March 20, 2018 By Douglas Bonderud 2 min read

Security intelligence isn’t fire and forget. As evidenced by a new report, organizations must be able to identify, adapt and respond to emerging threats if they hope to keep networks safe.

The latest volume of the “Microsoft Security Intelligence Report” examined the current attack landscape for security professionals. It found that the combination of botnets, ransomware and phishing campaigns has created a triple threat that’s hard to defeat and even harder to dislodge.

A One-Two-Three Punch

The report found that botnets are on the rise worldwide as attackers leverage connected devices to create massive networks that can take down web servers, decimate defenses and infect devices. One popular botnet, Gamarue, distributed over 80 different malware families last year, including ransomware, Trojans and backdoors.

According to the Microsoft report, phishing still ranks as the top malware delivery system, making up 53 percent of all Office 365-based threats in the last half of 2017. Since attackers only need one click or download for a successful attack, spamming company emails with wave after wave of supposedly legitimate messages tends to pay off.

Ransomware is also an effective tactic for malware-makers, but it causes numerous problems for victims. According to CyberEdge’s “2018 Cyberthreat Defense Report,” only 19 percent of victims get their stolen files back after paying a ransom. In some cases, it comes down to sheer criminal intention. In others, poorly constructed code makes it impossible to decrypt files without causing damage.

Individually, these threats represent real risks to organizations. Together, they make up an overlapping triple threat: Botnets provide the sheer scope and throughput necessary to distribute ransomware across the globe, while phishing provides the low-friction entry method needed to bypass advanced firewalls and detection solutions.

It’s a case of new meets old: Evolving, insecure Internet of Things (IoT) networks make botnets viable options for cybercriminals, while the human condition means email is always at risk. Despite increasing awareness of ransomware threats, many companies still pay up rather than waiting out demands or opting for alternative methods.

Smart Practices Strengthen Security Intelligence

The bad news is that there’s no silver bullet to ward off the potential of a triple-threat infection. The good news is that best practices help.

The Microsoft report noted that humans are “often the weakest link in cybersecurity” and employees remain prone to email-based attacks. The authors suggested that training, education and mock phishing exercises can go a long way toward improving organizational security practices.

Phishing awareness and prevention is particularly noteworthy. According to an Akamai report, botnets are now pivoting to leverage more credential abuse. But if companies can lock down email access, the path from code to compromise becomes much more difficult.

Standard security smarts still apply: Educate employees about the dangers of phishing attacks and how they should respond, update all security solutions regularly and ensure that IoT deployments are properly secured.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today