{"id":16775,"date":"2019-11-05T07:21:01","date_gmt":"2019-11-05T15:21:01","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/11\/05\/news-10514\/"},"modified":"2019-11-05T07:21:01","modified_gmt":"2019-11-05T15:21:01","slug":"news-10514","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/11\/05\/news-10514\/","title":{"rendered":"SophosLabs surveys the threat landscape for 2020 trends"},"content":{"rendered":"<p><strong>Credit to Author: Andrew Brandt| Date: Tue, 05 Nov 2019 13:50:31 +0000<\/strong><\/p>\n<div class=\"entry-content\">\n<p>SophosLabs this morning published its annual assessment on the state of internet and information security, and our outlook on what security threats are likely to affect the world in the coming year: the <a href=\"https:\/\/sophos.com\/ThreatReport\" target=\"_blank\" rel=\"noopener\">SophosLabs 2020 Threat Report<\/a>, available for download now.<\/p>\n<p>This year, our report broadens the scope of our analysis to cover topics beyond Sophos&#8217; historic core-competencies in desktop malware and spam prevention to more accurately reflect the broader range of security issues the company helps customers address and mitigate today.<\/p>\n<p>While the report discusses bread-and-butter topics like ransomware tools and techniques, novel mobile malware, and the persistent onslaught of automated attacks on devices at the network&#8217;s edge, it also covers, for example, issues surrounding securing cloud computing services and instances, and attacks targeting some of the same machine learning methods Sophos uses to enhance its detection of malicious activity.<\/p>\n<p><span id=\"more-61603\"><\/span><\/p>\n<h3>Attacking like a boss<\/h3>\n<p>We&#8217;ve named one of the big trends that&#8217;s been on the rise in 2019 <em>automated active attacks<\/em>; These involve human-directed compromise of internal networks, followed by the use of standard Windows network administration tools such as WMI and PowerShell to rapidly distribute malware throughout a large enterprise network all at once.<\/p>\n<p>This method was used, for example, by the threat actors behind <a href=\"https:\/\/news.sophos.com\/en-us\/2018\/11\/29\/how-a-samsam-like-attack-happens-and-what-you-can-do-about-it\/\" target=\"_blank\" rel=\"noopener\">the SamSam ransomware<\/a>, and later adopted by other threat actors involved in the distribution of ransomware targeting large networks, such as the criminals behind the <a href=\"https:\/\/news.sophos.com\/en-us\/2019\/05\/10\/megacortex-deconstructed-mysteries-mount-as-analysis-continues\/\" target=\"_blank\" rel=\"noopener\">MegaCortex<\/a> ransomware.<\/p>\n<p><a href=\"https:\/\/sophos.files.wordpress.com\/2019\/11\/figure17.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"61612\" data-permalink=\"https:\/\/news.sophos.com\/en-us\/2019\/11\/05\/sophoslabs-surveys-the-threat-landscape-for-2020-trends\/figure17\/\" data-orig-file=\"https:\/\/sophos.files.wordpress.com\/2019\/11\/figure17.png\" data-orig-size=\"1894,1062\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"\" data-image-description=\"\" data-medium-file=\"https:\/\/sophos.files.wordpress.com\/2019\/11\/figure17.png?w=300\" data-large-file=\"https:\/\/sophos.files.wordpress.com\/2019\/11\/figure17.png?w=640\" class=\"alignnone size-full wp-image-61612\" src=\"https:\/\/sophos.files.wordpress.com\/2019\/11\/figure17.png?w=640&#038;h=359\" alt=\"An illustration of an automated active attack\" width=\"640\" height=\"359\" srcset=\"https:\/\/sophos.files.wordpress.com\/2019\/11\/figure17.png?w=640&amp;h=359 640w, https:\/\/sophos.files.wordpress.com\/2019\/11\/figure17.png?w=1280&amp;h=718 1280w, https:\/\/sophos.files.wordpress.com\/2019\/11\/figure17.png?w=150&amp;h=84 150w, https:\/\/sophos.files.wordpress.com\/2019\/11\/figure17.png?w=300&amp;h=168 300w, https:\/\/sophos.files.wordpress.com\/2019\/11\/figure17.png?w=768&amp;h=431 768w, https:\/\/sophos.files.wordpress.com\/2019\/11\/figure17.png?w=1024&amp;h=574 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a>These complex attacks follow a predictable pattern that involve the use of open-source security tools, and compromised Domain Administrator credentials, to leverage the network&#8217;s own infrastructure against itself.<\/p>\n<h3>Criminals run roughshod over RDP<\/h3>\n<p>The Remote Desktop service and its client application have been essential Microsoft network management tools for years, but 2019 saw a significant leap in both &#8220;shotgun&#8221; and targeted attacks against this standard Windows component. While some attackers chose their targets carefully, leveraging vulnerabilities in RDP and engaging in brute-force login attacks against RDP services operated by their targets, others seem to scan the entire internet looking for an open RDP machine.<\/p>\n<p>The perpetual flood of scan traffic gave rise to a question: How long, we wondered, could a machine that exposed RDP to the public-facing internet remain uncompromised and unaffected by the neverending waves of attacks. To find out, we built honeypot servers, designed to look to the world like a vulnerable machine poking through a firewall, and distributed them to data centers around the world. We didn&#8217;t advertise their existence or make them noticeable in any way, but the attackers found them anyway, rapidly. The results were somewhat shocking.<a href=\"https:\/\/sophos.files.wordpress.com\/2019\/11\/figure11.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"61619\" data-permalink=\"https:\/\/news.sophos.com\/en-us\/2019\/11\/05\/sophoslabs-surveys-the-threat-landscape-for-2020-trends\/figure11\/\" data-orig-file=\"https:\/\/sophos.files.wordpress.com\/2019\/11\/figure11.png\" data-orig-size=\"1536,1151\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"\" data-image-description=\"\" data-medium-file=\"https:\/\/sophos.files.wordpress.com\/2019\/11\/figure11.png?w=300\" data-large-file=\"https:\/\/sophos.files.wordpress.com\/2019\/11\/figure11.png?w=640\" class=\"alignnone wp-image-61619\" src=\"https:\/\/sophos.files.wordpress.com\/2019\/11\/figure11.png?w=770&#038;h=576\" alt=\"A chart tracks the number of logins attempted by attackers using automation to target RDP hosts\" width=\"770\" height=\"576\" srcset=\"https:\/\/sophos.files.wordpress.com\/2019\/11\/figure11.png?w=770&amp;h=576 770w, https:\/\/sophos.files.wordpress.com\/2019\/11\/figure11.png?w=150&amp;h=112 150w, https:\/\/sophos.files.wordpress.com\/2019\/11\/figure11.png?w=300&amp;h=225 300w, https:\/\/sophos.files.wordpress.com\/2019\/11\/figure11.png?w=1024&amp;h=767 1024w, https:\/\/sophos.files.wordpress.com\/2019\/11\/figure11.png 1536w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a><\/p>\n<p>Over the course of a 30-day period this past spring, we recorded more than 3 million attempts to log in to our fake RDP servers. Note that these were not merely scans of the network port used by default by the RDP service, but active login attempts that failed only because our honeypot wasn&#8217;t a real machine the potential attackers could log in to.<\/p>\n<p>The lesson for network administrators is pretty clear: If you care about securing your network, make sure there isn&#8217;t a single machine poking through the firewall, listening for inbound RDP connections. Because, <a href=\"https:\/\/news.sophos.com\/en-us\/2019\/04\/30\/a-taste-of-the-onslaught-at-the-networks-edge\/\" target=\"_blank\" rel=\"noopener\">attackers will come knocking<\/a>, surprisingly fast.<\/p>\n<h3>Cloud security: Knowing is half the battle<\/h3>\n<p>Another trend we&#8217;ve observed is the increasing pace at which people have been, serendipitously, stumbling upon large treasure-troves of valuable, private data that have been moved (legitimately, by the data&#8217;s rightful owners) into cloud computing instances and then inadequately secured from public access. Some of the cloud breaches over the past year have struck large manufacturers, financial services providers, and entertainment companies; These sting because they were avoidable.<\/p>\n<p>We&#8217;ve pulled together a hypothetical scenario to highlight how small mistakes can create large problems. In our scenario, an organization makes a poor choice about password management, and it results in a pair of challenging problems: First, a cloud data lake becomes compromised, leading to a breach of customer information and private source code; Later the attacker who stole the password to the organization&#8217;s cloud services account also uses it to set up a large number of virtual servers for the sole purposes of acting as cryptocurrency miners.<\/p>\n<p><a href=\"https:\/\/sophos.files.wordpress.com\/2019\/11\/sophos-2020-threat-report-infographic-transparent_300ppi.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"61616\" data-permalink=\"https:\/\/news.sophos.com\/en-us\/2019\/11\/05\/sophoslabs-surveys-the-threat-landscape-for-2020-trends\/sophos-2020-threat-report-infographic-transparent_300ppi\/\" data-orig-file=\"https:\/\/sophos.files.wordpress.com\/2019\/11\/sophos-2020-threat-report-infographic-transparent_300ppi.png\" data-orig-size=\"3200,3280\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Cloud breach scenario\" data-image-description=\"\" data-medium-file=\"https:\/\/sophos.files.wordpress.com\/2019\/11\/sophos-2020-threat-report-infographic-transparent_300ppi.png?w=293\" data-large-file=\"https:\/\/sophos.files.wordpress.com\/2019\/11\/sophos-2020-threat-report-infographic-transparent_300ppi.png?w=640\" class=\"alignnone size-full wp-image-61616\" src=\"https:\/\/sophos.files.wordpress.com\/2019\/11\/sophos-2020-threat-report-infographic-transparent_300ppi.png?w=640&#038;h=656\" alt=\"A diagram of a hypothetical cloud security breach incident involving an outside attacker\" width=\"640\" height=\"656\" srcset=\"https:\/\/sophos.files.wordpress.com\/2019\/11\/sophos-2020-threat-report-infographic-transparent_300ppi.png?w=640&amp;h=656 640w, https:\/\/sophos.files.wordpress.com\/2019\/11\/sophos-2020-threat-report-infographic-transparent_300ppi.png?w=1280&amp;h=1312 1280w, https:\/\/sophos.files.wordpress.com\/2019\/11\/sophos-2020-threat-report-infographic-transparent_300ppi.png?w=146&amp;h=150 146w, https:\/\/sophos.files.wordpress.com\/2019\/11\/sophos-2020-threat-report-infographic-transparent_300ppi.png?w=293&amp;h=300 293w, https:\/\/sophos.files.wordpress.com\/2019\/11\/sophos-2020-threat-report-infographic-transparent_300ppi.png?w=768&amp;h=787 768w, https:\/\/sophos.files.wordpress.com\/2019\/11\/sophos-2020-threat-report-infographic-transparent_300ppi.png?w=999&amp;h=1024 999w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a>The company that lost control of its crown jewels then finds the attacker has added insult to injury by dramatically driving up the cost of the cloud computing instance, charged to the victim&#8212;all so the criminal can earn a few Monero or Bitcoin, worth far less than the costs incurred by running all those servers just to mine them.<\/p>\n<p>For more on all these topics, please give our <a href=\"https:\/\/sophos.com\/ThreatReport\" target=\"_blank\" rel=\"noopener\">2020 Threat Report<\/a> a read.<\/p>\n<p>&nbsp;<\/p>\n<\/p><\/div>\n<p><a href=\"http:\/\/feedproxy.google.com\/~r\/sophos\/dgdY\/~3\/tFcwsfiM20g\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/sophos.files.wordpress.com\/2019\/11\/sophos-2020-threat-report-blog-image-no-text.jpg\"\/><\/p>\n<p><strong>Credit to Author: Andrew Brandt| Date: Tue, 05 Nov 2019 13:50:31 +0000<\/strong><\/p>\n<p>SophosLabs this morning published its annual assessment on the state of internet and information security, and our outlook on what security threats are likely to affect the world in the coming year: the SophosLabs 2020 Threat Report, available for download now. This year, our report broadens the scope of our analysis to cover topics beyond [&amp;#8230;]&lt;img src=&#8221;http:\/\/feeds.feedburner.com\/~r\/sophos\/dgdY\/~4\/tFcwsfiM20g&#8221; height=&#8221;1&#8243; width=&#8221;1&#8243; alt=&#8221;&#8221;\/&gt;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[22439,11254,23361,11146,21865,3765,18324,11531,23362,18513,6351],"class_list":["post-16775","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-22439","tag-android-malware","tag-automated-active-attacks","tag-cloud-security","tag-living-off-the-land","tag-ransomware","tag-rdp","tag-report","tag-sophos-threat-report","tag-sophoslabs-uncut","tag-threat"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16775","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16775"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16775\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16775"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16775"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16775"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}