Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Security Apps
F-Secure
Attack Landscape H2 2019
Message
<blockquote data-quote="upnorth" data-source="post: 863665" data-attributes="member: 38832"><p>The last year of the decade set a new standard for cyber attacks. F-Secure’s <em>Attack Landscape H2 2019</em> notes that while the impact of sophisticated ransomware attacks continues to be devastating, most of the billions of attacks we see target devices that don’t have keyboards.</p><p></p><p>In the first half of 2019, we saw a jump in attack traffic to our global network of honeypots from millions of hits to 2.9 billion. In the second half of the year, this pace continued with 2.8 billion hits to our servers. DDoS attacks drove this deluge, accounting for two thirds of the traffic. Honeypot traffic was driven by action aimed at the SMB and Telnet protocols. This shows persistent attacker interest in the Eternal Blue vulnerability, which was first made public in 2017.</p><p></p><p><img src="https://blog-assets.f-secure.com/wp-content/uploads/2020/02/26001818/attacks.jpg" alt="" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p>The explosion in attack traffic tracks the explosion of the Internet of Things (IoT) and threats that target IoT devices. As a result, most of the malicious traffic we see today is generated by Linux-based malware like Mirai. Brute forcing factory default usernames and passwords of IoT devices continues to be an popular way to recruit devices into botnets for DDoS attacks. A great way to see what attackers are interested in is to check out the list of passwords they use in their attacks. From this, we can see that Dahua DVRs and embedded devices such as routers are popular targets.</p><p></p><p>Spam continues to be the<a href="https://blog.f-secure.com/why-spam-is-on-the-rise-again/" target="_blank"> most popular way to spread malware</a>.</p><p></p><p>“Spam preys on unsuspecting individuals, making the lack of awareness about threats a weak link for companies, and a lucrative target for malware authors,” says Calvin Gan, Manager at F-Secure’s Tactical Defense Unit. “And with attacks becoming more sophisticated, such as ransomware infections that escalate into data breaches, it’s more important than ever for organizations to improve their cyber defenses in preparation for these attacks.”</p><p></p><p><img src="https://blog-assets.f-secure.com/wp-content/uploads/2020/02/26002542/malware-distribution.jpg" alt="" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p>Malicious Word and Excel macro documents acting as downloaders for malicious binaries like Emotet were also common throughout the year. </p><p></p><p>One of the most fascinating things about our <a href="https://blog.f-secure.com/attack-landscape-h1-2019-iot-smb-traffic-abound/" target="_blank">Attack Landscape reports</a> is the numbers that show the source countries where attacks are being launched from and where they are being targeted by destination. The numbers capture mostly criminal not nation-state activity and should be taken with a grain of salt due to purposeful obfuscation. Yet many countries show up on these lists again and again. </p><p></p><p>[URL unfurl="true"]https://blog-assets.f-secure.com/wp-content/uploads/2020/03/04101313/attack-landscape-h22019-final.pdf[/URL]</p><p></p><p>[URL unfurl="true"]https://blog.f-secure.com/attack-landscape-h2-2019-an-unprecedented-year-cyber-attacks/[/URL]</p></blockquote><p></p>
[QUOTE="upnorth, post: 863665, member: 38832"] The last year of the decade set a new standard for cyber attacks. F-Secure’s [I]Attack Landscape H2 2019[/I] notes that while the impact of sophisticated ransomware attacks continues to be devastating, most of the billions of attacks we see target devices that don’t have keyboards. In the first half of 2019, we saw a jump in attack traffic to our global network of honeypots from millions of hits to 2.9 billion. In the second half of the year, this pace continued with 2.8 billion hits to our servers. DDoS attacks drove this deluge, accounting for two thirds of the traffic. Honeypot traffic was driven by action aimed at the SMB and Telnet protocols. This shows persistent attacker interest in the Eternal Blue vulnerability, which was first made public in 2017. [IMG]https://blog-assets.f-secure.com/wp-content/uploads/2020/02/26001818/attacks.jpg[/IMG] The explosion in attack traffic tracks the explosion of the Internet of Things (IoT) and threats that target IoT devices. As a result, most of the malicious traffic we see today is generated by Linux-based malware like Mirai. Brute forcing factory default usernames and passwords of IoT devices continues to be an popular way to recruit devices into botnets for DDoS attacks. A great way to see what attackers are interested in is to check out the list of passwords they use in their attacks. From this, we can see that Dahua DVRs and embedded devices such as routers are popular targets. Spam continues to be the[URL='https://blog.f-secure.com/why-spam-is-on-the-rise-again/'] most popular way to spread malware[/URL]. “Spam preys on unsuspecting individuals, making the lack of awareness about threats a weak link for companies, and a lucrative target for malware authors,” says Calvin Gan, Manager at F-Secure’s Tactical Defense Unit. “And with attacks becoming more sophisticated, such as ransomware infections that escalate into data breaches, it’s more important than ever for organizations to improve their cyber defenses in preparation for these attacks.” [IMG]https://blog-assets.f-secure.com/wp-content/uploads/2020/02/26002542/malware-distribution.jpg[/IMG] Malicious Word and Excel macro documents acting as downloaders for malicious binaries like Emotet were also common throughout the year. One of the most fascinating things about our [URL='https://blog.f-secure.com/attack-landscape-h1-2019-iot-smb-traffic-abound/']Attack Landscape reports[/URL] is the numbers that show the source countries where attacks are being launched from and where they are being targeted by destination. The numbers capture mostly criminal not nation-state activity and should be taken with a grain of salt due to purposeful obfuscation. Yet many countries show up on these lists again and again. [URL unfurl="true"]https://blog-assets.f-secure.com/wp-content/uploads/2020/03/04101313/attack-landscape-h22019-final.pdf[/URL] [URL unfurl="true"]https://blog.f-secure.com/attack-landscape-h2-2019-an-unprecedented-year-cyber-attacks/[/URL] [/QUOTE]
Insert quotes…
Verification
Post reply
Top