Trend Micro annual roundup report warns of exponentially expanding attack surface
Bengaluru, March 29, 2023 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced a massive 55% increase in overall threat detections in 2022 and a 242% surge in blocked malicious files, as threat actors indiscriminately targeted consumers and organizations across all sectors.
Jon Clay, VP of threat intelligence at Trend Micro said, "The unrivaled breadth of Trend Micro threat intelligence* reveals 2022 as a year when threat actors went 'all-in' to boost profits. A surge in backdoor detections is particularly concerning in showing us their success in making landfall inside networks. To manage risk effectively across a rapidly expanding attack surface, stretched security teams need a more streamlined, platform-based approach."
The roundup report reveals several interesting trends for 2022 and beyond:
The top three MITRE ATT&CK techniques show us that threat actors are gaining initial access through remote services, then expanding their footprint within the environment through credential dumping to utilize valid accounts.
An 86% increase in backdoor malware detections reveals threat actors trying to maintain their presence inside networks for a future attack. These backdoors primarily targeted web server platform vulnerabilities.
India experienced approximately 7 lakh malware attacks in 2022, up from 6.5 lakh in 2021, with the banking sector being the most vulnerable to these attacks, totalling 44,949 incidents. However, there was a slight decline in the number of malware detections across the six critical sectors, indicating that appropriate measures are being taken.
A record number of Zero Day Initiative (ZDI) advisories (1,706) for the third year in a row is the result of a rapidly expanding corporate attack surface and researcher investment in automated analysis tools, which are finding more bugs. The number of critical vulnerabilities doubled in 2022. Two out of the top three CVEs reported in 2022 were related to Log4j.
The ZDI observed an increase in failed patches and confusing advisories, adding extra time and money to corporate remediation efforts and exposing organizations to unnecessary cyber risk.
Webshells were the top-detected malware of the year, surging 103% on 2021 figures. Emotet detections were second after undergoing something of a resurgence. LockBit and BlackCat were the top ransomware families of 2022.
Ransomware groups rebranded and diversified in a bid to address declining profits. In the future, we expect these groups to move into adjacent areas that monetize initial access, such as stock fraud, business email compromise (BEC), money laundering, and cryptocurrency theft.
Vijendra Katiyar, Country manager for India & SAARC, Trend Micro said, "The Trend Micro Annual Cybersecurity Report 2022 has highlighted some concerning trends specific to India, as cyber threats continue to evolve and pose significant risks to organizations. The report reveals a 16% increase in malware attacks, underscoring the need for ongoing vigilance and collaboration to safeguard critical industries such as banking, government, and manufacturing. While the adoption of security measures has led to a drop in malware detections across the six critical sectors, it is important to recognize that the threat landscape is constantly changing. The report emphasizes the importance of a multi-layered cybersecurity approach, including proactive threat hunting, security awareness training, and investment in advanced security technologies. Trend Micro is committed to working with its customers to ensure they remain protected and resilient against the latest cyber threats."
Trend Micro recommends that organizations adopt a platform-based approach to managing the cyber-attack surface, mitigate security skills shortages and coverage gaps, and minimize the costs associated with point solutions. This should cover the following:
- Asset management. Examine assets and determine their criticality, any potential vulnerabilities, the level of threat activity, and how much threat intelligence is being gathered from the asset.
- Cloud security. Ensure that cloud infrastructure is configured with security in mind to prevent attackers from capitalizing on known gaps and vulnerabilities.
- Proper security protocols. Prioritize updating software as soon as possible to minimize the exploitation of vulnerabilities. Options such as virtual patching can help organizations until vendors provide official security updates.
- Attack surface visibility. Monitor disparate technologies and networks within the organization, as well as any security system that protects them. It may be difficult to correlate different data points from siloed sources.
* It covers endpoints (Android & iOS, IoT, IIoT, PCs, Macs, Linux, servers), email, web and network layers, OT networks, cloud, home networks, vulnerabilities, consumers, businesses, and governments globally.
*Disclamier: "The pages slugged ‘Press Release’ are equivalent to advertisements and are not written and produced by Success Insights India Media journalists/Editorial." We do not hold any copyrights towards the content or image. Image source: Newswire