Security News > 2021 > April > Massive increase in endpoint attacks, rising rate of encrypted malware and new exploits targeting IoT
Q4 2020 also brought a 41% increase in encrypted malware detections over the previous quarter and network attacks hit their highest levels since 2018.
"The attacks are coming on all fronts, as cybercriminals increasingly leverage fileless malware, cryptominers, encrypted attacks and more, and target users both at remote locations as well as corporate assets behind the traditional network perimeter. Effective security today means prioritising endpoint detection and response, network defences and foundational precautions such as security awareness training and strict patch management."
Despite being the fourth consecutive quarter of decreasing malware volumes overall, 47% of all attacks detected at the network perimeter in Q4 were encrypted.
Malware delivered via HTTPS connections increased by 41%, while encrypted zero day malware grew by 22% over Q3. Botnet malware targeting IoT devices and routers becomes a top strain.
An investigation uncovered Linux-specific malware designed for ARM processors and another payload designed for MIPS processors within the attacker's infrastructure, indicating a clear focus on evasive attacks against IoT devices.
The report's new endpoint threat intelligence provides deeper insight into specific malware attacks and trends throughout the year 2020 based on over 2.5 million unique payload alerts gathered from 1.7 million endpoints across 92 countries.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/Kuwj2Z6c1kM/
Related news
- Malware botnets exploit outdated D-Link routers in recent attacks (source)
- New Malware Technique Could Exploit Windows UI Framework to Evade EDR Tools (source)
- New IOCONTROL malware used in critical infrastructure attacks (source)
- Iran-Linked IOCONTROL Malware Targets SCADA and Linux-Based IoT Platforms (source)
- New Glutton Malware Exploits Popular PHP Frameworks Like Laravel and ThinkPHP (source)
- FBI spots HiatusRAT malware attacks targeting web cameras, DVRs (source)
- Hackers Exploit Webview2 to Deploy CoinLurker Malware and Evade Security Detection (source)
- Attackers Exploit Microsoft Teams and AnyDesk to Deploy DarkGate Malware (source)
- Rspack npm Packages Compromised with Crypto Mining Malware in Supply Chain Attack (source)
- FICORA and Kaiten Botnets Exploit Old D-Link Vulnerabilities for Global Attacks (source)