www.csoonline.com Open in urlscan Pro
151.101.194.165  Public Scan

URL: https://www.csoonline.com/article/3688362/backdoor-deployment-overtakes-ransomware-as-top-attacker-action.html
Submission: On February 23 via api from TR — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false" placeholder="Start Searching"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

Close Ad


cso online
GERMANY
 * United States
 * ASEAN
 * Australia
 * India
 * United Kingdom
 * Germany


×

search
 

More from the Foundry Network

 * About Us |
 * Contact |
 * Republication Permissions |
 * Privacy Policy |
 * Cookie Policy |
 * European Privacy Settings |
 * Member Preferences |
 * Advertising |
 * Foundry Careers |
 * Ad Choices |
 * E-commerce Links |
 * California: Do Not Sell My Personal Info |

 * Follow Us
 * 
 * 
 * 


×

Close
 * Ransomware is top cyberattack type, as manufacturing gets hit hardest
 * RELATED STORIES
 * Attacks on industrial infrastructure on the rise, defenses struggle to keep
   up
 * SPONSORED BY Advertiser Name Here Sponsored item title goes here as designed
 * Ransomware ecosystem becoming more diverse for 2023
 * Many ICS flaws remain unpatched as attacks against critical infrastructure
   rise

 * Home
 * Security
 * Cyberattacks

News Analysis


BACKDOOR DEPLOYMENT OVERTAKES RANSOMWARE AS TOP ATTACKER ACTION


THANKS TO THE AVAILABILITY OF MALWARE SUCH AS EMOTET, DEPLOYING BACKDOORS ON
VICTIMS' NETWORKS IS BECOMING EASIER AND MORE LUCRATIVE FOR CYBERCRIMINALS.

 * 
 * 
 * 
 * 
 * 
 * 
 * 

By Samira Sarraf

Regional Editor for Australia and New Zealand, CSO | 22 February 2023 12:22


IDG / Thinkstock



Deployment of backdoors on networks was the top action attackers made in almost
a quarter of all incidents remediated in 2022. "Backdoors led to a notable spike
in Emotet cases in February and March. That spike inflated the ranking of
backdoor cases significantly, as those deployed in this timeframe account for
47% of all backdoors identified globally throughout 2022," according to the
newly released IBM Security X-Force Threat Intelligence Index.

“Increased backdoor deployment may also be due to the amount of money this kind
of access can generate on the dark web. Compromised corporate network access
from an initial access broker typically sells for several thousands of US
dollars,” stated the report.

Ransomware, which had been the number one attack in 2021, came as a close second
with 17% and business email compromise (BEC) followed with 6%. The study found
19 ransomware variants in 2022. LockBit variants comprised 17% of total
ransomware incidents observed, up from 7% in 2021. Phobos tied with WannaCry for
second at 11%. Many WannaCry cases were the result of infections from three to
five years ago, taking place on old, unpatched equipment.




THE TOP IMPACTS OF CYBERATTACKS

Extortion was the main impact at 21% of incidents observed by X-Force. Extortion
cases were often achieved through ransomware or BEC and often include the use of
remote access tools, cryptominers, backdoors, downloaders, and web shells.

One tactic observed in 2022 was attackers making stolen data more accessible to
downstream victims. “By making it easier for second-hand victims to identify
their data among a data leak, operators seek to increase the subsequent pressure
on the organization targeted by the ransomware group or affiliate in the first
place,” the report found.

In second place came data theft with 19% followed by credential harvesting with
11%. Data thefts have not all resulted in data leaks, which happened in 11% of
all the cyberattacks.




WHAT IBM X-FORCE OBSERVED IN THE MALWARE LANDSCAPE

A 17% spike in the Raspberry Robin malware between early June and early August
was identified in the oil and gas, manufacturing, and transportation industries.
X-Force advises ensuring security tools block known USB-based malware (such as
Raspberry Robin), implementing security awareness training, and disabling
autorun features for any removable media.

IBM X-Force also noticed an increase in popularity of the Rust programming
language with developers releasing Rust versions of their malware including
BlackCat, Hive, Zeon, and RansomExx.

A “sudden” influx of Vidar InfoStealer was noticed in June through to early
2023. Vidar can be used to retrieve device information such as credit card
information, usernames, passwords, and files. It can also take screenshots of
the user’s desktop or steal Bitcoin and Ethereum cryptocurrency wallets.


MANUFACTURING IS THE MOST TARGETED OT INDUSTRY

Of the operational technology (OT) industries, manufacturing experienced 58% of
incidents X-Force helped remediate. In line with the main findings of the
report, deployment of backdoors was the top action on objective, identified in
28% of cases in the manufacturing sector. X-Force believes this to be a favorite
of ransomware actors likely due to these organizations’ low tolerance for
downtime.

Spear phishing accounted for 38% of initial access vectors in OT-related
industries, including use of attachments (22%), use of links (14%) and spear
phishing as a service (2%). This was followed by exploitation of public-facing
applications followed with 24%, detection of backdoors with 20% and ransomware
with 19%. The most popular impact of such attacks was extortion (29%) followed
by data theft (24%).


CYBERATTACKS TRENDS BY GEOGRAPHY

For the second consecutive year, Asia-Pacific was the most attacked region in
2022 registering 31% of all incidents. This represents a 5% increase compared to
2021, according to the report. Japan was the epicenter of the Emotet spike in
2022.



Manufacturing was the most attacked industry in the region with 48% followed by
finance and insurance with 18%. Other global trends also applied including spear
phishing by attachment being the top infection vector at 40% and deployment of
backdoors being the top action on objective at 31%.

Japan was the most targeted nation with 91% of the received attacks followed by
the Philippines with 5%, and Australia, India, and Vietnam each at 1.5%. Europe
was the second most targeted region with 28% of attacks. The region was the
hardest hit by extortion, with 44% of all extortion cases observed. The top
impact caused by attacks was extortion (38%) across the region. The United
Kingdom was the most attacked country in Europe, accounting for 43% of cases.
Germany accounted for 14%, Portugal 9%, Italy 8%, and France 7%.

The most attacked industries were professional, business, and consumer services,
which tied with finance and insurance for the most-attacked industry, each
ranking 25% of the cases to which X-Force responded. Manufacturing was second
with 12% of cases, and energy and healthcare followed in third place at 10%.

X-Force saw no evidence of widespread state-sponsored cyber activity following
the invasion of Ukraine. However, it did find that Russia has deployed an
unprecedented number of wipers against targets in Ukraine. The wipers were
mostly used against Ukraine’s networks from before the country’s invasion
through to March 2022.



One of the most prolific self-proclaimed hacktivist groups observed was Killnet,
a Russia-sympathetic group that has claimed DDoS attacks against public
services, government ministries, airports, banks and energy companies based in
North Atlantic Treaty Organization (NATO) member states, allied countries in
Europe, as well as in Japan and the United States.

North America experienced a slight increase in the number of incidents with 25%
in 2022 from 23% in 2021. The region’s most attacked industries were energy with
20% of attacks, manufacturing and retail-wholesale followed with 14% each,
however manufacturing represents a 50% drop in cases when compared to 2021.

The US accounted for 80% of the region’s attacks and Canada 20%. The biggest
impact in the region was credential harvesting (25%) and the top infection
vectors were exploitation of public-facing applications at 35% and spear
phishing attachments at 20%. Ransomware incidents accounted for 23% of cases.

In Latin America, retail-wholesale was the most attacked industry with 28% of
cases followed by finance and insurance (24%) and energy (20%). Ransomware
accounted for 32% of attacks and extortion was the most common impact at 27%.
Brazil accounted for 67%, Colombia 17% and Mexico 8%. Peru and Chile split the
remaining 8%.

Deployment of backdoors was detected in 27% of cases to which X-Force responded
in the Middle East and Africa in 2022. Finance and insurance were the most
targeted industries in the region, accounting for 44%. Saudi Arabia comprised
two-thirds of the cases in the region to which X-Force responded. The remaining
cases were split between Qatar, United Arab Emirates and South Africa.


WHAT TO DO TO SECURE YOUR ORGANIZATION

X-Force makes six recommendations to help companies secure systems against
malicious threats including those mentioned above.

Understand the data the company possesses. This is key to understanding what is
being defended and the most critical data to the business. Managing assets has
been, and still is, one of the biggest issues facing cybersecurity teams today,
John Hendley, head of strategy at IBM Security X-Force tells CSO. “This is
especially the case on the perimeter, where the presence of any vulnerabilities
can introduce a foothold into your environment for threat actors. That’s why
we’ve seen such a large shift in strategy for defenders, away from perfecting
perimeter security and towards detection and response, including the principles
behind zero trust.”

Know your adversary. Adopt a view that emphasizes the specific threat actors
that are most likely to target your industry, organization, and geography. In
Hendley’s words, CISOs need to adopt the hacker mindset. “Doing so makes you see
your systems, your networks, and really the whole world in a new way. Red
teaming your defenses—whether that be simply probing for vulnerabilities or
misconfigurations, or more in-depth detection and response testing can help you
get that understanding.”

Better understand how threat actors operate. Identify their level of
sophistication and know which tactics, techniques, and procedures (TTP)
attackers are most likely to employ. “For example, the actions and tactics of
threat actors targeting pharmaceutical companies for intellectual property will
be a world apart from cyber gangs that target elementary schools with
ransomware. Being sharp on who your adversary is can push defender teams to that
next level,” Hendley says.

Maintain visibility at key points throughout the enterprise. Ensure alerts are
generated and acted on in a timely manner are critical to stopping attackers.

Assume compromise. This will ensure cybersecurity teams are constantly
re-examining possible infiltration points, detection response capabilities and
how difficult it can be for an attacker to access critical systems and data.

Apply threat intelligence. Analyze common attack paths and identify key
opportunities for mitigating common attacks and be prepared by developing an
incident response plan.

Next read this
 * The 10 most powerful cybersecurity companies
 * 7 hot cybersecurity trends (and 2 going cold)
 * The Apache Log4j vulnerabilities: A timeline
 * Using the NIST Cybersecurity Framework to address organizational risk
 * 11 penetration testing tools the pros use

Related:
 * Cyberattacks
 * Malware
 * Network Security
 * Ransomware

With years of experience covering technology and business across the IT channel,
Samira Sarraf managed the enterprise IT content at and wrote for the CIO.com,
CSO Online, and Computerworld editions in Australia and New Zealand. She is now
an editor with CSO Online global.

Follow
 * 
 * 
 * 
 * 

Copyright © 2023 IDG Communications, Inc.

7 hot cybersecurity trends (and 2 going cold)


CSO Online CSO provides news, analysis and research on security and risk
management Follow us
 * 
 * 
 * 
   

 * About Us
 * Contact
 * Republication Permissions
 * Privacy Policy
 * Cookie Policy
 * European Privacy Settings
 * Member Preferences
 * Advertising
 * Foundry Careers
 * Ad Choices
 * E-commerce Links
 * California: Do Not Sell My Personal Info

Copyright © 2023 IDG Communications, Inc.

Explore the Foundry Network descend
 * CIO
 * Computerworld
 * CSO Online
 * InfoWorld
 * Network World













CSO WANTS TO SHOW YOU NOTIFICATIONS

--------------------------------------------------------------------------------

YOU CAN TURN OFF NOTIFICATIONS AT ANY TIME FROM YOUR BROWSER

Accept Do not accept

POWERED BY SUBSCRIBERS