www.trendmicro.com
Open in
urlscan Pro
2.20.38.217
Public Scan
URL:
https://www.trendmicro.com/vinfo/us/security/research-and-analysis/threat-reports/roundup/attacks-from-all-angles-2021-midy...
Submission: On September 15 via api from GB — Scanned from DE
Submission: On September 15 via api from GB — Scanned from DE
Form analysis
2 forms found in the DOM<form class="main-menu-search" aria-label="Search Trend Micro">
<div class="main-menu-search__field-wrapper" id="cludo-search-form">
<table cellspacing="0" cellpadding="0" class="gsc-search-box" style="width:100%">
<tbody>
<tr>
<td class="gsc-input">
<input type="text" size="10" class="gsc-input" name="search" title="search" placeholder="Search Trend Micro" autocomplete="off">
</td>
</tr>
</tbody>
</table>
</div>
</form>
<form class="main-menu-search" aria-label="Search Trend Micro">
<div class="main-menu-search__field-wrapper" id="cludo-search-form-mobile">
<table cellspacing="0" cellpadding="0" class="gsc-search-box" style="width:100%">
<tbody>
<tr>
<td class="gsc-input">
<input type="text" size="10" class="gsc-input" name="search" title="search" placeholder="Search Trend Micro" autocomplete="off">
</td>
<td class="gsc-search-close collapsed" style="width:1%;" data-target="#search-mobile-wrapper" data-toggle="collapse">
<span class="icon-close"></span>
</td>
</tr>
</tbody>
</table>
</div>
</form>
Text Content
dismiss 0 Alerts undefined * No new notifications at this time. Download * Scan Engines * All Pattern Files * All Downloads * Subscribe to Download Center RSS Buy * Home Office Online Store * Renew Online * Free Tools * Find a Partner * Contact Sales * Locations Worldwide * 1-888-762-8736 (M-F 8am - 5pm CST) * Small Business * Buy Online * Renew Online Region * The Americas * United States * Brasil * Canada * México * Asia Pacific * Australia * Hong Kong (English) * 香港 (中文) (Hong Kong) * भारत गणराज्य (India) * Indonesia * 日本 (Japan) * 대한민국 (South Korea) * Malaysia * New Zealand * Philippines * Singapore * 台灣 (Taiwan) * ประเทศไทย (Thailand) * Việt Nam * Europe, Middle East & Africa * België (Belgium) * Česká Republika * Danmark * Deutschland, Österreich Schweiz * España * France * Ireland * Italia * Middle East and North Africa * Nederland * Norge (Norway) * Polska (Poland) * Россия (Russia) * South Africa * Suomi (Finland) * Sverige (Sweden) * Türkiye (Turkey) * United Kingdom Log In * My Support * Log In to Support * Partner Portal * Home Solutions * My Account * Lost Device Portal * Trend Micro Vault * Password Manager * Customer Licensing Portal * Online Case Tracking * Premium Support * Worry-Free Business Security Services * Remote Manager * Cloud One * Referral Affiliate * Referral Affiliate Contact Us * Contact Sales * Locations * Support * Find a Partner * Learn of upcoming events * Social Media Networks * Facebook * Twitter * Linkedin * Youtube * Instagram * 1-888-762-8736 (M-F 8-5 CST) Business For Home Products Products Hybrid Cloud Security Workload Security Conformity Container Security File Storage Security Application Security Network Security Open Source Security Network Security Intrusion Prevention Advanced Threat Protection Industrial Network Security Mobile Network Security User Protection Endpoint Security Industrial Endpoint Email Security Web Security Endpoint & Gateway Suites Detection & Response XDR Managed XDR Service Endpoint Detection & Response Powered by Global Threat Intelligence Connected Threat Defense All Products & Trials All Solutions Small & Midsize Business Security Solutions Solutions For Cloud Cloud Migration Cloud-Native App Development Cloud Operational Excellence Data Center Security SaaS Applications Internet of Things (IoT) Smart Factory Connected Car Connected Consumer 5G Security for Enterprises Risk Management Ransomware End-of-Support Systems Compliance Detection and Response Industries Healthcare Manufacturing Federal Why Trend Micro Why Trend Micro The Trend Micro Difference Customer Successes Strategic Alliances Industry Leadership Research Research Research About Our Research Research and Analysis Research, News and Perspectives Security Reports Security News Zero Day Initiative (ZDI) Blog Research by Topic Vulnerabilities Annual Predictions The Deep Web Internet of Things (IoT) Resources DevOps Resource Center CISO Resource Center What is? Threat Encyclopedia Cloud Health Assessment Cyber Risk Assessment Enterprise Guides Glossary of Terms Support Support Business Support Log In to Support Technical Support Virus & Threat Help Renewals & Registration Education & Certification Contact Support Downloads Free Cleanup Tools Find a Support Partner For Popular Products Deep Security Apex One Worry-Free Worry-Free Renewals Partners Partners Channel Partners Channel Partner Overview Managed Service Provider Cloud Service Provider Professional Services Resellers Referral Partners System Integrators Alliance Partners Alliance Overview Technology Alliance Partners Our Alliance Partners Tools and Resources Find a Partner Education and Certification Partner Successes Distributors Partner Login Company Company Overview Leadership Customer Success Stories Strategic Alliances Industry Accolades Newsroom Webinars Events Security Experts Careers History Corporate Social Responsibility Diversity, Equity & Inclusion Trust Center Internet Safety and Cybersecurity Education Investors Legal × 0 Alerts undefined * No new notifications at this time. Download * Scan Engines * All Pattern Files * All Downloads * Subscribe to Download Center RSS Buy * Home Office Online Store * Renew Online * Free Tools * Find a Partner * Contact Sales * Locations Worldwide * 1-888-762-8736 (M-F 8am - 5pm CST) * Small Business * Buy Online * Renew Online Region * The Americas * United States * Brasil * Canada * México * Asia Pacific * Australia * Hong Kong (English) * 香港 (中文) (Hong Kong) * भारत गणराज्य (India) * Indonesia * 日本 (Japan) * 대한민국 (South Korea) * Malaysia * New Zealand * Philippines * Singapore * 台灣 (Taiwan) * ประเทศไทย (Thailand) * Việt Nam * Europe, Middle East & Africa * België (Belgium) * Česká Republika * Danmark * Deutschland, Österreich Schweiz * España * France * Ireland * Italia * Middle East and North Africa * Nederland * Norge (Norway) * Polska (Poland) * Россия (Russia) * South Africa * Suomi (Finland) * Sverige (Sweden) * Türkiye (Turkey) * United Kingdom Log In * My Support * Log In to Support * Partner Portal * Home Solutions * My Account * Lost Device Portal * Trend Micro Vault * Password Manager * Customer Licensing Portal * Online Case Tracking * Premium Support * Worry-Free Business Security Services * Remote Manager * Cloud One * Referral Affiliate * Referral Affiliate Contact Us * Contact Sales * Locations * Support * Find a Partner * Learn of upcoming events * Social Media Networks * Facebook * Twitter * Linkedin * Youtube * Instagram * 1-888-762-8736 (M-F 8-5 CST) * No new notifications at this time. * No new notifications at this time. * Scan Engines * All Pattern Files * All Downloads * Subscribe to Download Center RSS * Home Office Online Store * Renew Online * Free Tools * Find a Partner * Contact Sales * Locations Worldwide * 1-888-762-8736 (M-F 8am - 5pm CST) * Small Business * Buy Online * Renew Online * The Americas * United States * Brasil * Canada * México * Asia Pacific * Australia * Hong Kong (English) * 香港 (中文) (Hong Kong) * भारत गणराज्य (India) * Indonesia * 日本 (Japan) * 대한민국 (South Korea) * Malaysia * New Zealand * Philippines * Singapore * 台灣 (Taiwan) * ประเทศไทย (Thailand) * Việt Nam * Europe, Middle East & Africa * België (Belgium) * Česká Republika * Danmark * Deutschland, Österreich Schweiz * España * France * Ireland * Italia * Middle East and North Africa * Nederland * Norge (Norway) * Polska (Poland) * Россия (Russia) * South Africa * Suomi (Finland) * Sverige (Sweden) * Türkiye (Turkey) * United Kingdom * My Support * Log In to Support * Partner Portal * Home Solutions * My Account * Lost Device Portal * Trend Micro Vault * Password Manager * Customer Licensing Portal * Online Case Tracking * Premium Support * Worry-Free Business Security Services * Remote Manager * Cloud One * Referral Affiliate * Referral Affiliate * Contact Sales * Locations * Support * Find a Partner * Learn of upcoming events * Social Media Networks * Facebook * Twitter * Linkedin * Youtube * Instagram * 1-888-762-8736 (M-F 8-5 CST) undefined * Research & Analysis * Threat Reports * Roundup * Attacks From All Angles: 2021 Midyear Cybersecurity Report ATTACKS FROM ALL ANGLES 2021 Midyear Cybersecurity Report September 14, 2021 * Email * Facebook * Twitter * Google+ * Linkedin Download Attacks From All Angles: 2021 Midyear Cybersecurity Report In the first half of this year, cybersecurity strongholds were surrounded by cybercriminals waiting to pounce at the sight of even the slightest crack in defenses to ravage valuable assets. Threats and risks from all angles soon closed in, bringing with them updated tactics and greater motivation to affect targeted industries. These security issues include high-profile modern ransomware attacks, active campaigns, critical vulnerabilities, Covid-19-related scams, and other threats, not to mention developing threats in the cloud and the internet of things (IoT). We investigate these in our midyear roundup report, "Attacks From All Angles: 2021 Midyear Cybersecurity Report." To better prepare for the future, let us retrace our steps so far this year in the volatile landscape of cybersecurity. Where would you like to start? 01 RANSOMWARE Ransomware continued to evolve as one of the most menacing cyberthreats, amassing over 7 million combined email, URL, and file threat detections. Threat actors moved quickly and aggressively with attacks on critical sectors such as banking, government, and manufacturing. Banking 15,537 Government 10,225 Manufacturing 4,957 Healthcare 4,802 Food and beverage 2,330 Top five industries affected by ransomware in the first half of 2021 While some of the operators’ strategies, such as their propensity to target crucial industries, remained constant, many of their tactics evolved drastically and rapidly. Prominent ransomware variants raised the stakes as new families aggravated the risks. Some threat actors were quick to jump in on the opportunity and pretended to be ransomware gangs, such as in the case of a fake DarkSide campaign. NOTABLE RANSOMWARE FAMILIES DARKSIDE DarkSide launched a string of high-profile attacks, including the Colonial Pipeline incident. It has also been actively updating its technique, such as with a DarkSide Linux variant targeting VMware ESXi servers. REVIL (AKA SODINOKIBI) REvil was wielded in a recent attack on major meat supplier JBS. In the first half of 2021, Trend Micro file detections for REvil also more than doubled compared to the same period last year. HELLO Hello, a new ransomware variant, exploits the Microsoft SharePoint vulnerability CVE-2019-0604. We also found that it deployed the China Chopper web shell to execute PowerShell commands. Such incidents prompted discussions on the delicate issues of ransom payments, cyber insurance, and potential legislation. There have also been aggressive efforts by authorities and security researchers to take down ransomware gangs, which have led to a string of high-profile arrests such as in the cases of the crackdown on Egregor and Clop operators. REFINED TECHNIQUES Ransomware operators expanded their use of legitimate tools. They also upped the ante of their extortion techniques, from encryption to exposure of stolen data, to incorporating distributed denial-of-service (DDoS) attacks and directly badgering customers and stakeholders of victim organizations. Ransomware multi-extortion techniques 02 ADVANCED PERSISTENT THREATS (APTS) APTs were also active as several campaigns were launched in the first half of this year. The threat groups behind these APTs brandished both tried-and-tested techniques and innovative tactics. The former included the use of spear-phishing emails and malicious scripts, while the latter involved new legitimate platforms, malware variants, and remote access tools (RATs) such as the PlugX loader. NOTABLE APTS TEAM TNT TeamTNT is at it again, this time targeting Amazon Web Services (AWS) credentials and Kubernetes clusters. These attacks are related to cryptocurrency mining as well. For the latter, China and the US make up most of the compromised IP addresses. WATER PAMOLA We spotted some changes in Water Pamola’s tactics. These consist mainly of a shift to focusing mostly on targets in Japan. Additionally, instead of using spam, attacks are launched by exploiting a cross-site scripting (XSS) vulnerability in a store’s online admin portal. EARTH VETALA Earth Vetala – MuddyWater launched campaigns against organizations in the Middle East and surrounding regions. They took advantage of legitimate remote admin tools such as ScreenConnect and RemoteUtilities to distribute payloads. IRON TIGER Iron Tiger, which is notorious for targeting gambling companies in Southeast Asia, updated its toolkit with an evolved SysUpdate malware variant. The group now also uses five files (instead of three) in its infection routine. EARTH WENDIGO Trend Micro discovered an APT has been targeting organizations in Taiwan since 2019. We dubbed the threat actors as Earth Wendigo. The attacks use spear-phishing emails with malicious JavaScript injected onto a widely used webmail system. Notable APTs for the first half of 2021 The attack flow of Earth Wendigo’s operation 03 VULNERABILITIES Notable vulnerabilities made headlines as researchers scurried to patch affected systems before these flaws could pose dangers and disrupt work setups, including remote ones. PROXYLOGON A hacking incident attributed to the Hafnium group saw the exploitation of four zero-day vulnerabilities in the on-premises versions of Microsoft Exchange Server. These vulnerabilities are CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065, collectively dubbed as ProxyLogon. MICROSOFT SHAREPOINT VULNERABILITIES Five notable remote code execution (RCE) vulnerabilities also affected Microsoft SharePoint, an online document management and storage platform that can also be used in remote work setups. CVE-2021-24066Workflow Deserialization of Untrusted Data Remote Code Execution VulnerabilitCVE-2021-27076InfoPath List Deserialization of Untrusted Data Remote Code Execution VulnerabilityCVE-2021-31181WebPart Interpretation Conflict Remote Code Execution VulnerabilityCVE-2021-28474Server-Side Control Interpretation Conflict Remote Code Execution VulnerabilityCVE-2021-26420WorkflowCompilerInternal Exposed Dangerous Function Remote Code Execution Vulnerability Microsoft SharePoint RCE vulnerabilities for the first half of 2021 VPN VULNERABILITIES As work-from-home (WFH) setups continue to persist, virtual private networks (VPNs) remain a vital tool for ensuring security. Detections for these vulnerabilities continued to proliferate, with some spikes compared to the same period last year. Fortinet Pulse Secure Citrix Systems CVE-2018-13379 CVE-2019-11510 CVE-2019-11539 CVE-2019-19781 2020 Jan 15,834 88,506 9 856 287 Feb 9,864 66,164 12 52 19 Mar 14,910 63,716 115 118 18 Apr 18,312 62,862 69 2,703 1 May 20,897 60,791 60 2,921 7 Jun 27,110 39,994 123 2,783 5 2021 Jan 113,330 45,937 787 1,388 3 Feb 77,853 15,627 488 579 761 Mar 75,785 27,876 566 1 713 158 Apr 68,651 21,440 956 988 5 May 70,083 15,230 508 650 5 Jun 61,467 9,558 301 11 418 15 Detections for VPN vulnerabilities for the first half of 2020 and the first half of 2021 PRINTNIGHTMARE “PrintNightmare” is the name attributed to CVE-2021-1675, a critical Windows Print Spooler vulnerability that allows arbitrary code execution with system-level privileges. The accidental leak of a proof-of-concept exploit code triggered a race to patch this vulnerability as soon as possible. All in all, the number of vulnerability detections showed a small decrease, with a notable decline in critical vulnerabilities. Severity1H 2021 Count1H 2020 CountCritical16121High553547Medium10776Low9442Total770786 Half-year comparison of the severity breakdown, based on the CVSS of vulnerabilities disclosed via our Zero Day Initiative (ZDI) program. Source: Trend Micro ZDI program 04 COVID-19-RELATED SCAMS AND OTHER THREATS Even amid a pandemic, it’s business as usual for many threat actors as they either continue unleashing new threats or refurbish current ones. Some cybercriminals directly took advantage of the pandemic, using the uncertainty and distress brought about by the situation for social engineering ammunition in crafting their scams. COVID-19-RELATED THREATS As vaccination programs continue to be rolled out across the globe, threats related to Covid-19 vaccines proliferate as well. These involve malicious files, emails, text messages, misinformation sites, and phishing pages. The usual targets are telecommunications, banking, retail, government, and finance sectors. United States 1,584,337 Germany 832,750 Colombia 462,005 Italy 131,197 Spain 111,663 Others 1,287,440 The top countries affected by Covid-19-related threats in the first half of 2021 ACTIVE THREATS XCSSET XCSSET targets Mac users and infects Xcode projects. A few months into the year, threat actors updated XCSSET with features that let it adapt to both ARM64 and x86_x64 Macs. The malware also gained the ability to harvest sensitive information from certain websites, including cryptocurrency-trading platforms. PANDASTEALER PandaStealer is a new information stealer that can gather sensitive information like private keys and records of past transactions from a target’s digital currency wallets. It can also harvest credentials from other applications, take screenshots, and exfiltrate data from browsers. It is mainly propagated through spam emails that request business quotes. 05 CLOUD AND THE INTERNET OF THINGS (IOT) Circumstances brought about by the pandemic catalyzed the adoption of online systems powered by technologies such as the cloud and the IoT. However, these domains come with their own sets of threats and risks. CLOUD Some prominent threats this year include TeamTNT attacks. At the start of the year, we uncovered that the threat actors behind TeamTNT were targeting certain cloud systems: * AWS credentials. TeamTNT stole AWS credentials through a binary containing a hard-coded shell script. Over 4,000 instances were compromised. * Kubernetes clusters. TeamTNT compromised Kubernetes clusters in the wild. Almost 50,000 IP addresses were affected across multiple clusters. THE IOT We uncovered risks in various facets of the IoT, including Long Range Wide Area Network (LoRaWAN), 5G, and routers. LORAWAN While useful in enterprises and smart cities, LoRaWAN devices are not immune to compromise. After finding exploitable vulnerabilities in these devices, we created the LoRaPWN tool for assessing the security of LoRaWAN communications. 5G Establishing 4G/5G campus networks for enterprises comes with risks. To study these perils, we identified several attack scenarios including DNS hijacking, MQTT hijacking, Modbus/TCP hijacking, downloading or resetting unprotected programmable logic controllers (PLCs), remote desktop, and SIM swapping. ROUTERS Routers have always been plagued with security issues. We analyzed router infections and found VPNFilter, an IoT botnet, to be one of the most prominent threats. To compromise routers and storage devices, VPNFilter uses backdoor accounts and various exploits. 06 THREAT LANDSCAPE 40,956,909,973 Overall number of threats blocked for the first half of 2021 BLOCKED EMAIL THREATS Q1 16,089,334,070 Q2 17,226,781,018 BLOCKED MALICIOUS FILES Q1 2,343,479,304 Q2 3,997,341,419 BLOCKED MALICIOUS URLS Q1 535,451,111 Q2 764,523,051 EMAIL REPUTATION QUERIES Q1 20,910,330,826 Q2 22,075,108,541 FILE REPUTATION QUERIES Q1 442,384,974,451 Q2 517,455,645,611 URL REPUTATION QUERIES Q1 848,818,567,862 Q2 796,857,859,588 Download our full report to gain insights into the pressing cyberthreats and risks that plagued the first half of 2021 and learn more about our expert security recommendations for users and enterprises. HIDE Like it? Add this infographic to your site: 1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V). Image will appear the same size as you see above. Posted in Roundup, Threat Reports, Ransomware, Vulnerabilities, Advanced Persistent Threats, COVID-19, Cloud Computing, Internet of Things RELATED POSTS * A Roadmap to Secure Connected Cars: Charting the WP.29's UN Regulation No. 155 * Linux Threat Report 2021 1H: Linux Threats in the Cloud and Security Recommendations * Islands of Telecom: Risks in IT * TeamTNT Activities Probed: Credential Theft, Cryptocurrency Mining, and More * 2020 Report: ICS Endpoints as Starting Points for Threats RECENT POSTS * Attacks From All Angles: 2021 Midyear Cybersecurity Report * A Roadmap to Secure Connected Cars: Charting the WP.29's UN Regulation No. 155 * Earth Baku Returns: Uncovering the Upgraded Toolset Behind the APT Group’s New Cyberespionage Campaign * Linux Threat Report 2021 1H: Linux Threats in the Cloud and Security Recommendations * Islands of Telecom: Risks in IT WE RECOMMEND * Internet of Things * Virtualization & Cloud * Mobile * Securing Home Routers * A Roadmap to Secure Connected Cars: Charting the WP.29's UN Regulation No. 155 * Islands of Telecom: Risks in IT * IoT Security Issues, Threats, and Defenses * Security 101: Protecting Serverless and Container Applications with RASP (Runtime Application Self-Protection) * Navigating Gray Clouds: The Importance of Visibility in Cloud Security * Supply Chain Attacks in the Age of Cloud Computing: Risks, Mitigations, and the Importance of Securing Back Ends * Know the Symptoms: Protect Your Devices While Working From Home * Review, Refocus, and Recalibrate: The 2019 Mobile Threat Landscape * Mobile Banking Trojan FakeToken Resurfaces, Sends Offensive Messages Overseas from Victims’ Accounts * Alexa and Google Home Devices can be Abused to Phish and Eavesdrop on Users, Research Finds * Mirai Variant Spotted Using Multiple Exploits, Targets Various Routers * A Look Into the Most Noteworthy Home Network Security Threats of 2017 2021 SECURITY PREDICTIONS The seismic events of 2020 have created long-lasting changes in work environments across the globe, and opened up new attack avenues for cybercriminals. Cybersecurity will help enterprises and ordinary users adapt safely to these new conditions. View the 2021 Security Predictions TREND MICRO 2020 ANNUAL CYBERSECURITY REPORT The upheavals of 2020 challenged the limits of organizations and users, and provided openings for malicious actors. A robust cybersecurity posture can help equip enterprises and individuals amid a continuously changing threat landscape. View the 2020 Annual Cybersecurity Report * Contact Sales * Locations * Careers * Newsroom * Trust Center * Privacy * Accessibility * Support * Site map * linkedin * twitter * facebook * youtube * instagram * rss Copyright © 2021 Trend Micro Incorporated. All rights reserved.