A report from NTT has found a spike in application attacks as remote access becomes a common vulnerability.
NTT, a world-leading global technology services provider, has launched its 2021 Global Threat Intelligence Report (GTIR), which reveals how hackers are taking advantage of global destabilization by targeting essential industries and common vulnerabilities from the shift to remote working.
Healthcare, manufacturing and finance industries all saw an increase in attacks (200%, 300% and 53% respectively), with these top three sectors accounting for a combined total of 62% of all attacks in 2020, up 11% from 2019.
As organizations race to offer more virtual, remote access through the use of client portals, application-specific and web-application attacks spiked, accounting for 67% of all attacks, which has more than doubled in the past two years. Healthcare bore the brunt of these attacks from its shift to telehealth and remote care, with 97% of all hostile activity targeted at the industry being web-application or application-specific attacks.
The GTIR provides insights from NTT’s Cybersecurity Advisory that applies a maturity score of an industry’s security program, with a higher number indicating a more mature plan of action. Concerningly, healthcare and manufacturing have relatively low maturity scores of only 1.02 and 1.21, respectively.
These have decreased from 2019’s baseline of 1.12 and 1.32, while attack rates have significantly risen. Manufacturing has experienced a three-year decline in scores, most likely due to changes in the operating environment and the evolution of attacks. On the other hand, finance continued to demonstrate the highest maturity benchmark score for the third consecutive year, of 1.84, a 0.02 decrease on last year, however.
Kazu Yozawa, CEO of NTT’s Security division, said: “Last year we predicted a surge in targeted, opportunistic attacks and unfortunately, this has proven all too true. While these industries have done their best to maintain essential services throughout disruptive times, the fall in security standards when companies need them most is alarming. As services continue to move online and become increasingly digital to account for the new normal, organizations must be extra vigilant in upholding and maintaining best practices in their security.”
Malware sees a metamorphosis: Crypto malware surges while trojans become more common
While malware is becoming more commoditized in features and functionality, it also became more diverse over the last year with the growth of multi-function malware. Cryptominers have replaced spyware as the most common malware in the world, but the use of certain variants of malware against specific industries continues to evolve.
Worms appeared most frequently in the finance and manufacturing sectors. Healthcare was impacted by remote access trojans, while the technology industry was targetted by ransomware. The education sector was hit by cryptominers due to the popularization of mining among students who exploit unprotected infrastructures.
The crypto-currency market is a prime example, with cryptominers accounting for a staggering 41% of all detected malware in 2020. XMRig coinminer was the most common variant, representing nearly 82% of all coinminer activity and nearly 99% in EMEA specifically.
Mark Thomas, who leads NTT’s Global Threat Intelligence Center, said: “On one hand you have threat actors taking advantage of a global disaster, and on the other, cybercriminals capitalizing on unprecedented market booms. The common thread throughout both of these situations is unpredictability and risk. Changes in operating models or adoption of new technologies present opportunities for malicious actors and with a surging crypto-currency market popular among inexperienced students; attacks were bound to happen. Now, as we enter a more stable phase of the pandemic, organizations and individuals alike must prioritize cybersecurity hygiene across all industries, including the supply chain.”
Further 2021 GTIR highlights:
• Attacks against manufacturing increased from 7% last year to 22%; healthcare increased from 7% to 17%; and finance is up from 15% to 23%.
• Organizations in multiple industries saw attacks related to the COVID-19 vaccine and associated supply chains.
• COVID-19 cybercriminal opportunism intensified, with groups such as the Ozie Team, Agent Tesla and TA505, along with nation-state actors like Vicious Panda, Mustang Panda and Cozy Bear being very active in 2020.
• The most commonly occurring forms of malware in 2020 were miners: 41%; trojans: 26%; worms: 10%; Ransomware 6%.
• Cryptominers dominated activity in Europe, the Middle East and Africa (EMEA) and the Americas but were relatively rare in Asia Pacific (APAC).
• OpenSSL was the most targeted technology in the Americas but was not even on the top 10 list in APAC.
• On-going fallout following the Schrems II decision invalidated the EU-US Privacy Shield and placed additional obligations on organizations transferring personal data from the EU to third countries.
• NTT’s research shows that 50% of organizations globally are prioritizing securing their cloud services – making it the top cybersecurity focus over the next 18 months.
Highlights for The Americas:
• OpenSSL was the most targeted technology in the Americas but was not even in the top 10 list in APAC.
• Business and professional services was the most attacked industry in the Americas, accounting for 26% of all attacks.
• The US accounted for two of the highest rates of reconnaissance activity of any country analyzed:
o Some 64% of all hostile activity targeting the technology industry was some form of reconnaissance.
o In the education industry, 58% of all hostile activity was reconnaissance.
• The Americas observed 8% of all attacks as DoS/DDoS attacks, while these attacks accounted for under 4% in APAC and 1% in EMEA.
• With 34% of all malware detections, XMRig was the most detected malware in the Americas and in the US.
Hightlights for APAC + ANZ:
• Malware varied greatly throughout APAC, but webshells, botnets, and all forms of trojans combined to account for 72% of all malware. While XMRig was the most commonly detected malware globally, no country in APAC showed XMRig in their top 10 most common malware.
• In APAC, finance (24%) was the most attacked industry, followed by manufacturing (22%).
• In ANZ, finance (42%) accounted for almost half of all attacks, followed by education (24%).
• Healthcare industry maturity was severely lacking in APAC and AU at 0.60 and 0.96, being below the global average of 1.02. The largest gap was APAC with 2.53 to target state.
• The technology sector (2.02) was more mature than the global average (1.64).
Methodology for the report
The 2021 Global Threat Intelligence Report contains global attack data gathered from January 1 2020 to December 31 2020. The analysis is based on log, event, attack, incident and vulnerability data from clients as well as from NTT’s global honeypot network. The report includes data from supported operating organizations including NTT’s Cybersecurity Advisory and WhiteHat Security, along with global primary research.Click below to share this article