WatchGuard Threat Lab Analysis Shows Surge in Evasive Malware Supercharging an Already Powerful Threat Wave
Notable findings from the research also show resurgence of living-off-the-land attacks, continued cyberattack commoditisation, and ransomware decline
Posted: Thursday, Mar 28
  • KBI.Media
  • $
  • WatchGuard Threat Lab Analysis Shows Surge in Evasive Malware Supercharging an Already Powerful Threat Wave
WatchGuard Threat Lab Analysis Shows Surge in Evasive Malware Supercharging an Already Powerful Threat Wave

SYDNEY โ€“ March 28, 2024 โ€“ WatchGuardยฎ Technologies, a global leader in unified cybersecurity, today announced the findings of its latest Internet Security Report, detailing the top malware trends and network and endpoint security threats analysed by WatchGuard Threat Lab researchers. Key findings from the data show a dramatic surge in evasive malware that fuelled a large increase of total malware, threat actors targeting on-premises email servers as prime targets to exploit, and ransomware detections continuing to decline, potentially as a result of law enforcementโ€™s international takedown efforts of ransomware extortion groups.

โ€œThe Threat Labโ€™s latest research shows threat actors are employing various techniques as they look for vulnerabilities to target, including in older software and systems, which is why organisations must adopt a defense-in-depth approach to protect against such threats,โ€ said Corey Nachreiner, chief security officer at WatchGuard. โ€œUpdating the systems and software on which organisations rely is a vital step toward addressing these vulnerabilities. Additionally, modern security platforms that are operated by managed service providers can deliver the comprehensive, unified security that organisations need and enable them to combat the latest threats.โ€

Among the key findings, the latest Internet Security Report featuring data from Q4 2023 showed:

  • Evasive, basic, and encrypted malware all increased in Q4, fuelling a rise in total malware. The average malware detections per Firebox rose 80% from the previous quarter, illustrating a substantial volume of malware threats arriving at the network perimeter. Geographically, most of the increased malware instances affected the Americas and Asia-Pacific.
  • TLS and zero-day malware instances also rise. Approximately 55% of malware arrived over encrypted connections, which was a 7% increase from Q3. Zero-day malware detections jumped to 60% of all malware detections, up from 22% the previous quarter. However, zero-day malware detections with TLS fell to 61%, which was a 10% decrease from Q3, showing the unpredictability of malware in the wild.
  • Two top 5 malware variants redirect to DarkGate network. Among the top 5 most-widespread malware detections were JS.Agent.USF and Trojan.GenericKD.67408266. Both variants redirect users to malicious links, and both malware loaders attempt to load DarkGate malware on the victimโ€™s computer.
  • A surge in living-off-the-land techniques. Q4 showed a resurgence in script-based threats, as scripts rose the most as an endpoint attack vector, with threats detected increasing 77% from Q3. PowerShell was the top attack vector that the Threat Lab saw hackers use on endpoints. Browser-based exploits also rose significantly, increasing 56%.
  • Four of the top 5 most-widespread network attacks were Exchange server attacks. These attacks are specifically associated with one of the ProxyLogon, ProxyShell, and ProxyNotShell exploits. A ProxyLogon signature that first appeared in the top 5 most-widespread network attacks in Q4 2022 at number 4 and rose to number 2 in Q4 2023. These attacks illustrate the need to reduce reliance on on-premises email servers to mitigate security threats.
  • Cyberattack commoditisation continues, trending toward โ€œvictim-as-a-serviceโ€ offerings. Glupteba and GuLoader were once again counted among the top 10 most prevalent endpoint malware in Q4, making a return as two of the most prolific variants analysed during the quarter. Glupteba is worth noting as a particularly formidable and sophisticated adversary, due in part to its prevalence targeting victims on a global scale. A multi-faceted malware-as-a-service (MaaS), Gluptebaโ€™s malicious capabilities include downloading additional malware, masquerading as a botnet, stealing sensitive information, and mining cryptocurrency with tremendous stealth.
  • Takedown efforts stifling ransomware extortion groups. Once again in Q4, the Threat Lab reported a decline in ransomware detections compared to the previous quarter โ€“ observing a 20% decrease in overall volume for the last three months of 2023. WatchGuardโ€™s threat analysts also noted a decline in public ransomware breaches and attribute this trend to law enforcementโ€™s ongoing takedown efforts of ransomware extortion groups.

Consistent with WatchGuardโ€™s Unified Security Platformยฎ approach and the WatchGuard Threat Labโ€™s previous quarterly research updates, the data analysed in this quarterly report is based on anonymised, aggregated threat intelligence from active WatchGuard network and endpoint products whose owners have opted to share in direct support of WatchGuardโ€™s research efforts.

For a more in-depth view of WatchGuardโ€™s research, download the complete Q4 2023 Internet Security Report here: https://www.watchguard.com/wgrd-resource-center/security-report-q4-2023

About WatchGuard Technologies, Inc.

WatchGuardยฎ Technologies, Inc. is a global leader in unified cybersecurity. Our Unified Security Platformยฎ approach is uniquely designed for managed service providers to deliver world-class security that increases their business scale and velocity while also improving operational efficiency. Trusted by more than 17,000 security resellers and service providers to protect more than 250,000 customers, the companyโ€™s award-winning products and services span network security and intelligence, advanced endpoint protection, multi-factor authentication, and secure Wi-Fi. Together, they offer five critical elements of a security platform: comprehensive security, shared knowledge, clarity & control, operational alignment, and automation. The company is headquartered in Seattle, Washington, with offices throughout North America, Europe, Asia Pacific, and Latin America. To learn more, visit WatchGuard.com.

For additional information, promotions and updates, follow WatchGuard on Twitter (@WatchGuard), on Facebook, or on the LinkedIn Company page. Also, visit our InfoSec blog, Secplicity, for real-time information about the latest threats and how to cope with them at www.secplicity.org. Subscribe to The 443 โ€“ Security Simplified podcast at Secplicity.org, or wherever you find your favourite podcasts.

WatchGuard is a registered trademark of WatchGuard Technologies, Inc. All other marks are property of their respective owners.

Share This