{"id":13580,"date":"2018-10-15T00:10:03","date_gmt":"2018-10-15T08:10:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/10\/15\/news-7347\/"},"modified":"2018-10-15T00:10:03","modified_gmt":"2018-10-15T08:10:03","slug":"news-7347","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/10\/15\/news-7347\/","title":{"rendered":"Malwarebytes Labs Cybercrime Tactics and Techniques Report (CTNT) shows shift to business targets in Q3"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 15 Oct 2018 07:01:00 +0000<\/strong><\/p>\n<p>Once again, it&#8217;s that time of year: time for the quarterly Malwarebytes Labs <a href=\"https:\/\/go.malwarebytes.com\/rs\/805-USG-300\/images\/181008-MWB-CTNT%202018%20Q3-Q3News.pdf?mkt_tok=eyJpIjoiWlRFeE1qVXdNak5sT0RjMCIsInQiOiJhQStQOG84SGJPUGNEVU1DRUhNczMrS2Z5NmhndDFrcHZoZktjN2l1cnVCNFJWNnlJVXZNTzRNTG5XTU9MTnR3UUdNcXZBa1dQdXVIQ0NGRTdVWXdOQT09In0%3D\" target=\"_blank\" rel=\"noopener\">Cybercrime Tactics and Techniques Report<\/a>. Strap in your seat belts, folks, because the third quarter of 2018 was quite a wild ride.<\/p>\n<p>After a sleepy first two quarters, cybercriminals shook out the cobwebs and revved up their engines in Q3 2018. With cryptominers and exploit kits maturing, ransomware ramping up with steady, sophisticated attacks, and banking Trojans experiencing a renaissance, we\u2019re having one heck of a season. Attack vectors were at their most creative\u2014and most difficult to remediate\u2014especially for businesses.<\/p>\n<p>In fact, businesses saw far more action this quarter than consumers\u2014their total detections trended upwards by 55 percent, while consumer detections increased only by 4 percent quarter over quarter. It looks like threat actors are searching for more bang for their buck, and business targets are returning more value for their efforts. Banking Trojans and ransomware, traditionally aimed at both businesses and consumers, leaned much harder into their business targets this quarter. Even malware that\u2019s generally favored consumers, such as cryptominers and adware, seems to have graduated to a more professional prey.<\/p>\n<p>Consumers didn&#8217;t get away from Q3 unscathed, however. They saw a whole lot of scam action this quarter, especially the ever-classic sexploitation technique, but this time it came with a twist\u2014scammers used stale personally identifiable information (PII) likely pulled from breaches of old to scare users into action. And although the bad guys were up to no good, we at Malwarebytes had a field day taking a bunch of them down.<\/p>\n<p>So how did we draw our conclusions for this report? As we\u2019ve done for the last several quarterly reports, we combined intel and statistics gathered from July through September 2018 from our Intelligence, Research, and Data Science teams with telemetry from both our consumer and business products, which are deployed on millions of machines.<\/p>\n<p>If you want to learn more about the key developments in cybercrime last quarter, including the latest threats, newest attack methods, noteworthy scams, and predictions for Q4 cybercrime trends, check out the full Malwarebytes Labs <a href=\"https:\/\/go.malwarebytes.com\/rs\/805-USG-300\/images\/181008-MWB-CTNT%202018%20Q3-Q3News.pdf?mkt_tok=eyJpIjoiWlRFeE1qVXdNak5sT0RjMCIsInQiOiJhQStQOG84SGJPUGNEVU1DRUhNczMrS2Z5NmhndDFrcHZoZktjN2l1cnVCNFJWNnlJVXZNTzRNTG5XTU9MTnR3UUdNcXZBa1dQdXVIQ0NGRTdVWXdOQT09In0%3D\" target=\"_blank\" rel=\"noopener\">Cybercrime Tactics and Techniques Report<\/a>.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/10\/labs-cybercrime-tactics-and-techniques-report-ctnt-shows-shift-to-business-targets\/\">Malwarebytes Labs Cybercrime Tactics and Techniques Report (CTNT) shows shift to business targets in Q3<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/10\/labs-cybercrime-tactics-and-techniques-report-ctnt-shows-shift-to-business-targets\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 15 Oct 2018 07:01:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/10\/labs-cybercrime-tactics-and-techniques-report-ctnt-shows-shift-to-business-targets\/' title='Malwarebytes Labs Cybercrime Tactics and Techniques Report (CTNT) shows shift to business targets in Q3'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/04\/MB_LABS-01.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>The quarterly Malwarebytes Labs Cybercrime Tactics and Techniques Report is here! Learn how Q3 2018 marked a major turning point in cybercrime trends\u2014especially for businesses.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/malwarebytes-news\/ctnt-report\/\" rel=\"category tag\">CTNT report<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/malwarebytes-news\/\" rel=\"category tag\">Malwarebytes news<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/ctnt\/\" rel=\"tag\">CTNT<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ctnt-report\/\" rel=\"tag\">CTNT report<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cybercrime-tactics-and-techniques\/\" rel=\"tag\">cybercrime tactics and techniques<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/labs-report\/\" rel=\"tag\">labs report<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malwarebytes-labs\/\" rel=\"tag\">malwarebytes labs<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/q3-2018\/\" rel=\"tag\">Q3 2018<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/q3-2018-report\/\" rel=\"tag\">Q3 2018 report<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/report\/\" rel=\"tag\">report<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/10\/labs-cybercrime-tactics-and-techniques-report-ctnt-shows-shift-to-business-targets\/' title='Malwarebytes Labs Cybercrime Tactics and Techniques Report (CTNT) shows shift to business targets in Q3'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/10\/labs-cybercrime-tactics-and-techniques-report-ctnt-shows-shift-to-business-targets\/\">Malwarebytes Labs Cybercrime Tactics and Techniques Report (CTNT) shows shift to business targets in Q3<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[14010,18050,11969,19868,11530,10546,19869,19870,11531],"class_list":["post-13580","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-ctnt","tag-ctnt-report","tag-cybercrime-tactics-and-techniques","tag-labs-report","tag-malwarebytes-labs","tag-malwarebytes-news","tag-q3-2018","tag-q3-2018-report","tag-report"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13580","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13580"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13580\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13580"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13580"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13580"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}