Read Time:1 Minute, 51 Second

A new report from Trend Micro revealed a significant increase in cyber threat detections in 2022. The report shows a 55% global increase in overall threat detections and a 242% surge in blocked malicious files.

Threat actors indiscriminately targeted consumers and organisations across all sectors. Mick McCluney, Technical Director, ANZ at Trend Micro, stated, “2022 was a year when threat actors went ‘all-in’ to boost profits.”

“A surge in backdoor detections is particularly concerning in showing us their success in making landfall inside networks. To manage risk effectively across a rapidly expanding attack surface, stretched security teams need a more streamlined, platform-based approach.”

The report highlights several intriguing trends for 2022 and beyond. The top three MITRE ATT&CK techniques showed that threat actors gain initial access through remote services and then expand their footprint within the environment through credential dumping to utilise valid accounts. 

With a 116% spike in backdoor malware detections from 2021, Australia had the fifth-highest malware detections of all the countries surveyed in the research. This shows that threat actors attempt to keep a presence inside networks in preparation for upcoming strikes.

Ransomware groups rebranded and diversified to address diminishing profitability. Webshells were the most widely discovered malware worldwide in 2018, up 103% from 2021. Trend Micro forecasts ransomware groups will migrate into adjacent fields that monetize initial access, such as stock fraud, business email compromise, money laundering, and cryptocurrency theft.

Trend Micro recommends that organisations adopt a platform-based approach to managing their cyber-attack surface, mitigate security skills shortages and coverage gaps, and minimise the costs associated with point solutions. This should include asset management, cloud security, and attack surface visibility.

The report emphasises the importance of examining assets, determining their criticality, potential vulnerabilities, threat activity level, and how much threat intelligence is being gathered from the asset. It also recommends that organisations ensure their cloud infrastructure is configured with security in mind to prevent attackers from capitalising on known gaps and vulnerabilities.

Lastly, it suggests that organisations prioritise updating software as soon as possible to minimise the exploitation of vulnerabilities and monitor disparate technologies and networks within the organisation and any security system that protects them.

Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %
Previous post Sydney Couple Loses $100,000 Life Savings in a Scam
Next post RMIT University Researcher Develops New Approach to Enhance Iot Security for Space Information Networks