of List - 47%
 2.  IndiaIndia% of List - 10%
 3.  AustraliaAustralia% of List - 6%
 4.  CanadaCanada% of List - 6%
 5.  BrazilBrazil% of List - 6%
 6.  JapanJapan% of List - 6%
 7.  MexicoMexico% of List - 4%
 8.  Great BritainGreat Britain% of List - 4%
 9.  SingaporeSingapore% of List - 4%
 10. GermanyGermany% of List - 3%

Table 07. The most cloud incidents targeting countries were reported in the
United States followed by India, Australia, Canada, and Brazil. Cloud incidents
targeting the United States accounted for 52% of incidents recorded in the top
10 countries.


#THREATS TO COUNTRIES, CONTINENTS, SECTORS AND VECTORS

Countries & Continents: Q2 2021

Notable country and continent increases of publicly reported incidents in the
second quarter of 2021 include:

 * The United States experienced the most reported incidents in Q2 2021.
 * Europe saw the largest increases in reported incidents in Q2 with 52%.

Attack Sectors: Q2 2021

Notable increases of publicly reported incidents against sectors in the second
quarter of 2021 include:

 * Multiple Industries were targeted most often.
 * Notable sector increases include Public (64%) and Entertainment (60%).

Attack Vectors: Q2 2021

Notable increases of publicly reported incidents against vectors in the second
quarter of 2021 include:

 * Malware was the technique used most often in reported incidents in Q2 2021.
 * Spam showed the highest increase of reported incidents—250%—from Q1 to Q2
   2021, followed by Malicious Script with 125% and Malware with 47%.


#TOP MITRE ATT&CK TECHNIQUES Q2 2021

Tactics Techniques
(Top 5 per Tactic) Comments Initial Access Spearphishing Attachment Spear
Phishing (Link and Attachment) is sharing the top 3 Initial Access Techniques
with Exploiting Public facing Application.   Exploit public facing application  
  Spearphishing Link     Valid Accounts     External Remote Services   Execution
Windows Command Shell This Quarter we have observed several attacks making use
of PowerShell or the Windows Command shell to execute either malware in memory
or to make use of dual-use/non- Malicous tools to aid their network exploitation
attempts. Command line scripts are often incorporated into Pentesting frameworks
like Cobalts Strike for additional ease of excecution.   PowerShell    
Malicious File     Windows Management Instrumentation     Shared Modules  
Persistence Registry Run Keys / Startup Folder     Scheduled Task     Windows
Service     Valid Accounts     DLL Side-Loading   Privilege Escalation Registry
Run Keys / Startup Folder     Process Injection Process injection remains to be
one of the top Privilege Escalation techniques.   Scheduled Task     Windows
Service     Portable Executable Injection   Defense Evasion Deobfuscate/Decode
Files or Information     Obfuscated Files or information     Modify Registry    
System Checks     File Deletion   Credential Access Keylogging Keylogging and
gathering credentials from web browsers are common functionalities of most
Remote Access Trojans (RATs).   Credentials from Web Browsers     OS Credential
Dumping This technique is the core functionality of the credential harvesting
tool Mimikatz, which ATR has observed in many of the analyzed Campaigns in Q2.  
Input Capture     LSASS Memory   Discovery System Information Discovery     File
and Directory Discovery     Process Discovery     System Checks     Query
Registry   Lateral Movement Remote Desktop Protocol     Exploitation of Remote
Services     Remote File Copy     SMB/Windows Admin Shares     SSH   Collection
Screen Capture Several campaigns involving Remote Access Trojan (RAT) took place
in Q2. Screen capture was a technique deployed by many of the RAT malware
variants.   Keylogging     Data from Local System     Clipboard data     Archive
Collected Data   Command and Control Web protocols     Ingress Tool transfer    
Non-Standard Port     Web Service     Non-Application Layer Protocol  
Exfiltration Exfiltration Over Command and Control Channel     Exfiltration Over
Alternative Protocol     Exfiltration to Cloud Storage Ransomware Threat actors
continued to exfiltrate victim data to different cloud storage providers. Mostly
done by the use of commercial like Rclone and MEGASync.   Automated Exfiltration
    Exfiltration over unencrypted/obfuscation Non-C2 Protocol   Impact Data
Encrypted for impact Encrypting data for impact is yet again the most technique
across the campaigns and threats examined by ATR. During this quarter several
Ransomware families have launched a Linux based locker that targets ESXi
servers, increasing the use of this technique even more.   Inhibit System
Recovery Inhibit system recovery is a technique often used by ransomware gangs
before they deliver the final payload. By deleting the Volume Shadow Copies,
they make it harder for victims to recover from the attack.   Resource Hijacking
Service     Service Stop     System Shutdown/Reboot  

Table 08. Notes from the top MITRE ATT&CK Techniques APT/Crime from Q2 2021.


#HOW TO DEFEND AGAINST THESE THREATS

In the second quarter of 2021 we saw, and commented on, many different types of
threats. Fortunately, we also have the advice and products to keep you and/or
your organization protected, for instance: Learn how configuring ENS 10.7,
tamper protection, and Rollback can protect against Cuba ransomware, or dive
into our detailed blog written with defenders in mind.

Brush up on how you can block all those annoying popups from your browser and
how our customers are protected from malicious sites via Web Advisor and Web
Control.

Read how scammers impersonate Windows Defender to push malicious Windows apps,
along with our safety tips for dealing with that. Customers will be pleased to
know that Real Protect Cloud proactively protects them via machine learning
while Web Advisor and Web Control customers are protected from known malicious
sites.

Learn the best practices for securing and monitoring your network against one of
the more notorious ransomwares seen this quarter, DarkSide. Additionally, this
blog also offers a wealth of information on coverage and protection, covering
EPP, MVISION Insights, EDR, and ENS.

Finally, find out why virtual machines are so valuable to cybercriminals and why
affected VMware users should patch immediately. For those who cannot install
patches straight away we offer practical tips and a reminder that our Network
Security Platform offers signatures for the CVEs in question.



Download PDF Read Archived Reports
McAfee Logo


RESOURCES

To keep track of the latest threats and research, see these McAfee Enterprise
resources:

 * MVISION Insights Preview Dashboard
   Explore a preview of the only proactive solution to stay ahead of emerging
   threats.
 * McAfee Enterprise Threat Center
   Today’s most impactful threats have been identified by our threat research
   team.


TWITTER

 * McAfee Enterprise ATR
 * Raj Samani
 * Christiaan Beek
 * John Fokker
 * Steve Povolny
 * Douglas McKee


ABOUT MCAFEE ENTERPRISE ADVANCED THREAT RESEARCH

McAfee Enterprise Advanced Threat Research is a leading source for threat
research, and threat intelligence. With data from over a billion sensors across
key threats vectors—file, web, message, and network—McAfee Enterprise Advanced
Threat Research delivers real-time threat intelligence, critical analysis, and
expert thinking to improve protection and reduce risks.

McAfee Enterprise Advanced Threat Research

Subscribe to receive our Threat Information.

Back to top
 * Twitter
   
 * LinkedIn
 * YouTube
 * Blog

--------------------------------------------------------------------------------

New to McAfee Enterprise?
 * What Is MVISION?
 * Cloud Security Products
 * Endpoint Protection Products
 * Explore Products
 * Explore Services
 * Skyhigh
 * Skyhigh Networks

Resources
 * Enterprise Support
 * Product Downloads
 * Product Documentation
 * Shop Online
 * Renew Products
 * Partner Portal Login
 * Free Trials
 * Free Tools

Connect with Us
 * Contact Us
 * Find a Partner
 * Partners
 * MPOWER
 * Events
 * Webinars

About McAfee Enterprise
 * About Us
 * Latest News
 * Diversity & Inclusion
   
 * Careers
 * Blogs

--------------------------------------------------------------------------------

United States / English
 * Privacy
 * Legal
 * Terms of Service
 * Site Map
 * Copyright ©2022 Musarubra US LLC

X



You're exiting McAfee Enterprise.

Please pardon our appearance as we transition from McAfee Enterprise to Trellix.

Exciting changes are in the works.
We look forward to discussing your enterprise security needs.

You will be redirected in 0 seconds. If not, please click here to continue


Close Controls
May we use cookies to track your activities? We take your privacy very
seriously. Please see our privacy policy for details and any questions.Yes No