{"id":10465,"date":"2021-03-17T06:17:38","date_gmt":"2021-03-17T06:17:38","guid":{"rendered":"https:\/\/web3unplugged.io\/blog\/?p=10465"},"modified":"2021-03-17T06:17:40","modified_gmt":"2021-03-17T06:17:40","slug":"29-of-cyber-threats-previously-unknown-hp-research-finds","status":"publish","type":"post","link":"https:\/\/web3unplugged.io\/blog\/29-of-cyber-threats-previously-unknown-hp-research-finds\/","title":{"rendered":"29% Of Cyber Threats Previously Unknown, HP Research Finds"},"content":{"rendered":"\n<p>HP Inc. (NYSE: HPQ) released its new Quarterly Threat Insights Report, providing analysis of real-world attacksagainst customers worldwide. <a>The report found that 29% of malware captured was previously unknown*\u2013due to the widespread use of packers and obfuscation techniques by attackers seeking to evade detection.88% of malware was delivered by email into users\u2019 inboxes, in many cases having bypassed gateway filters.It took 8.8 days, on average, for threats to become known by hash to antivirus engines \u2013 giving hackers over a week\u2019s \u2018head-start\u2019 to further their campaigns.<\/a><\/p>\n\n\n\n<p>The report provides a unique glimpse into the behavior of malware in the wild, as \u2013 unlike other endpoint security tools, which aim to prevent or intervene in an attack \u2013 HP SureClick lets malware run, tricking malware into executing, while capturing afull infection chain within isolated, micro-virtual machines. This hardware-enforced approach to security renders malware harmless and keeps customers safe.<\/p>\n\n\n\n<p>\u201cThis report highlights the deficiencies in traditional defenses that rely on detection to block malware,\u201d said Dr. Ian Pratt, Global Head of Security for Personal Systems at HP Inc. \u201cAttackers have repeatedly found new ways to bypass traditional detection-based tools, making it more important than ever for organizations to build zero-trust design principles into their security architecture.\u201d<\/p>\n\n\n\n<p>Notable threatsisolated by HP Sure Click included:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Web Browser exploits leadingto FickerStealer<\/strong>: Amalware campaign that relied on misspelled domains of popular instant messaging services. Visitors were redirected to RigEK landing pages that attempted to exploit web browser and plugin vulnerabilities to infect visitors\u2019 PCs withinformation-stealing malware called FickerStealer.<\/li><li><strong>Delivery-themed lures tempting users into letting the RATs in<\/strong><strong>: <\/strong>A new Office malware builder called APOMacroSploitwas used to target victims in delivery-themed spam campaigns, tricking them into opening weaponized XLS attachments, ultimately leading to the BitRAT remote access Trojan being deployed ontheir computers.<\/li><li><strong>The return of ZLoader:<\/strong>An increase in ZLoader banking Trojan activity, using a combination of techniques \u2013 including Word documents masquerading as pharmaceutical invoices that <a>run malicious <\/a>macros only after the document has been closed.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>The art of misdirection through DOSfuscation:<\/strong>Emotet\u2019s final burst of activity before its takedown in January 2021saw its operators modify the downloader using DOSfuscation techniquesto make its obfuscation more complex. The downloader also generated an error messagewhen opened, helping to avoid suspicion from users when the malicious documents didn\u2019t behave as expected.<\/li><li><strong>Email threadhijacking of government targets:<\/strong>HP Sure Click stopped email thread hijacking attacks against government organizations in Central America, where stolen email data was used to craft convincing phishing lures to distribute Emotet.<\/li><\/ul>\n\n\n\n<p>\u201cOpportunistic cybercrime does not show any signs of slowing,\u201dcomments Alex Holland, senior malware analyst at HP Inc.\u201cCybercriminals are exploitinglow-cost malware-as-a-service kits, which areproliferating in underground forums. Kits like APOMacroSploit, which emerged in Q4 2020, can be bought for as little as $50 USD,illustrating just how low the barrier to entry is for opportunistic cybercrime. We have also seen threat actors continue to experiment with malware delivery techniques to improve their chances of establishing footholds into networks. The most effectiveexecution techniques wesaw in Q4 2020involved oldtechnologies like Excel 4.0 macros that often offer little visibility to detection tools.\u201d<\/p>\n\n\n\n<p>Other key findings in the report include:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Trojans made up 66% of malware samples analyzed, driven largely by malicious spam campaigns distributing Dridex malware, which a <a href=\"https:\/\/threatresearch.ext.hp.com\/dridex-malicious-document-analysis-automating-the-extraction-of-payload-urls\/\">recent HP blog<\/a> flagged as having increased in prevalence by 239%.<\/li><li>88% of malware detected was delivered via email \u2013 with the most common lures being fake invoice attachments \u2013 while web downloads were responsible for the remaining 12%.<\/li><li>The mostcommon type of malicious attachments were: documents (31%), archive files (28%), spreadsheets (19%) and executable files (17%).<\/li><li>Malicious executables rose by 12%, with CVE-2017-11882 \u2013 a memory corruption flaw in Microsoft Office\u2019s Equation Editor \u2013 accounting for nearly three-quarters of the exploits isolated by HP Sure Click.<\/li><li>A 12% growth in malware that exploits CVE-2017-0199, which is commonly used to run malicious scripts to deploy malware when a user opens an Office document.<\/li><\/ul>\n\n\n\n<p>\u201cQ4 saw attackersshiftfrom Word documents to executable files to deliver RATs. There was an uptick in malicious email campaigns targeting German users with Agent Tesla and Formbook RATs that were delivered as executables attached to emails,\u201d continued Holland. \u201cThe largest rise was in Dridex campaigns,which aretypically used by attackers todeployransomware. Ultimately, any attacker gaining a foothold on an endpoint is bad news \u2013 they can use this access to scrape credentials, move laterally between systems, exfiltrate data, or sell their access to other cybercriminals \u2013 so it creates huge risk for businesses.\u201d<\/p>\n\n\n\n<p>\u201cFor every new malware variant hackerscreate, theyhave a few days\u2019 head start to capitalize on their campaigns, infecting machines before detection tools catch-up.With automation, this process is now easier than ever.\u201d continues Dr. Pratt.<\/p>\n\n\n\n<p>\u201cTrying to detect every threat is futile, as something will always slip through the net,\u201d Pratt added. \u201cThe best cyber defense is being able toisolate risks on the endpoint through micro-virtualization. This kind of hardware-enforced isolationremoves the opportunity for malware to cause harm to the host PC \u2013 even from novel malware \u2013because it does not rely on a detect-to-protect security model.By having security built in at the hardware level, endpoint devices can help to defend users and recover from attacks automatically, improving business resiliency. This way, businesses can carry on doing what they do best, safe in the knowledge that their users and data are protected.\u201d<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"693\" height=\"1024\" src=\"https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/03\/Untitled-1-1-693x1024.jpg\" alt=\"\" class=\"wp-image-10466\"\/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>HP Inc. (NYSE: HPQ) released its new Quarterly Threat Insights Report, providing analysis of real-world attacksagainst customers worldwide. The report found that 29% of malware captured was previously unknown*\u2013due to the widespread use of packers and obfuscation techniques by attackers seeking to evade detection.88% of malware was delivered by email into users\u2019 inboxes, in many [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":10467,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-10465","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"rttpg_featured_image_url":{"full":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/03\/Untitled-2-1.jpg",900,1295,false],"landscape":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/03\/Untitled-2-1.jpg",900,1295,false],"portraits":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/03\/Untitled-2-1.jpg",900,1295,false],"thumbnail":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/03\/Untitled-2-1-150x150.jpg",150,150,true],"medium":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/03\/Untitled-2-1-208x300.jpg",208,300,true],"large":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/03\/Untitled-2-1-712x1024.jpg",712,1024,true],"1536x1536":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/03\/Untitled-2-1.jpg",900,1295,false],"2048x2048":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/03\/Untitled-2-1.jpg",900,1295,false],"post-thumbnail":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/03\/Untitled-2-1.jpg",292,420,false],"graptor-sq-xs":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/03\/Untitled-2-1.jpg",69,100,false]},"rttpg_author":{"display_name":"admin","author_link":"https:\/\/web3unplugged.io\/blog\/author\/admin\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/web3unplugged.io\/blog\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","rttpg_excerpt":"HP Inc. (NYSE: HPQ) released its new Quarterly Threat Insights Report, providing analysis of real-world attacksagainst customers worldwide. The report found that 29% of malware captured was previously unknown*\u2013due to the widespread use of packers and obfuscation techniques by attackers seeking to evade detection.88% of malware was delivered by email into users\u2019 inboxes, in many&hellip;","_links":{"self":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts\/10465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/comments?post=10465"}],"version-history":[{"count":1,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts\/10465\/revisions"}],"predecessor-version":[{"id":10468,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts\/10465\/revisions\/10468"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/media\/10467"}],"wp:attachment":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/media?parent=10465"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/categories?post=10465"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/tags?post=10465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}