Story image

Proofpoint unveils the biggest cyber threat hotspots from Q4 2016

10 Feb 17

Proofpoint has released its Quarterly Threat Summary looking back at 2016, and it’s a case of more sophisticated evolution, more email malware, more social engineering, more BEC scams and more of a market for cyber exploit kits.

Q4 saw the biggest malicious email campaign yet, which was 6.7 times bigger than those seen in Q3.  Both campaigns used zipped JavaScript attachments to distribute the notorious Locky, which Proofpoint says explains the increase in Locky campaign volumes.

Business Email Compromise (BEC) scams were also on the rise, but CEO-CFO spoofing dropped 28%, down from its 39% high in Q3.

Social media phishing attacks have jumped by 500% in 2016 alone. Angler phishing was a popular method, which intercepts customer support channels on social media.

Fraudulent accounts on social channels also jumped by 100% between Q3 and Q4 alone, which Proofpoint says may be indicative of use in phishing, social spam and malware distribution and other attacks.

Mobile devices were not shielded from malware, as hundreds of thousands were exposed to malvertising, ad redirection and potential attack vectors through DNSChanger EK, which used SOHO router exploits that exposed all connected devices via DNS redirection.

More than 4500 mobile apps that tied themselves to the Summer Olympics and associated sponsor brands were also malicious. Proofpoint says that popular events and culture are common targets for risky apps.

Proofpoint’s top tips for organisations:

  • Assume users will click on links: Social engineering is popular, effective and rapidly evolving. Use a solution that identifies and quarantines inbound threats that target employees and outbound email threats that target customers.
  • Protect your brand reputation and customers: Look out for attacks – especially from fraudulent piggyback accounts - that target your customers over social media, email and mobile. Use a social media solution that can scan and report fraudulent activity.
  • Keep your mobile app environments secure: Mobile environments increase the risk of unauthorised apps that can steal critical information. Use a data-driven solution that works with mobile device management to show app behaviour and the data they are accessing.
  • Partner with a threat intelligence vendor: As attacks are getting more targeted, partnering with a vendor gives organisations a solution that combines static and dynamic techniques to protect and learn from threats.
How to stay safe when shopping online
Online shopping is a great way to avoid the crowds – but there are risks.
Dell EMC embeds security in latest servers
Dell EMC's 14th generation of PowerEdge servers has comprehensive management tools to provide security across hardware and firmware.
Why data backups should be a part of daily operations
"Disaster recovery needs to address complete system failure and provide a set of security policies to govern disaster incidents."
Businesses focusing on threats from within - survey
Over 50% of respondents reported that 100 days of dwell time or more was representative of their organisation.
Corelight and Exabeam partner to improve network monitoring
The combination of lateral movement and siloed usage of point security products leaves many security teams vulnerable to compromise.
SailPoint releases first identity annual report
SailPoint’s research found that many organisations are lacking maturity in their governance processes over identities.
Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.