{"id":9349,"date":"2017-09-18T09:00:08","date_gmt":"2017-09-18T17:00:08","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/09\/18\/news-3122\/"},"modified":"2017-09-18T09:00:08","modified_gmt":"2017-09-18T17:00:08","slug":"news-3122","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/09\/18\/news-3122\/","title":{"rendered":"Grading our Predictions: See how we fared in 1H 2017"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay| Date: Mon, 11 Sep 2017 12:00:36 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/asset_cover-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/asset_cover-300x200.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/asset_cover-768x512.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/asset_cover-1024x683.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/asset_cover-640x427.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/asset_cover-900x600.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/asset_cover-440x293.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/asset_cover-380x253.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>In December of last year, we released eight predictions as to what we thought the 2017 cybersecurity landscape would hold. Although we\u2019ve definitely observed new trends and attacks that we didn\u2019t foresee, we\u2019ve also seen several of our predictions play out as anticipated.<\/p>\n<p>With only three and a half months left in the year, we\u2019re taking this opportunity to look back and grade ourselves on some of our own predictions \u2013 and we promise to be fair:<\/p>\n<p><strong>1. Ransomware growth will plateau in 2017, but attack methods and targets will diversify: <\/strong><strong>A-<\/strong><\/p>\n<p><strong>What we said:<\/strong> \u201cWe predict a 25% growth in the number of new ransomware families in 2017, translating to an average of 15 new families discovered each month. Although the tipping point has passed in 2016, a period of stabilization will push competing cybercriminals to diversify, hitting more potential victims, platforms, and bigger targets.\u201d<\/p>\n<p><strong>What we\u2019ve seen: <\/strong>Our forecast was mostly accurate, however the \u201cplateau\u201d is slightly higher than anticipated, with 83 million ransomware threats detected and an average of 28 new families per month. Compared to the alarming 400 percent spike in the number of ransomware families from January to September 2016, this is what we consider a plateau.<\/p>\n<p>Also as predicted, this period of relative stabilization sees cybercriminals focusing on diversifying their pool of potential victims, platforms and bigger targets. New ransomware tactics, techniques and procedures (TTPs) that have emerged, include:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li><a href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/erebus-resurfaces-as-linux-ransomware\/\">Erebus<\/a> ransomware targeting Linux systems<\/li>\n<li><a href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/wannacry-uiwix-ransomware-monero-mining-malware-follow-suit\/\">UIWIX<\/a> ransomware using the same SMB vulnerabilities as <a href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/massive-wannacrywcry-ransomware-attack-hits-various-countries\/\">WannaCry<\/a> but appears to be fileless<\/li>\n<li>SLocker mobile ransomware featured file encryption capability and copied the graphical user interface of WannaCry. Overall, there was an increase in mobile app ransomware to 234,000 in six months.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>2. Internet of Things (IoT) devices will play a bigger role in DDoS attacks; IIoT systems in targeted attacks<\/strong>: <strong>A<\/strong><\/p>\n<p><strong>What we said:<\/strong> \u201cWe predict that in 2017, more cyber attacks will find the IoT and its related infrastructure front and center, whether threat actors use open routers for massive DDoS attacks or a single connected car to stage highly targeted ones.\u201d<\/p>\n<p><strong>What we\u2019ve seen:<\/strong> Although we (thankfully) haven\u2019t experienced an attack equaling the caliber of <a href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/internet-things-ecosystem-broken-fix\/\">Mirai<\/a>, by April we discovered a piece of malware that confirmed this prediction. The IoT botnet Persirai was targeting more than 1,000 Internet Protocol (IP) camera models based on various Original Equipment Manufacturer products. According to Shodan data we gathered in late April, as many as 120,000 IP cameras had been vulnerable to the malware.<\/p>\n<p>The second half of this prediction was also proven true through our research paper <a href=\"https:\/\/documents.trendmicro.com\/assets\/wp\/wp-industrial-robot-security.pdf\"><em>Rogue Robots: Testing the Limits of an Industrial Robot\u2019s Security<\/em><\/a><em>, <\/em>published in collaboration with Politecnico di Milano (POLIMI), showing that industrial robots can be compromised. Our research revealed 83,000 exposed industrial routers and 28 exposed industrial robots allowing users to remotely control the robots and potentially cause diverse effects from productivity loss and defective products to unsafe work environments and the replacement of multi-million-dollar machines.<\/p>\n<p><strong>3. The simplicity of BEC attacks will drive an increase in the volume of targeted scams in 2017 \u2013 <\/strong><strong>A+<\/strong><\/p>\n<p><strong>What we said:<\/strong> \u201cWe predict that this simplicity will make BEC, specifically CEO fraud, a more attractive mode of attack for cybercriminals. The scam is easy and cost-effective, not requiring so much in terms of infrastructure. But the average payout for a successful BEC attack is US$140,000\u2014the price of a small house. The total estimated loss from BEC in two years is US$3 billion.\u201d<\/p>\n<p><strong>What we\u2019ve seen: <\/strong>According to the <a href=\"https:\/\/www.ic3.gov\/media\/2017\/170504.aspx\">Federal Bureau of Investigation<\/a> (FBI), since 2013 global losses from BEC scams have reached US$5.3 billion, making it one of the top threats affecting enterprises in 2017. Additionally, we\u2019ve observed that the most spoofed position in BEC is the CEO, whereas the most targeted positions are CFO and financial directors.<strong>\u00a0<\/strong><\/p>\n<p><strong>4. Cyberpropaganda will become a norm \u2013 <\/strong><strong>A+<\/strong><strong>\u00a0<\/strong><\/p>\n<p><strong>What we said: <\/strong>\u201cThe upcoming elections in France and Germany, including subsequent movements similar to the United Kingdom (UK)\u2019s withdrawal from the European Union (EU), also known as Brexit, will be influenced by what is being shared and done using electronic media. We will likely see more sensitive information used in cyberpropaganda activities stem from espionage operations such as Pawn Storm. Entities that are able to navigate public opinion using this means in a strategic manner will be able to produce results that favor them. In 2017, we will see much more use, abuse, and misuse of social media.\u201d<strong>\u00a0<\/strong><\/p>\n<p><strong>What we\u2019ve seen: <\/strong>Exactly that. Most notably, only two days before the May presidential election in France, hackers attempted to sabotage the campaign of frontrunner (now French president) Emmanuel Macron by leaking a 9GB archive of emails from his political party. \u00a0On Twitter, misinformation on the leaks was spread using #Macronleaks. Additionally, as mentioned in our research paper on Fake News, Chinese, Russian, Middle Eastern, and English-speaking underground markets have a range of services that can push propaganda, including tools for content creation, boosting social media reach and directly influencing the outcome of online polls through vote buying.<\/p>\n<p><strong>5. Adobe and apple will outpace Microsoft\u00a0in terms of platform vulnerability discoveries. \u2013 <\/strong><strong>A<\/strong><strong>\u00a0<\/strong><\/p>\n<p><strong>What we said:<\/strong> \u201cWe predict that more software flaws will be discovered in Adobe and Apple products in addition to Microsoft\u2019s. Apart from the fact that Microsoft\u2019s PC shipments have been declining in recent years as more users opt for smartphones and professional-level tablets instead, the vendor\u2019s security mitigations and improvements will also make it more difficult for attackers to find more vulnerabilities in its OS.\u201d<strong>\u00a0<\/strong><\/p>\n<p><strong>What we\u2019ve seen: <\/strong>Despite the declining number of Apple, Google and Microsoft bugs, it is true that Apple and Adobe are outpacing Microsoft in terms of vulnerabilities disclosed. Alternatively, Foxit and Adobe product flaws are on the rise. In total, Trend Micro Zero Day Initiative (ZDI), and the 3,000 independent researchers who submit to the program, discovered and disclosed 382 new vulnerabilities during the first half of this year. Additionally, ZDI defines a zero-day as a vulnerability disclosed which the vendor has not yet patched. For comparison, only eight zero-days were discovered in the second half of 2016, whereas 49 have been discovered so far in 2017.<\/p>\n<p><strong>6. Threat actors will come up with new targeted attack tactics that circumvent current anti-evasion solutions. \u2013 <\/strong><strong>B<\/strong><strong>\u00a0<\/strong><\/p>\n<p><strong>What we said:<\/strong> \u201cAs we observe attackers\u2019 movements and ability to adjust their TTPs to be able to target different organizations in different countries, we predict new and unexpected techniques to emerge in future targeted attacks. We predict that this learning curve will mean using more methods primarily intended to evade most modern security technologies developed in recent years.\u201d<strong>\u00a0<\/strong><\/p>\n<p><strong>What we\u2019ve seen: <\/strong>Although we haven\u2019t seen VM escapes as predicted, we didn\u2019t completely miss the mark. Cerber ransomware had evolved to evade pre-execution machine learning detection and sport defense mechanisms that include anti-sandbox and anti-antivirus techniques.<strong>\u00a0<\/strong><\/p>\n<p>Overall, we think we scored pretty well on our predictions, but the year isn\u2019t over yet. What we know from the first half of the year is that it is much costlier for enterprises to experience a breach than it is to secure networks now. The <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/the-cost-of-compromise\">complete report<\/a> demonstrates what we\u2019ve faced and what Trend Micro has protected customers from this year, which can help businesses prioritize security protection moving forward \u2013 before the next major attack occurs.<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/grading-predictions-see-aired-1h-2017\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay| Date: Mon, 11 Sep 2017 12:00:36 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/asset_cover-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/asset_cover-300x200.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/asset_cover-768x512.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/asset_cover-1024x683.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/asset_cover-640x427.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/asset_cover-900x600.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/asset_cover-440x293.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/09\/asset_cover-380x253.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>In December of last year, we released eight predictions as to what we thought the 2017 cybersecurity landscape would hold. Although we\u2019ve definitely observed new trends and attacks that we didn\u2019t foresee, we\u2019ve also seen several of our predictions play out as anticipated. With only three and a half months left in the year, we\u2019re&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[4503,3765,714,10423,10421],"class_list":["post-9349","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-cybercrime","tag-ransomware","tag-security","tag-underground-economy","tag-vulnerabilities-exploits"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9349","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9349"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9349\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9349"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}