Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Symantec Warns of Shifting Threat Landscape as Formjacking Risk Grows

    Written by

    Sean Michael Kerner
    Published February 21, 2019
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Cyber-security threats are not static and change from year to year as both attackers and defenders shift tactics.

      Symantec released its latest Internet Security Threat Report (ISTR) on Feb. 19, providing an overview of the threat landscape. The 61-page report reveals a number of changes in the threat landscape, including a move toward an attack known as formjacking, where hackers take over online forms and steal user information, including payment card details. The report also outlines the changing landscape for ransomware attacks, which are on the decline overall, though ransomware attacks against enterprises are on the rise.

      “The increase in ransomware attacks against businesses was a surprise,” Kevin Haley, director, Symantec Security Response, told eWEEK. “We were aware of the overall downward trend in ransomware attacks, but this increase flies in the face of that trend but highlights that attackers go where the money is.”

      In this eWEEK Data Points article, we take a look at some of the key trends identified in the Symantec ISTR Volume 24 report.

      Data Point No. 1: Ransomware attackers are shifting focus.

      Overall, Symantec found a 20 percent decline in the volume of ransomware detections in 2018. The decline in infections is the first time since 2013 that Symantec has reported a yearly downturn in the volume of ransomware. 

      Ransomware infections found in enterprises however grew by 12 percent in 2018 as attackers have taken aim at organizations rather than just individuals. Prior to 2017, individuals accounted for the majority of ransomware infections, while in 2018, organizations accounted for 81 percent of all ransomware infections. Symantec attributes part of the shift in ransomware to the decline of exploit kit activity, which was an important delivery mechanism for ransomware.

      “During 2018, the chief ransomware distribution method was email campaigns,” the report states. “Enterprises tend to be more affected by email-based attacks since email remains the primary communication tool for organizations.”

      Data Point No. 2: Cryptojacking attacks continuing to grow.

      Unauthorized cryptocurrency mining software, known as “cryptojacking,” was one of the breakout threats of 2017, but it’s a trend that continued into 2018.

      Symantec reported that it blocked nearly 69 million cryptojacking attempts in 2018, which is a 400 percent increase over 2017. That said, as the value of cryptocurrency declined precipitously over the course of 2018, so too did the volume of attacks. There was a 52 percent drop in the overall number of cryptojacking events between January and December 2018 as the value of the Monero cryptocurrency declined by 90 percent.

      Data Point No. 3: Formjacking was the breakthrough threat of 2018.

      While cryptojacking and ransomware attacks have been ongoing for multiple years, the big breakthrough threat of 2018, according to Symantec, came from formjacking.

      With formjacking attacks, malicious code is injected into a form that enables an attacker to siphon payment card and other information. Symantec found that in 2018, an average of 4,800 websites were compromised every month with formjacking attacks. Large formjacking attacks during the year were often attributed to Magecart, including attacks against British Airways and Ticketmaster.

      “Magecart is an actor or group of actors who have figured out how to make money with this attack,” Haley said. “They will be a model for those to follow.”

      Data Point No. 4: Living off the land attacks are here to stay.

      The concept known as “living off the land” for attackers involves the use of regular tools, such as Microsoft PowerShell, to exploit users and systems.

      In 2018, Symantec reported that it blocked 115,000 malicious PowerShell scripts every month, representing a 1,000 percent year-over-year increase. Additionally, Symantec found that Microsoft Office files account for 48 percent of all malicious email attachments, up from only 5 percent in 2017.

      Data Point No. 5: Cloud storage security is a real weakness for many organizations.

      While attackers actively attempt to exploit users, another key risk comes from organizations that leave cloud storage assets unprotected.

      Symantec reported that over 70 million records were leaked or stolen in 2018 due to misconfigured cloud storage buckets on Amazon’s S3 service.

      “There are numerous tools widely available which allow potential attackers to identify misconfigured cloud resources on the internet,” Symantec’s report states. “Unless organizations take action to properly secure their cloud resources, such as following the advice provided by Amazon for securing S3 buckets, they are leaving themselves open to attack.” 

      Data Point No. 6: Looking forward to 2020, expect more IoT attacks.

      One of the things that Symantec expects will change in the coming year is a shift in internet of things (IoT) attacks. Haley said Symantec expects that among the changes will be the types of devices that are infected. 

      “As 5G becomes adopted, it takes IoT devices out from behind the router and makes them directly attackable by the bad guys,” Haley said.

      Additionally, given the precedent set by the VPNfilter attack in 2018 that infected over 500,000 devices, Symantec expects that more sophisticated attacks against IoT will emerge, both in terms of how devices are exploited and what the attacks can do.  

      “It’s time for people managing operational systems and industrial control systems to really start paying attention to security,” Haley said.

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×