Pressemitteilung
Juni
24

New WatchGuard Research Reveals Traditional Anti-Malware Solutions Miss Nearly 75% of Threats

Report highlights record-setting zero day malware volumes, rising network attack rates, the quarter’s top malware attacks, and more

SEATTLE – June 24, 2021WatchGuard® Technologies, a global leader in network security and intelligence, multi-factor authentication (MFA), advanced endpoint protection, and secure Wi-Fi, today released its Internet Security Report for Q1 2021. Notable findings include that 74% of threats detected last quarter were zero day malware—or those for which a signature-based antivirus solution did not detect at the time of the malware release—capable of circumventing conventional antivirus solutions. The report also covers new threat intelligence on rising network attack rates, how attackers are trying to disguise and repurpose old exploits, the quarter’s top malware attacks, and more.

“Last quarter saw the highest level of zero day malware detections we’ve ever recorded. Evasive malware rates have actually eclipsed those of traditional threats, which is yet another sign that organizations need to evolve their defenses to stay ahead of increasingly sophisticated threat actors,” said Corey Nachreiner, chief security officer at WatchGuard. “Traditional anti-malware solutions alone are simply insufficient for today’s threat environment. Every organization needs a layered, proactive security strategy that involves machine learning and behavioral analysis to detect and block new and advanced threats.”  

Other key findings from WatchGuard’s Q1 2021 Internet Security Report include:

  • Fileless malware variant explodes in popularity – XML.JSLoader is a malicious payload that appeared for the first time in both WatchGuard’s top malware by volume and most widespread malware detections lists. It was also the variant WatchGuard detected most often via HTTPS inspection in Q1. The sample WatchGuard identified uses an XML external entity (XXE) attack to open a shell to run commands to bypass the local PowerShell execution policy and runs in a non-interactive way, hidden from the actual user or victim. This is another example of the rising prevalence of fileless malware and the need for advanced endpoint detection and response capabilities.
  • Simple file name trick helps hackers pass off ransomware loader as legitimate PDF attachments – Ransomware loader Zmutzy surfaced as a top-two encrypted malware variant by volume in Q1. Associated with Nibiru ransomware specifically, victims encounter this threat as a zipped file attachment to an email or a download from a malicious website. Running the zip file downloads an executable, which to the victim appears to be a legitimate PDF. Attackers used a comma instead of a period in the file name and a manually adjusted icon to pass the malicious zip file off as a PDF. This type of attack highlights the importance of phishing education and training, as well as implementing back-up solutions in the event that a variant like this unleashes a ransomware infection.
  • Threat actors continue to attack IoT devices – While it didn’t make WatchGuard’s top 10 malware list for Q1, the Linux.Ngioweb.B variant has been used by adversaries recently to target IoT devices. The first version of this sample targeted Linux servers running WordPress, arriving initially as an extended format language (EFL) file. Another version of this malware turns the IoT devices into a botnet with rotating command and control servers.
  • Network attacks surge more than 20% – WatchGuard appliances detected more than 4 million network attacks, a 21% increase compared to the previous quarter and the highest volume since early 2018. Corporate servers and assets on site are still high-value targets for attackers despite the shift to remote and hybrid work, so organizations must maintain perimeter security alongside user-focused protections.
  • An old directory traversal attack technique makes a comeback – WatchGuard detected a new threat signature in Q1 that involves a directory traversal attack via cabinet (CAB) files, a Microsoft-designed archival format intended for lossless data compression and embedded digital certificates. A new addition to WatchGuard’s top 10 network attacks list, this exploit either tricks users into opening a malicious CAB file using conventional techniques, or by spoofing a network-connected printer to fool users into installing a printer driver via a compromised CAB file.
  • HAFNIUM zero days provide lessons on threat tactics and response best practices – Last quarter, Microsoft reported that adversaries used the four HAFNIUM vulnerabilities in various Exchange Server versions to gain full, unauthenticated system remote code execution and arbitrary file-write access to any unpatched server exposed to the Internet, as most email servers are. WatchGuard incident analysis dives into the vulnerabilities and highlights the importance of HTTPS inspection, timely patching and replacing legacy systems. 
  • Attackers co-opt legitimate domains in cryptomining campaigns – In Q1, WatchGuard’s DNSWatch service blocked several compromised and outright malicious domains associated with cryptomining threats. Cryptominer malware has become increasingly popular due to recent price spikes in the cryptocurrency market and the ease with which threat actors can siphon resources from unsuspecting victims.

 

WatchGuard’s quarterly research reports are based on anonymized Firebox Feed data from active WatchGuard Fireboxes whose owners have opted in to share data to support the Threat Lab’s research efforts. In Q1, WatchGuard blocked a total of more than 17.2 million malware variants (461 per device) and nearly 4.2 million network threats (113 per device). The full report includes details on additional malware and network trends from Q1 2021, a detailed analysis of the HAFNIUM Microsoft Exchange Server exploits, critical defense tips for readers, and more.

Über WatchGuard Technologies

WatchGuard® Technologies, Inc. gehört zu den führenden Anbietern im Bereich Cybersicherheit. Unsere Unified Security Platform® ist speziell auf Managed Service Providers ausgelegt, damit sie erstklassige Sicherheit bieten können, mit der ihre Unternehmen an Größe und Geschwindigkeit gewinnen und gleichzeitig die betriebliche Effizienz verbessern können. Über 17.000 Vertriebspartner und Dienstleister im Bereich Sicherheit verlassen sich auf die prämierten Produkte und Services des Unternehmens, die die Bereiche Netzwerksicherheit und Intelligence, fortschrittlicher Endpoint-Schutz, Multifaktor-Authentifizierung und sicheres WLAN umfassen, und sorgen somit für den Schutz von mehr als 250.000 Kunden. Gemeinsam bieten diese Bereiche die fünf entscheidenden Elemente einer Sicherheitsplattform: umfassende Sicherheit, kollektive Intelligenz, betriebliche Ausrichtung und Automatisierung. Neben der Zentrale in Seattle im US-Bundesstaat Washington unterhält das Unternehmen Niederlassungen in ganz Nordamerika, Lateinamerika und Europa sowie im asiatisch-pazifischen Raum. Weitere Informationen finden Sie unter WatchGuard.de.

Wenn Sie mehr über WatchGuard, unsere Werbeaktionen und Updates erfahren möchten, folgen Sie uns auf Twitter, Facebook oder auf unserer Unternehmensseite auf LinkedIn. Lesen Sie auch unseren InfoSec-Blog Secplicity. Darin wird einfach und nachvollziehbar beschrieben, wie Sie den neuesten Bedrohungen am besten begegnen. Hier geht's zum Blog: www.secplicity.org. Abonnieren Sie den Podcast „The 443 – Security Simplified“ unter Secplicity.org oder beim Podcast-Anbieter Ihrer Wahl.

WatchGuard ist eine eingetragene Marke von WatchGuard Technologies, Inc. Alle anderen Marken sind Eigentum der jeweiligen Eigner.