A new report from Trend Micro revealed a significant increase in cyber threat detections in 2022. The report shows a 55% global increase in overall threat detections and a 242% surge in blocked malicious files.
Threat actors indiscriminately targeted consumers and organisations across all sectors. Mick McCluney, Technical Director, ANZ at Trend Micro, stated, “2022 was a year when threat actors went ‘all-in’ to boost profits.”
“A surge in backdoor detections is particularly concerning in showing us their success in making landfall inside networks. To manage risk effectively across a rapidly expanding attack surface, stretched security teams need a more streamlined, platform-based approach.”
The report highlights several intriguing trends for 2022 and beyond. The top three MITRE ATT&CK techniques showed that threat actors gain initial access through remote services and then expand their footprint within the environment through credential dumping to utilise valid accounts.
With a 116% spike in backdoor malware detections from 2021, Australia had the fifth-highest malware detections of all the countries surveyed in the research. This shows that threat actors attempt to keep a presence inside networks in preparation for upcoming strikes.
Ransomware groups rebranded and diversified to address diminishing profitability. Webshells were the most widely discovered malware worldwide in 2018, up 103% from 2021. Trend Micro forecasts ransomware groups will migrate into adjacent fields that monetize initial access, such as stock fraud, business email compromise, money laundering, and cryptocurrency theft.
Trend Micro recommends that organisations adopt a platform-based approach to managing their cyber-attack surface, mitigate security skills shortages and coverage gaps, and minimise the costs associated with point solutions. This should include asset management, cloud security, and attack surface visibility.
The report emphasises the importance of examining assets, determining their criticality, potential vulnerabilities, threat activity level, and how much threat intelligence is being gathered from the asset. It also recommends that organisations ensure their cloud infrastructure is configured with security in mind to prevent attackers from capitalising on known gaps and vulnerabilities.
Lastly, it suggests that organisations prioritise updating software as soon as possible to minimise the exploitation of vulnerabilities and monitor disparate technologies and networks within the organisation and any security system that protects them.
More Stories
Killnet and AnonymousSudan Collaborate to Launch Cyber Attacks on Western Organisations
In recent news, it has been reported that two Russia-sympathetic hacktivist groups, Killnet and AnonymousSudan, have allegedly launched a series...
$4000 Gone In An Instant: Mother Defrauded in Facebook Marketplace Car Deal
A mother of four is warning others to be cautious after believing she had purchased a safe and dependable car...
Shocking Scam: Sydney Family Loses $200K Life-Savings in Suncorp Spoofing Fraud
A family from Sydney has lost their life savings worth $200,000 due to a fraudulent scam. Peter and Madison, who...
Mysterious Money Transfer Leaves Couple Speechless: How They Got an Unsolicited $4000
A young couple in Melbourne claims their bank is making up a personal loan they do not understand. Ashley and...
Phishing + AI + Voice Cloning= Big Trouble: The New Way Criminals are Stealing Your Money
New Alert: Criminals use AI and voice cloning to trick you out of your money. Earlier this year, Microsoft unveiled...
‘Impossible to Spot’ Delivery Scam Email Targets Australia Post Customers – Don’t Fall Victim!
Unsuspecting shoppers should be cautious as a parcel delivery scam that is hard to distinguish targets Australia Post customers. Email...