02.12.2019 Views

Cyber Defense eMagazine December 2019

Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!

Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

105<br />

previous two quarters. There was also increasing overlap between the most-widespread malware<br />

detections affecting individual networks and the most prolific malware by volume, with three threats found<br />

in both lists. Finally, multiple popular backdoor shell scripts (including both the Backdoor.Small.DT and<br />

Trojan.GenericKD tools from the Kali Linux penetration testing/ethical hacking suite) appeared for the<br />

first time in the list of top malware attacks, possibly showing that hackers are leveraging Kali Linux more<br />

often.<br />

Network Attacks Explode<br />

Network attacks more than doubled from Q1 to Q2 <strong>2019</strong>. This was the largest percent increase we’ve<br />

seen since 2017. Two attacks debuted on the top 10 list: EXPLOIT Nodejs js-yaml load() and WEB<br />

Directory Traversal -4. The former accounted for 2.9% of all network attacks by volume and exploits a<br />

vulnerability in the YAML markup language package JS-YAML for Node.js. Specifically, it exploits how<br />

the library parses a custom data type, which results in remote code execution. The latter network attack,<br />

WEB Directory Traversal -4, allows web users to escape a web server’s root directory and potentially<br />

gain access to any file on the computer system. The most common target is the “/etc/passwd” file, which<br />

is the file storing user login credentials. Granted the passwords are normally hashed, but attackers can<br />

still attempt to crack the hashes and obtain legitimate user login credentials. A final startling discovery<br />

was the 1,288.39% increase in WEB SQL injection attempt -33 attacks from Q1. A yearly comparison to<br />

Q2 2018 shows that same attack at an enormous 29,149.23% increase!<br />

DNS-Level Attacks Leverage Legitimate Content Delivery Networks<br />

The Threat Lab’s research found multiple malware campaigns using popular content delivery networks<br />

(CDNs) like CloudFront and CloudFlare to prevent detection by anti-malware services that only look at<br />

the root domain of a questionable URL. These fell into three categories: malware domains, which are<br />

web sites outright hosting malware; compromised domains, which are web sites that threat actors<br />

exploited to host their own malicious JavaScript code; and phishing domains, where threat actors direct<br />

users to spoofed login screens to harvest their credentials. Our research found malware domains at<br />

dc44qjwal3p07[.]cloudfront[.]net and d3i1asoswufp5k[.]cloudfront[.]net. Phishing domains were identified<br />

at ec2-18-224-214-207[.]us-east-2[.] compute[.]amazonaws[.]com and usd383orgmy[.]sharepoint[.]com.<br />

Security Incidents Making Headlines in Q2 <strong>2019</strong><br />

On May 7, <strong>2019</strong> the Baltimore Department of Public Works suffered a major ransomware attack. Adding<br />

to the agony, five days into the city’s downtime the alleged threat actor started openly mocking the city<br />

on Twitter! Researchers identified the malware as RobbinHood and the perpetrator set the ransom at<br />

around $75,000. In the end, the City of Baltimore needed to rebuild many critical systems, which had a<br />

major impact on worker productivity. Total estimated damages reached $17 million. This is a prime<br />

example of the importance of deploying and testing backup solutions!

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!