Cybercrime tactics and techniques: Q2 2018

Thumb original malwarebytes cybercrime tactics and techniques

A generally slow quarter reflects an overall lullin cybercrime, picking up where Q1 left off with cryptominers continuing to dominate, ransomware continuing to evolve through experimentation, and exploits making a small but significant comeback.

New developments in ransomware and cryptomining drove the market, as Q2 attacks generally showed more sophistication than their Q1 counterparts. The introduction of complex VPNFilter malware, which dropped multi-stage attacks on hundreds of thousands of unsuspecting small office and consumer users, shook the sleepy cybersecurity industry awake. While 2017 outbreaks such as WannaCry and NotPetya have been as yet unmatched in terms of distribution volume and impact, VPNFilter, SamSam, and other such complicated campaigns show that 2018 may just be the year of higher-level, targeted attacks.

So how did we draw these conclusions? As we’ve done for the last several quarterly reports, we combined intel and statistics gathered from April through June 2018 from our Intelligence, Research, and Data Science teams with telemetry from both our consumer and business products, which are deployed on millions of machines. Here’s what we learned about cybercrime in the second quarter of 2018.

View whitepaper
Date: 21 November 2019, 16:45 pm   |   Provider: Malwarebytes USA   |   Size: 1.57 MB   |   Language: English
This may interest you too:
Thumb original idr infographic automation is essential for cyber resilience final july 2019

Why automation is essential for cyber resilience

Digital transformation makes today’s businesses more productive and more vulnerable to cyberattacks. Security professionals know that breaches are inevitable. To be successful, companies must establish cyber-resilient endpoints. Where do you turn when legacy approaches fail? In a word: Automation. ...

To the download
180912 mwb endpoint protection buyers guide v6 cover

Enterprise endpoint protection buyer's guide

The threat landscape continues to innovate with increased volume and tenacity. In 2016, 53% of cybersecurity professionals reported an increase in attacks, and in 2017, 80% believe it is likely or very likely they will be attacked. We’ve seen successful attacks steal customer data and shut down business operations, in all industries in every region across the globe.

This guide details the core requirements to help you navigate your enterprise endpoint protection solution analysis, and it provides a solution questionnaire to help you with you ...

To the download
Thumb original forrestertei cylanceprotectandcylanceoptics

The Total Economic Impact™ Of CylancePROTECT® And CylanceOPTICS™

Employee endpoints are the interfaces between employees and the corporate data and applications they need to do their jobs. Attackers understand this — and actively target employee endpoints as well as the server endpoints hosting corporate data. More than 50% of companies experience a significant data breach each year, and endpoints, as a critical conduit for valuable corporate data, are the top targets for attack. Endpoint security solutions provide a critical line of defense, protecting PCs, laptops, and servers from malicious threats. ...

To the download
Thumb original new edr capes sb d

AI-Driven Threat and Incident Prevention, Detection, and Response

Traditional cybersecurity approaches suffer from two glaring weaknesses. First, they rely on the digital signatures of known malware in order to identify threats. This approach leaves systems vulnerable to new and non-catalogued malware. Second, they are reactive in nature, ascribing to the “it’s not a matter of if, but when” mentality and often responding to the damage caused by zero-day threats only after they execute. Guarding against known threats is important but in the modern threat, landscape organizations must also address the over 350, ...

To the download
Thumb original nextgenantivirusexecutivebrief

Executive Brief: Why It’s Time for Your Organization to Explore Next-Generation Antivirus

In this Paper:

• SMBs face the same security and compliance requirements as enterprises, without the same level of resources.

• Legacy AV has significant shortcomings, including reliance on detect-respond instead of a prevent-first approach to security.

• BlackBerry Cylance is an AI platform that helps small businesses prevent, detect, and respond to threats

...

To the download