• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

Cybersecurity Market

Cybersecurity Technologies & Markets

  • Cyber Security Events 2023-2024
  • Market Reports
  • Sponsored Post
  • Make a Contribution
  • About
  • Contact

IBM X-Force: Stolen Credentials and Vulnerabilities Weaponized Against Businesses in 2019

February 11, 2020 By admin

Consumer Tech Brands Caught in Crossfire of Phishing Attacks; Misconfigurations Accounted for Over 85% of Exposed Records; Banking Trojans and Ransomware Form Strong Bond

IBM (NYSE: IBM) Security today released the IBM X-Force Threat Intelligence Index 2020, highlighting how cybercriminals’ techniques have evolved after decades of access to tens of billions of corporate and personal records and hundreds of thousands of software flaws. According to the report, 60% of initial entries into victims’ networks that were observed leveraged either previously stolen credentials or known software vulnerabilities, allowing attackers to rely less on deception to gain access.

IBM’s X-Force Threat Intelligence Index highlights contributing factors to this evolution, including the top three initial attack vectors:

Phishing was a successful initial infection vector in less than one-third of incidents (31%) observed, compared to half in 2018.
Scanning and exploitation of vulnerabilities resulted in 30% of observed incidents, compared to just 8% in 2018. In fact, older, known vulnerabilities in Microsoft Office and Windows Server Message Block were still finding high rates of exploitation in 2019.
The use of previously stolen credentials is also gaining ground as a preferred point-of-entry 29% of the time in observed incidents. Just in 2019, the report states more than 8.5 billion records were compromised— resulting in a 200% increase in exposed data reported year over year, adding to the growing number of stolen credentials that cybercriminals can use as their source material.
“The amount of exposed records that we’re seeing today means that cybercriminals are getting their hands on more keys to our homes and businesses. Attackers won’t need to invest time to devise sophisticated ways into a business; they can deploy their attacks simply by using known entities, such as logging in with stolen credentials,” said Wendi Whitmore, Vice President, IBM X-Force Threat Intelligence. “Protection measures, such as multi-factor authentication and single sign-on, are important for the cyber resilience of organizations and the protection and privacy of user data.”

IBM X-Force conducted its analysis based on insights and observations from monitoring 70 billion security events per day in more than 130 countries. In addition, data is gathered and analyzed from multiple sources including X-Force IRIS, X-Force Red, IBM Managed Security Services, and publicly disclosed data breach information. IBM X-Force also runs thousands of spam traps around the world and monitors tens of millions of spam and phishing attacks daily while analyzing billions of web pages and images to detect fraudulent activity and brand abuse.

Some of the report’s key highlights include:

Configure it Out —IBM’s analysis found that of the more than 8.5 billion breached records reported in 2019, seven billion of those, or over 85%, were due to misconfigured cloud servers and other improperly configured systems — a stark departure from 2018 when these records made up less than half of total records.
Banking on Ransomware — Some of the most active banking trojans found in this year’s report, such as TrickBot, were increasingly observed to set the stage for full-on ransomware attacks. In fact, novel code used by banking trojans and ransomware topped the charts compared to other malware variants discussed in the report.
Tech Trust Takeover for Phishing — The IBM X-Force report found that tech, social media and content streaming household brands make up the “Top 10” spoofed brands that cyber attackers are impersonating in phishing attempts. This shift could demonstrate the increasing trust put in technology providers over historically trusted retail and financial brands. Top brands used in squatting schemes include Google, YouTube and Apple.
Ransomware Attacks Evolve

The report revealed trends in ransomware attacks worldwide, targeting both the public and private sectors. The report shows an uptick in ransomware activity in 2019 with IBM X-Force deploying its incident response team to ransomware incidents in 13 different industries worldwide, reaffirming that these attacks are industry agnostic.

While over 100 U.S. government entities were impacted by ransomware attacks last year, IBM X-Force also saw significant attacks against retail, manufacturing and transportation —which are known to either hold a surplus of monetizable data or rely on outdated technology and, thus, face the vulnerability sprawl. In fact, in 80% of observed ransomware attempts, attackers were exploiting Windows Server Message Block vulnerabilities, the same tactic used to propagate WannaCry, an attack that crippled businesses across 150 countries in 2017.

With ransomware attacks costing organizations over $7.5 billion in 2019, adversaries are reaping the rewards and have no incentive to slow down in 2020. In collaboration with Intezer, IBM’s report states that new malware code was observed in 45% of banking trojans and 36% of ransomware. This suggests that by creating new code attackers are continuing to invest in efforts to avoid detection.

Concurrently, IBM X-Force observed a strong relationship between ransomware and banking trojans with the latter being used to open the door for targeted, high-stakes ransomware attacks, diversifying how ransomware is being deployed. For example, the most active financial malware according to the report, TrickBot, is suspected of deploying Ryuk on enterprise networks, while various other banking trojans, such as QakBot, GootKit and Dridex are also diversifying to ransomware variants.

Adversaries Spoof Tech and Social Media Companies in Phishing Schemes

As consumers become more aware of phishing emails, phishing tactics themselves are becoming more targeted. In collaboration with Quad9, IBM observed a squatting trend in phishing campaigns, wherein attackers are impersonating consumer tech brands with tempting links – using tech, social media and content streaming companies to trick users into clicking malicious links in phishing attempts.

Nearly 60% of the top 10 spoofed brands identified were Google and YouTube domains, while Apple (15%) and Amazon (12%) domains were also spoofed by attackers looking to steal users’ monetizable data. IBM X-Force assesses that these brands were targeted primarily due to the monetizable data they hold.

Facebook, Instagram and Netflix also made the list of top 10 spoofed brands observed but at a significantly lower use rate. This may be due to the fact that these services don’t typically hold directly monetizable data. As attackers often bet on credential reuse to gain access to accounts with more lucrative payouts, IBM X-Force suggests that frequent password reuse may be what potentially made these brands targets. In fact, IBM’s Future of Identity Study found that 41% of millennials surveyed reuse the same password multiple times and Generation Z averages use of only five passwords, indicating a heavier reuse rate.

Discerning spoofed domains can be extremely difficult, which is exactly what attackers bet on. With nearly 10 billion accounts combined1, the top 10 spoofed brands listed in the report offer attackers a wide target pool, increasing the likelihood that an unsuspecting user clicks an innocent-seeming link from a spoofed brand.

Additional key findings in the report include:

Retail Rebounds in Targeted Industry Rankings: Retail has jumped to the second most attacked industry in this year’s report, in a very close race with financial services which remained at the top for the fourth year in a row. Magecart attacks are among the most prominent attacks observed against retail, impacting a reported 80 e-commerce sites in the summer of 2019. Cybercriminals seem to have set their sights on consumers’ PII, payment card data and even valuable loyalty program information. Retailers also experienced a large amount of ransomware attacks based on insights from IBM’s incident response engagements.
Industrial Control Systems (ICS) and Operational Technology (OT) Attacks Soar: In 2019, OT targeting increased 2000% year over year with more attacks on ICS and OT infrastructure than any of the prior three years. Most observed attacks involved a combination of known vulnerabilities within SCADA and ICS hardware as well as password-spraying.
North America and Asia — Most Targeted Regions: These regions experienced the highest number of observed attacks as well as suffered the largest reported data losses over the past year, over 5 billion and 2 billion records exposed respectively.
The report features data IBM collected in 2019 to deliver insightful information about the global threat landscape and inform security professionals about the threats most relevant to their organizations. To download a copy of the IBM X-Force Threat Intelligence Index 2020, please visit: https://ibm.biz/downloadxforcethreatindex

Sign up for the IBM X-Force Threat Intelligence Index 2020 webinar on Tuesday, February 18, 2020 at 11:00 a.m. ET: https://ibm.biz/BdqExS

SOURCE: IBM

Filed Under: Cybersecurity Market Tagged With: IBM X-Force, Stolen Credentials, Vulnerabilities

Primary Sidebar

Market Analysis

How insurers thrive in a turbulent market
Leveraging Artificial Intelligence to Drive Cost Savings and Productivity in Uncertain Times
The shipping industry is undergoing a significant change with the influx of new vessels arriving just as the growth of trade is beginning to slow down
Climate change is increasingly affecting the production of beer ingredients
Unfulfilled Dreams: The Aftermath of China’s Stalled Real Estate Developments
Huawei on the Brink: Biden Administration Considers Cutting Off the Tech Giant”
Key Fire Industry Trends for 2023

Market Research Media

Streaming video, training, and gaming coming together to form a cohesive and diverse media and entertainment ecosystem
Turn Your Story into a Game: The Art of Gamifying Your Plot
The end of cheap money is redrawing the map of corporate earnings
The Future of Virtual Reality: How VR is Changing Industries
Market Research Media Survey: The State of Streaming Services
Media measurement services provide a holistic view of cross-media consumption
Gen Z ranks top in luxury sales

Secondary Sidebar

Technologies

The low tech unemployment rate and hiring activity confirms the long-term demand for tech talent
Virgin Orbit and SatRev Sign Launch Services Agreement
Harnessing the Power of Innovation for a Better Tomorrow
Breaking Down Silos: The Need for Cross-Sector Collaboration in Tackling Global Challenges
The SPIE Prism Awards recognized the best new optics and photonics products

Venture Capital

Gradient, a company specializing in eco-friendly heating and cooling solutions, has raised $18 million in a Series A funding round
The Importance of Diversity and Inclusion in the Workplace
Sequoia Capital announces its $195 Mln dedicated seed fund
Sublime Systems Secures $40 Million Series A to Electrify and Scale Decarbonized Cement Production
actyv.ai Raises Pre-Series A Funding to Fuel Global Expansion, Product Enhancement

Footer

Recent Posts

  • The Barcelona Cybersecurity Congress, 31 JANUARY – 2 FEBRUARY 2023, BARCELONA – GRAN VIA VENUE
  • Cybertech 2023 in Tel Aviv: Day 2, January 31, 2023
  • Protecting Your Privacy: A Look at the State of GDPR in the EU
  • Cybertech 2023 in Tel Aviv: Day 1, January 30, 2023
  • Identity has become the new attack surface
  • The Cybersecurity Risks of Automated Tutoring in Higher Education
  • The Cybersecurity Landscape in the Era of 5G: Challenges and Opportunities
  • The Hidden Dangers of Public USB Charging Ports: How to Protect Your Devices
  • How to encrypt and decrypt text messages with ChatGPT
  • The Impact of Artificial Intelligence on Cybersecurity

ESN

H&M USA To Host National Hiring Day On June 24th
Datadog’s Dash Conference, October 18-19 2022, Javis Center, NYC
INE Hosts RedefINE 2021, June 7-9
ISG Sourcing Industry Conference, September 26-28, 2022, The Westin Dallas Stonebriar Golf Resort & Spa
Upcoming Reuters Events: Data-Driven Oil & Gas 2021 (June 14-15), Global Energy Transition (June 21-25)

Calendarial

2022 South Carolina Manufacturing Conference and Expo, November 3-4, 2022, Greenville Convention Center, Greenville, South Carolina
World Day for Audiovisual Heritage, October 27
The seventh IOT Solutions World Congress kicks off next Tuesday at the Gran Via venue
The Global IP Europe Exchange, 13-14 March 2023, Berlin
U.S. Hosts 86th IEC General Meeting in San Francisco, October 31-November 4

Tech Events

Cybersecurity Innovations Take Center Stage at Cybertech 2023 in Tel Aviv
AI Week 2022: Call for Talks, February 7-9 2022, Tel Aviv University
SIGGRAPH 2022 Hybrid Conference Enjoys Notable Numbers with In-Person and Virtual Attendees
Tech Conference Line Developer Day 2021, November 10-11, 2021
DesignCon 2022, April 5-7, 2022, Santa Clara Convention Center, Santa Clara, CA

Event Calendar

2021 Taiwan Innotech Expo focuses on the tech highlights of six key sectors
Sea Asia, Asia’s anchor maritime and offshore event, 21-23 September 2021, Marina Bay Sands, Singapore
Cultivate’22, July 17-19, 2022, Columbus, Ohio
AHR Expo, the largest HVAC event in North America, February 6-8 2023, Atlanta, Georgia
IFA 2020 Special Edition, a global leading trade fair for consumer electronics, September 3-5, 2020, Berlin

Copyright © 2022 CybersecurityMarket.com

Technologies, Market Analysis & Market Research

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT