Cyber Adversaries Reincorporate Old-School Tactics to Catch Organizations Off-Guard Ahead of Busy Holiday Season

Fortinet Threat Landscape Report Highlights Cybercriminals Bypassing Popular Phishing Tactics to Inject or Execute Code Onto a Range of Publicly Facing Services

SUNNYVALE, Calif. - 13/11/2019


Derek Manky, Chief, Security Insights & Global Threat Alliances, Fortinet
“Cybercriminals continue to attempt to be a step ahead of cybersecurity professionals. While they continue to develop new malware and zero-day attacks, they also redeploy previously successful tactics to maximize opportunity across the entire attack surface. In addition to essential strategies like patching, segmenting, and training, organizations also need to embrace automation and AI to enhance their ability to correlate threat intelligence and respond to threats in real time. This approach will only be successful, however, when organizations integrate all of their security resources into a security fabric that can see across, and adapt to their rapidly expanding network.”

News Summary:
Fortinet® (NASDAQ: FTNT), a global leader in broad, integrated, and automated cybersecurity solutions, today announced the findings of its latest quarterly Global Threat Landscape Report.

  • The research reveals that cybercriminals continue to look for new attack opportunities throughout the digital attack surface. At the same time, they are shifting attack vectors such as targeting publicly available edge services to counter training and education efforts by organizations that address popular tactics such as phishing.

  • The Threat Landscape Index remained relatively consistent during the quarter. There were fluctuations but no significant swings. Regardless, organizations should not let their guard down, instead the index demonstrates consistent and sustained cybercriminal activity.

  • For a detailed view of the Threat Landscape Index and subindices for exploits, malware, and botnets, as well as some important takeaways read the blog. Highlights of the report follow.

Shifting Tactics to Catch Organizations By Surprise: The majority of malware is delivered via email, therefore many organizations have been aggressively addressing phishing attacks with end user training and advanced email security tools. As a result, cybercriminals are expanding their ability to deliver malicious malware through other means. These include targeting publicly facing edge services such as web infrastructure, network communications protocols, as well as bypassing ad blocker tools to open attack vectors that don’t rely on traditional phishing tactics. For example, this quarter FortiGuard Labs saw attacks against vulnerabilities that would allow the execution of code remotely targeting edge services, at the top in terms of prevalence amongst all regions. Although this tactic is not new, changing tactics where defenders may not be as closely watching can be a successful way to catch organizations off guard and increase chances for success. This can be especially problematic ahead of a busy online shopping season when online services will experience increased activity.

Maximizing Earning Potential: Following in the footsteps of the lucrative GandCrab ransomware, which was made available on the dark web as a Ransomware-as-a-Service (RaaS) solution, cybercriminal organizations are launching new services to expand their earning potential. By establishing a network of affiliate partners, criminals are able to spread their ransomware widely and scale earnings dramatically in the process. FortiGuard Labs observed at least two significant ransomware families—Sodinokibi and Nemty—being deployed as RaaS solutions. These are potentially just the beginning of what could be a flood of similar services in the future.

Refining Malware for Success: Expanding on these approaches, cybercriminals are also refining malware to evade detection and deliver increasingly sophisticated and malicious attacks, such as the evolution of the Emotet malware. This is a troubling development for organizations as cybercriminals increasingly use malware to drop other payloads on infected systems to maximize their opportunities for financial gain. Recently, attackers have begun using Emotet as a payload delivery mechanism for ransomware, information stealers, and banking trojans including TrickBot, IcedID, and Zeus Panda. In addition, by hijacking email threads from trusted sources and inserting malicious malware into those email threads, attackers are significantly increasing the likelihood that those malicious attachments will be opened.

Maximizing Opportunity with Older Vulnerabilities and Botnets: Targeting older, vulnerable systems that have not been properly secured is still an effective attack strategy. FortiGuard Labs discovered that cybercriminals target vulnerabilities twelve or more years old more often than they target new attacks. And in fact, they target vulnerabilities from every subsequent year since then at the same rate as they do current vulnerabilities.

Similarly, this trend of maximizing existing opportunity also extends to botnets. More so than any other type of threat, the top botnets also tend to carry over from quarter to quarter and region to region globally with little change. This suggests the control infrastructure is more permanent than particular tools or capabilities, and that cybercriminals not only follow new opportunities, but like legitimate businesses, also leverage existing infrastructure whenever possible to increase efficiency and reduce overhead.

Protecting for the Unexpected: Broad, Integrated, and Automated Security
The expanding attack surface and shifting attack strategies of cybercriminals means organizations cannot afford to over-focus on a narrow set of threat trends. It is essential that organizations adopt a holistic approach to securing their distributed and networked environments. This requires the deployment of a security fabric that is broad, integrated, and automated. This approach will enable organizations to reduce and manage the expanding attack surface through broad visibility across integrated devices, stop advanced threats through AI-driven breach prevention, and reduce complexity through automated operations and orchestration. In addition, threat intelligence that is dynamic, proactive, and available in real-time plays a crucial role in identifying trends by following the evolution of attack methods targeting the digital attack surface and then pinpointing cyber hygiene priorities.

Report and Index Overview
The latest Fortinet Threat Landscape Report is a quarterly view that represents the collective intelligence of FortiGuard Labs, drawn from Fortinet’s vast array of global sensors during Q3 of 2019. Research covers global and regional perspectives. Also included in the report is the Fortinet Threat Landscape Index (TLI), comprised of individual indices for three central and complementary aspects of that landscape, which are exploits, malware, and botnets, broken down by prevalence and volume in a given quarter.

Additional Resources

About Fortinet

Fortinet (NASDAQ: FTNT) secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network - today and into the future. Only the Fortinet Security Fabric architecture can deliver security features without compromise to address the most critical security challenges, whether in networked, application, cloud or mobile environments. Fortinet ranks #1 in the most security appliances shipped worldwide and more than 425,000 customers trust Fortinet to protect their businesses. Learn more at https://www.fortinet.com, the Fortinet Blog, or FortiGuard Labs.

Copyright © 2019 Fortinet, Inc. All rights reserved. The symbols ® and ™ denote respectively federally registered trademarks and common law trademarks of Fortinet, Inc., its subsidiaries and affiliates. Fortinet's trademarks include, but are not limited to, the following: Fortinet, FortiGate, FortiGuard, FortiCare, FortiManager, FortiAnalyzer, FortiOS, FortiADC, FortiAP, FortiAppMonitor, FortiASIC, FortiAuthenticator, FortiBridge, FortiCache, FortiCamera, FortiCASB, FortiClient, FortiCloud, FortiConnect, FortiController, FortiConverter, FortiDB, FortiDDoS, FortiExplorer, FortiExtender, FortiFone, FortiCarrier, FortiHypervisor, FortiIsolator, FortiMail, FortiMonitor, FortiNAC, FortiPlanner, FortiPortal, FortiPresence , FortiProxy, FortiRecorder, FortiSandbox, FortiSIEM, FortiSwitch, FortiTester, FortiToken, FortiVoice, FortiWAN, FortiWeb, FortiWiFi, FortiWLC, FortiWLCOS and FortiWLM.

Other trademarks belong to their respective owners. Fortinet has not independently verified statements or certifications herein attributed to third parties and Fortinet does not independently endorse such statements. Notwithstanding anything to the contrary herein, nothing herein constitutes a warranty, guarantee, contract, binding specification or other binding commitment by Fortinet or any indication of intent related to a binding commitment, and performance and other specification information herein may be unique to certain environments. This news release may contain forward-looking statements that involve uncertainties and assumptions, such as statements regarding technology releases among others. Changes of circumstances, product release delays, or other risks as stated in our filings with the Securities and Exchange Commission, located at www.sec.gov, may cause results to differ materially from those expressed or implied in this press release. If the uncertainties materialize or the assumptions prove incorrect, results may differ materially from those expressed or implied by such forward-looking statements and assumptions. All statements other than statements of historical fact are statements that could be deemed forward-looking statements. Fortinet assumes no obligation to update any forward-looking statements, and expressly disclaims any obligation to update these forward-looking statements.