上海品茶

2020年Sonicwall网络威胁报告 - SONICWALL(38页英文版).pdf

编号:19404 PDF 38页 2.38MB 下载积分:VIP专享
下载报告请您先登录!

2020年Sonicwall网络威胁报告 - SONICWALL(38页英文版).pdf

1、2020 SONICWALL CYBER THREAT REPORT I sonicwall 2 A NOTE FROM BILL CYBERCRIMINAL INC. 2019 GLOBAL CYBERATTACK TRENDS INSIDE THE SONICWALL CAPTURE LABS THREAT NETWORK KEY FINDINGS FROM 2019 SECURITY ADVANCES CRIMINAL ADVANCES FASTER IDENTIFICATION OF NEVER-BEFORE-SEEN MALWARE TOP 10 CVES EXPLOITED IN

2、2019 ADVANCEMENTS IN DEEP MEMORY INSPECTION MOMENTUM OF PERIMETER-LESS SECURITY PHISHING DOWN FOR THIRD STRAIGHT YEAR CRYPTOJACKING CRUMBLES RANSOMWARE TARGETS STATE, PROVINCIAL malicious Offi ce fi les were then leveraged later in the year. 21 ADVANCEMENTS IN DEEP MEMORY INSPECTION The above timeli

3、ne highlights changes SonicWall observed to GandCrab Version 5 in 2019, including alterations to payloads, malicious URLs, etc., even if the version number remained the same. (i.e., Version 5.2 could have different download URLs). In this snapshot, SonicWall identifi ed and logged different versions

4、 of GandCrab through the fi rst half of the year, but didnt record any attacks after May 2019 as the malware authors terminated the illegal affi liate program. Side-channel attacks continue to be ripe for security research In November 2019, four researchers from three universities Worcester Polytech

5、nic Institute (U.S.), University of Lbeck (Germany) and the University of California (U.S.) published new fi ndings that side-channel timing and lattice attacks could be executed against Trusted Platform Module (TPM) chips, specifi cally Intel fTPM and STMicroelectronics TPM chips. Dubbed TPM-FAIL,

6、this group of vulnerabilities are the next variation of side-channel attacks following Meltdown/Spectre, Foreshadow, PortSmash, MDS, etc. The details of the TPM-FAIL vulnerabilities are outlined in CVE-2019-11090. Tracking the evolution of malware strains The collective power of Capture ATP and RTDM

7、I also helps SonicWall Capture Labs threat researchers track the evolution of malware variants even when authors obfuscate their payloads, such as using scripts inside of archives. In this example, SonicWall tracked the evolution of GandCrab as it spread in the wild. The authors of the GandCrab rans

8、omware eventually announced they were shuttering the project in June 2019 after a “successful” 16-month run. 1-Jan-19 v5.0.4 17-Jan-19 v5.1 28-Jan-19 24-Feb-19 v5.1 10-Mar-19 v5.2 11-Mar-19 v5.2 12-Mar-19 v5.2 7-Apr-19 v5.2 30-May-19 v5.2 GANDCRAB RANSOMWARE V5.X TIMELINE v5.1 22 ADVANCEMENTS IN DEE

9、P MEMORY INSPECTION The latest attacks on the TPM chip shows an evolution of side-channel attacks. Unlike the fi rst-generation side-channel threats that would result in damage to the “immediate” target (i.e., the targeted data centers, cloud providers, etc.), TPM-FAIL could impact unpatched devices

10、 “down the line” everything from security appliances to end- user laptops. This exploit could be leveraged to forge digital signatures. If an operating system or the application use TPM to issue digital signatures, the private signing key used for signature generation can be compromised. With compro

11、mised signing keys, forged signatures can help criminals bypass authentication protocols, tamper with operating systems, sign malicious software, etc. SonicWall stands by its position that while these types of side-channel attacks have yet to be publicly weaponized, they continue to present a signif

12、i cant potential threat to organizations, such as cloud providers and hosting companies, running virtualized or multi-tenant environments that allow execution of arbitrary payloads. SonicWall continues to test and refi ne detection techniques in preparation for when side- channel attacks evolve from

13、 theoretical to practical. SonicWall has confi rmed that Capture Advanced Threat Protection (ATP) sandbox customers are protected from certain TPM- FAIL side-channel attacks via the solutions patent-pending Real-Time Deep Memory InspectionTM (RTDMI) technology. Vulnerability Meltdown Spectre Foresha

14、dow PortSmash Spoiler MDS (ZombieLoad, RIDL, Fallout) (CVE-2019-11090) TPM-FAIL Publicly Announced 1/3/2018 1/3/2018 8/14/2018 11/2/2018 3/5/2019 5/14/2019 11/12/2019 RTDMI Detection Confi rmed 1/30/2018 6/13/2018 8/15/2018 11/15/2018 3/5/2019 5/15/2019 1/7/2020 23 MOMENTUM OF PERIMETER-LESS SECURIT

15、Y For decades, protecting networks was entirely focused on defi ning perimeters and setting up defense layers to keep threats out. And for years, this approach served businesses well, with fi nite exposure points and attack vectors that were guarded with some investment and adherence to established

16、best practices and frameworks. Today, its a different story. The boundaries of organizations networks are borderless and expanding to limitless endpoints. Simultaneously, the threat landscape is becoming increasingly evasive. These evolving and persistent cyberattacks create boundless points of expo

17、sure to organizations. But new momentum toward perimeter-less architecture is helping redefi ne the future of cybersecurity a safer future not restrained by undefendable perimeters. Much of this new thinking was fi rst based on a zero-trust security model, which requires organizations to verify and

18、authenticate any device, user or application, regardless if it is inside or outside the network perimeter. From there, organizations could segment data across different trust zones and further vet access depending on the sensitivity of the data. But more guidance was needed to bring this theory into

19、 reality. Introduction of SASE The cybersecurity and network security solution spaces are highly segmented with an endless number offerings and vendors. This creates a massive headache for organizations trying to smoothly integrate these solutions into their network environment. Instead, the entire

20、cybersecurity space needs to converge to provide a more holistic cybersecurity approach. This is where secure access service edge (SASE), a new network security model coined by Gartner in 2019, comes into play. SASE may help shape how organizations secure their networks and data in the coming years.

21、 SASE platforms combine software- and service-based networks, which will provide a unifi cation of different security solutions. “With an endless fi eld of exposure points, the traditional network security model is outdated. With the adoption of many different cloud services, we need a more holistic

22、 approach,” said Sagi Gidali, co-founder of Perimeter 81, a SonicWall technology partner. “Designing a new way forward a future without network perimeters was the only way to properly manage and mitigate tomorrows most innovative cyberattacks.” A modern SASE platform will empower organizations to si

23、mply connect to a single platform for access to a secure network while gaining access to physical and cloud resources, regardless of their location. Some of these new solutions have a range of overlapping benefi ts, so the naming conventions do vary: zero-trust network access, secure network as a se

24、rvice, fi rewall as a service, secure SD-WAN as a service and so on. The new perimeter-less security movement could also replace the need for traditional virtual private networks (VPN) that so many employees have (begrudgingly) learned to adopt. Unlike hardware-based legacy VPN and fi rewall technol

25、ogy, the more advanced and secure zero-trust network as a service offerings use the software-defi ned perimeter (SDP) model to offer greater network visibility, seamless onboarding and full compatibility with all major cloud providers. With an endless fi eld of exposure points, the traditional netwo

26、rk security model is outdated Designing a new way forward a future without network perimeters was the only way to properly manage and mitigate tomorrows most innovative cyberattacks. Sagi Gidali Co-Founder Perimeter 81 “ ” 24 PHISHING DOWN FOR THIRD STRAIGHT YEAR Mirroring how malware is being lever

27、aged, cybercriminals are being more targeted with phishing than ever before, too. So much so, SonicWall Capture Labs threat researchers recorded a 42% decline in overall phishing volume, the third straight year the attack vector declined. Also like malware, volume is only part of the story. Phishers

28、 are being measured, pragmatic and patient. Besides the usual phishing campaigns that attempt to steal login credentials, SonicWall observed new practices using old tricks. One such example is the use of HTML fi les leveraging legacy data uniform resource identifi er (URI) methods other than JavaScr

29、ipt, which upon rendition displays a fraudulent webpage or form to the victim to illegally obtain usernames and/or passwords from unsuspecting victims. Employees across a range of organizations, including educational, banking, computer, government, airlines, agriculture, travel, machinery, construct

30、ion, among others, are often the target of this prevalent phishing tactic. As was covered in a previous section, PDFs and Microsoft Offi ce fi les are the delivery vehicles of choice for the modern cybercriminal. Unfortunately, these fi les are universally trusted and abundant in the modern workplac

31、e. Threat actors are hoping this trust, coupled with busy work schedules, is enough to trick unsuspecting victims into clicking links or downloading attachments included within phishing emails. In many situations, this click is the only barrier preventing the delivery of the cybercriminals payload.

32、Old tricks are new again. The example above, found in 2019, shows how data URI methods can be leveraged to present target victims with fraudulent web pages or forms to steal user credentials. 25 CRYPTOJACKING CRUMBLES The shuttering of the Coinhive mining operation in March 2019 dealt a devasting bl

33、ow to the nefarious cryptojacking racket that abused the service. Coinhive was not inherently malicious; it was an alternative method for websites to earn revenue instead of showing advertisements. Coinhive- enabled websites allocated a small portion of visitors processing power to legitimately mine

34、 cryptocurrency. Unfortunately, attackers misused this technology by infecting a large number of websites with Coinhive scripts and used the processing power of unsuspecting victims to mine cryptocurrency for themselves (without users knowledge). The cryptocurrency of choice was usually Monero. Whil

35、e the ebb and fl ow of cryptocurrency prices didnt help encourage authors to write new cryptojacking malware, the loss of Coinhive was too much for the malicious movement to overcome. In fact, bitcoin even made a surge halfway through 2019 to help cryptojacking stay relevant as a lucrative option fo

36、r cybercriminals. 78% After the shuttering of Coinhive, the volume of cryptojacking hits dropped 78% during the second half of 2019. 26 CRYPTOJACKING CRUMBLES But crypto prices slumped again in late 2019 and remnant Coinhive malware faded with it. XMRig and Bitminer were the primary cryptojacking ma

37、lware remaining, but their collective volume was a fraction of Coinhive. To put the decline in perspective, SonicWall reported that total cryptojacking hits reached 52.5 million for the fi rst six months of 2019. Despite a late surge in December (expected seasonal attack spike), the malware fi nishe

38、d with 64.1 million total hits in 2019, a 78% drop since the start of July 2019. 27 RANSOMWARE TARGETS STATE, PROVINCIAL & LOCAL GOVERNMENTS In 2019, there was an increase in ransomware used in targeted attacks toward state, provincial and local governments, as well as large corporations. Attacks ha

39、ve ranged from hospitals, police stations and educational institutions to aluminum factories (Norsk Hydro, Norway) and power grids (City Power, Johannesburg). “In a modern, citizen-centric environment, successful ransomware attacks are highly disruptive,” SonicWall President and CEO Bill Conner wrot

40、e for Forbes. “Networks from city hall, law enforcement agencies, sanitation, courthouses or the DMV could be compromised in minutes and everyday operations held for ransom, often at exorbitant costs.” Following the same trend as global malware volume, ransomware attacks were down slightly in 2019.

41、SonicWall Capture Labs threat researchers recorded 187.9 million in total ransomware volume for the year, a 6% drop from the record- breaking 2018 volume. 28 RANSOMWARE TARGETS STATE, PROVINCIAL & LOCAL GOVERNMENTS Bill Conner President & CEO SonicWall Schools under siege by ransomware K-12 district

42、s and higher education institutions across the world were also targeted with ransomware in 2019. And its very much a global epidemic. In the U.S., ransomware attacks took down schools across the country, from New York, New Jersey, Louisiana and Oklahoma to California and back again. In some cases, l

43、ike Livingston Public Schools in New Jersey, classes were delayed because of ransomware infection. That attack even took down the districts payroll system. Similar delays were felt by districts in Michigan, Alabama and New York. In the U.K., penetration testing conducted by JISC, the government agen

44、cy that provides many computerized services to U.K. academic bodies, tested the defenses of over 50 British universities. The results were unfl attering: the pen testers scored a 100% success rate, gaining access to every single system they tested. Defense systems were bypassed in as little as an ho

45、ur in some cases, with the ethical hackers easily able to gain access to information such as research data, fi nancial systems as well as staff and student personal information. But volume shouldnt be confused with effectiveness. Cybercriminal organizations that leverage ransomware continue to focus

46、 on the quality of their attacks over sheer quantity. Its no longer the size of the organization, but rather their likeliness to pay. Unfortunately, in 2019 that meant a number of highprofi le attacks against various state, provincial and local governments. More than 140 state and local governments

47、are reported to have been hit with ransomware in 2019, although the actual number is likely much higher. Another study stated that ransomware infected some 621 schools and hospitals through September 2019. The year saw ransomware attacks across the U.S. bring city services to a halt, including those

48、 in Arizona, Florida, Georgia, Indiana, Maryland, Nevada, New York, Texas and more. Larger organizations remain the most lucrative targets as they are more likely to pay higher sums of money for data restoration compared to the average end-user. Bitcoin remains the dominant currency for ransom payme

49、nts because of its anonymity (when used correctly). In a modern, citizen-centric environment, successful ransomware attacks are highly disruptive. Networks from city hall, law enforcement agencies, sanitation, courthouses or the DMV could be compromised in minutes and everyday operations held for ransom, often at exorbitant costs “ ” 29 RANSOMWARE TARGETS STATE, PROVINCIAL & LOCAL GOVERNMENTS In Australia, the head of the local intelligence agency was recruited to inform universities about

友情提示

1、下载报告失败解决办法
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站报告下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。

本文(2020年Sonicwall网络威胁报告 - SONICWALL(38页英文版).pdf)为本站 (Mercury) 主动上传,三个皮匠报告文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知三个皮匠报告文库(点击联系客服),我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。
客服
商务合作
小程序
服务号
会员动态
会员动态 会员动态:

wei**n_... 升级为标准VIP  157**73...  升级为高级VIP

art**r1...  升级为标准VIP  wei**n_...  升级为高级VIP

 139**23... 升级为标准VIP  wei**n_... 升级为至尊VIP 

wei**n_... 升级为至尊VIP  wei**n_... 升级为高级VIP 

七**  升级为高级VIP  134**20... 升级为标准VIP

wei**n_... 升级为至尊VIP    bai**in...  升级为至尊VIP

 wei**n_... 升级为标准VIP wei**n_...  升级为至尊VIP

  ray**19... 升级为高级VIP 136**33... 升级为高级VIP

 wei**n_...  升级为至尊VIP  wei**n_... 升级为至尊VIP 

网**...  升级为高级VIP  梦**...  升级为至尊VIP

wei**n_... 升级为至尊VIP wei**n_... 升级为标准VIP  

181**18...  升级为至尊VIP 136**69... 升级为标准VIP 

 158**27... 升级为至尊VIP  wei**n_...  升级为至尊VIP

wei**n_...  升级为至尊VIP 153**39... 升级为至尊VIP

152**23... 升级为高级VIP   152**23... 升级为标准VIP

wei**n_... 升级为标准VIP   姚哥  升级为至尊VIP

微**...  升级为标准VIP 182**73...  升级为高级VIP

wei**n_... 升级为标准VIP  138**94...   升级为标准VIP

wei**n_...  升级为至尊VIP  A**o 升级为至尊VIP 

134**12... 升级为标准VIP   wei**n_...  升级为标准VIP

 wei**n_... 升级为标准VIP  158**01...  升级为高级VIP 

 wei**n_... 升级为标准VIP 133**84...  升级为高级VIP

 wei**n_...  升级为标准VIP 周斌  升级为高级VIP

wei**n_... 升级为至尊VIP   182**06... 升级为高级VIP

  139**04... 升级为至尊VIP wei**n_...   升级为至尊VIP

Ke**in 升级为高级VIP   186**28...  升级为至尊VIP

  139**96... 升级为高级VIP she**nz...   升级为至尊VIP

wei**n_... 升级为高级VIP wei**n_... 升级为高级VIP

 wei**n_... 升级为标准VIP  137**19... 升级为至尊VIP 

419**13...  升级为标准VIP 183**33...   升级为至尊VIP

189**41...  升级为至尊VIP   张友  升级为标准VIP

奈**...  升级为标准VIP 186**99...  升级为至尊VIP

187**37...  升级为高级VIP 135**15... 升级为高级VIP  

  朱炜 升级为至尊VIP ja**r 升级为至尊VIP 

wei**n_... 升级为高级VIP  wei**n_...  升级为高级VIP 

崔**  升级为至尊VIP 187**09... 升级为标准VIP

 189**42... 升级为至尊VIP wei**n_... 升级为高级VIP 

 妙察  升级为标准VIP wei**n_...  升级为至尊VIP 

137**24...  升级为高级VIP  185**85... 升级为标准VIP

 wei**n_... 升级为高级VIP 136**40... 升级为标准VIP

 156**86... 升级为至尊VIP 186**28...   升级为标准VIP

 135**35... 升级为标准VIP  156**86...   升级为高级VIP

 wei**n_... 升级为至尊VIP wei**n_...  升级为高级VIP 

wei**n_... 升级为标准VIP  wei**n_...  升级为标准VIP 

wei**n_...  升级为高级VIP   138**87...  升级为高级VIP

185**51...   升级为至尊VIP 微**... 升级为至尊VIP

136**44... 升级为至尊VIP   183**89...  升级为标准VIP

 wei**n_... 升级为至尊VIP 8**的...  升级为至尊VIP

 Goo**ar... 升级为至尊VIP  131**21... 升级为至尊VIP 

139**02...  升级为标准VIP  wei**n_... 升级为高级VIP