In this quarter’s report, we delve into the intricate details of the ever-changing cybersecurity terrain, placing a special emphasis on the pervasive threat of phishing, which comprises approximately one-third of our reported incidents.
Throughout this landscape, we encounter an array of challenges, notably the exploitation of vulnerabilities like ‘Looney Tunables’ and Remote Code Execution issues. These trends underscore a discernible shift towards exploiting existing system weaknesses. Additionally, a rise in supply chain attacks unveils new strategic approaches employed by attackers.
In this quarter’s report, we delve into the intricate details of the ever-changing cybersecurity terrain, placing a special emphasis on the pervasive threat of phishing, which comprises approximately one-third of our reported incidents.
Throughout this landscape, we encounter an array of challenges, notably the exploitation of vulnerabilities like ‘Looney Tunables’ and Remote Code Execution issues. These trends underscore a discernible shift towards exploiting existing system weaknesses. Additionally, a rise in supply chain attacks unveils new strategic approaches employed by attackers.
Within the Windows domain, predominant threats encompass Stealers, Loaders, and Ransomware, with the latter wreaking havoc, particularly within the global healthcare sector.
The sophistication of these malware types has reached new heights, incorporating advanced evasion techniques such as domain join checks, Azure Active Directory connections, connected monitors, and larger RAM size expectations.
The Linux environment has witnessed noteworthy advancements, particularly in supply chain attacks targeting cryptocurrency realms. Concurrently, there has been a substantial surge in attacks on IoT devices with weaker security measures.
The intricate nature of Linux-based malware is further compounded by the diverse architectures of the targeted devices.
Cross-platform malware has not seen significant advancements, but a noteworthy surge in malware developed using Rust and Go languages has been observed. This poses challenges in manual reverse engineering processes.