New WatchGuard Threat Lab Report Finds Threat Actors Attempting to Turn Blockchains into Hosts of Malicious Content
Other key findings include surge of info-stealers and botnets, an increase in evasive malware and a rise in network attacks across the Asia Pacific
Posted: Wednesday, Oct 16
  • KBI.Media
  • $
  • New WatchGuard Threat Lab Report Finds Threat Actors Attempting to Turn Blockchains into Hosts of Malicious Content
New WatchGuard Threat Lab Report Finds Threat Actors Attempting to Turn Blockchains into Hosts of Malicious Content

SEATTLE โ€“ October 15, 2024 โ€“ WatchGuardยฎ Technologies, a global leader in unified cybersecurity, today released the findings of its latest Internet Security Report, a quarterly analysis detailing the top malware, network and endpoint security threats observed by WatchGuard Threat Lab researchers during the second quarter of 2024.

Among the reportโ€™s key findings was that 7 of the Top 10 malware threats by volume were new this quarter, indicating that threat actors are pivoting toward these techniques. The new top threats included Lumma Stealer, an advanced malware thatโ€™s designed to steal sensitive data from compromised systems; a Mirai Botnet variant, which infects smart devices and enables threat actors to turn them into remotely controlled bots; and LokiBot malware, which targets Windows and Android devices and aims to steal credential information.

The Threat Lab also observed new instances of threat actors employing โ€œEtherHiding,โ€ a method of embedding malicious PowerShell scripts in blockchains such as Binance Smart Contracts. In these instances, a fake error message linking to the malicious script appears on compromised websites, prompting victims to โ€œupdate their browser.โ€ Malicious code in blockchains poses a long-term threat, as blockchains are not meant to be changed and, theoretically, a blockchain could become an immutable host of malicious content.

โ€œThe latest findings in the Q2 2024 Internet Security Report reflect how threat actors tend to fall into patterns of behaviour, with certain attack techniques becoming trendy and dominant in waves,โ€ said Corey Nachreiner, chief security officer, WatchGuard Technologies. โ€œOur latest findings also illustrate the importance of routinely updating and patching software and systems to address security gaps and ensure threat actors cannot exploit older vulnerabilities. Adopting a defense-in-depth approach, which can be executed effectively by a dedicated managed service provider, is a vital step toward combating these security challenges successfully.โ€

Additional key findings from WatchGuardโ€™s Q2 2024 Internet Security Report include:

  • Malware detections were down 24% overall. This drop was caused by a 35% decrease in signature-based detections. However, threat actors were simply shifting focus to more evasive malware. In Q2 2024, the Threat Labโ€™s advanced behavioral engine that identifies ransomware, zero-day threats and evolving malware threats, found a 168% increase in evasive malware detections quarter-over-quarter.
  • Network attacks increased 33% from Q1 2024. Across regions, the Asia Pacific accounted for 56% of all network attack detections, more than doubling since the previous quarter.
  • An NGINX vulnerability, originally detected in 2019, was the top network attack by volume in Q2 2024, though it had not appeared in the Threat Labโ€™s Top 50 network attacks in previous quarters. The vulnerability accounted for 29% of total network attack detection volume, or approximately 724,000 detections across the U.S., EMEA and APAC.
  • The Fuzzbunch hacking toolkit emerged as the second-highest endpoint malware threat detected by volume. The toolkit, which serves as an open-source framework that can be used to attack Windows operating systems, was stolen during The Shadow Brokersโ€™ attack of the Equation Group, an NSA contractor, in 2016.
  • Seventy-four percent of all browser-initiated endpoint malware attacks targeted Chromium-based browsers, which include Google Chrome, Microsoft Edge and Brave
  • A signature that detects malicious web content, trojan.html.hidden.1.gen, came in as the fourth-most widespread malware variant. The most common threat category caught by this signature involved phishing campaigns that gather credentials from a userโ€™s browser and deliver this information to an attacker-controlled server. Curiously, the Threat Lab observed a sample of this signature targeting students and faculty at Valdosta State University in Georgia.

Consistent with WatchGuardโ€™s Unified Security Platformยฎ approach and the WatchGuard Threat Labโ€™s previous quarterly research updates, the data analysed in this quarterly report is based on anonymised, aggregated threat intelligence from active WatchGuard network and endpoint products whose owners have opted to share in direct support of WatchGuardโ€™s research efforts.

For a more in-depth view of WatchGuardโ€™s research, download the complete Q2 2024 Internet Security Report here: https://www.watchguard.com/wgrd-resource-center/security-report-q2-2024

 

About WatchGuard Technologies, Inc.

WatchGuardยฎ Technologies, Inc. is a global leader in unified cybersecurity. Our Unified Security Platformยฎ approach is uniquely designed for managed service providers to deliver world-class security that increases their business scale and velocity while also improving operational efficiency. Trusted by more than 17,000 security resellers and service providers to protect more than 250,000 customers, the companyโ€™s award-winning products and services span network security and intelligence, advanced endpoint protection, multi-factor authentication, and secure Wi-Fi. Together, they offer five critical elements of a security platform: comprehensive security, shared knowledge, clarity & control, operational alignment, and automation. The company is headquartered in Seattle, Washington, with offices throughout North America, Europe, Asia Pacific, and Latin America. To learn more, visit WatchGuard.com.

For additional information, promotions and updates, follow WatchGuard on Twitter (@WatchGuard), on Facebook, or on the LinkedIn Company page. Also, visit our InfoSec blog, Secplicity, for real-time information about the latest threats and how to cope with them at www.secplicity.org. Subscribe to The 443 โ€“ Security Simplified podcast at Secplicity.org, or wherever you find your favorite podcasts.

WatchGuard is a registered trademark of WatchGuard Technologies, Inc. All other marks are property of their respective owners.

Share This