Security News > 2021 > April > Massive increase in endpoint attacks, rising rate of encrypted malware and new exploits targeting IoT
Q4 2020 also brought a 41% increase in encrypted malware detections over the previous quarter and network attacks hit their highest levels since 2018.
"The attacks are coming on all fronts, as cybercriminals increasingly leverage fileless malware, cryptominers, encrypted attacks and more, and target users both at remote locations as well as corporate assets behind the traditional network perimeter. Effective security today means prioritising endpoint detection and response, network defences and foundational precautions such as security awareness training and strict patch management."
Despite being the fourth consecutive quarter of decreasing malware volumes overall, 47% of all attacks detected at the network perimeter in Q4 were encrypted.
Malware delivered via HTTPS connections increased by 41%, while encrypted zero day malware grew by 22% over Q3. Botnet malware targeting IoT devices and routers becomes a top strain.
An investigation uncovered Linux-specific malware designed for ARM processors and another payload designed for MIPS processors within the attacker's infrastructure, indicating a clear focus on evasive attacks against IoT devices.
The report's new endpoint threat intelligence provides deeper insight into specific malware attacks and trends throughout the year 2020 based on over 2.5 million unique payload alerts gathered from 1.7 million endpoints across 92 countries.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/Kuwj2Z6c1kM/
Related news
- Xeon Sender Tool Exploits Cloud APIs for Large-Scale SMS Phishing Attacks (source)
- Cybercriminals Exploit Popular Software Searches to Spread FakeBat Malware (source)
- Cybercriminals exploit file sharing services to advance phishing attacks (source)
- Hackers use PHP exploit to backdoor Windows systems with new malware (source)
- BlackByte Ransomware Exploits VMware ESXi Flaw in Latest Attack Wave (source)
- Malware exploits 5-year-old zero-day to infect end-of-life IP cameras (source)
- Cyberattackers Exploit Google Sheets for Malware Control in Likely Espionage Campaign (source)
- Hacktivists Exploits WinRAR Vulnerability in Attacks Against Russia and Belarus (source)
- Hackers Use Fake GlobalProtect VPN Software in New WikiLoader Malware Attack (source)
- New Cross-Platform Malware KTLVdoor Discovered in Attack on Chinese Trading Firm (source)