Cybersecurity Digest #46: 21/03/2022 – 01/04/2022

Cybersecurity news

Cybersecurity Blog Posts

Research and analytics

  • The Menlo Labs research team has studied a new class of cyber threats attackers are using to successfully launch ransomware and phishing attacks, dubbed Highly Evasive Adaptive Threats (HEAT). Specifically, ESG research has found that 36% of organizations have experienced attempted ransomware attacks on a daily, weekly, or monthly basis, while an additional 27% have encountered ransomware on a sporadic basis over the last 12 months.
  • Cequence has published a report API Security Threat Report: Bots and Automated Attacks Explode. The numbers prove that both developers and attackers have made the shift — of the 21.1 billion transactions analyzed by Cequence Security in the last half of 2021, 14 billion
    (70%) APIs.
  • The FBI’s Internet Crime Complaint Center (IC3) has released its annual report. It includes information from 847,376 complaints of suspected internet crime—a 7% increase from 2020—and reported losses exceeding $6.9 billion. The most destructive Internet crime in 2021 was the compromise of business email. In 2021, the FBI received almost 20 thousand complaints about BEC attacks and estimated losses of almost $2.4 billion.
  • Paoloalto has published a Unit 42 Ransomware Threat Report. Innovations have made harder for organizations to defend against ransomware, forcing some to make the hefty sorts of payments. The average ransom demand on cases worked by Unit 42 consultants last year climbed 144% to $2.2 million, while the average payment rose 78% percent to $541,010.
  • According to The 2021 Vulnerability Intelligence Report by Rapid7, the average time to known exploitation for vulnerabilities in this report is 12 days in 2021 compared with 42 days for vulnerabilities in our 2020 report — a 71% decrease.
  • Engineering controllers of Tekon, which are used, among other things, to control elevators, are vulnerable to hacking from any corner of the Internet, believes information security specialist Jose Bertin. Many of them have direct access from the Network, and their owners are in no hurry to change the standard administrator password.
  • According to Netscout Threat Intelligence Report attackers started launching more potent direct-path attacks to take down user applications and services, thereby disrupting consumers’ ability to access the internet. Meanwhile, they continued to innovate with server-class botnets and increased use of DDoS techniques such as carpet-bombing.
  • Kaspersky Lab has published an analysis of the market of fishing-kits – tools for quickly creating fake websites and collecting data stolen with their help. In total, over the past year, experts have discovered and blocked about 1.2 million phishing pages created with the help of fishing-kits.
  • In the post describes the technical analysis of a new campaign detected by Intezer’s research team, which initiates attacks with a phishing email that uses conversation hijacking to deliver IcedID.

Major Cyber Incidents