Intelligent CIO Europe Issue 10 - Page 33

INFOGRAPHIC from the Bankbot family introduced several innovations . It is capable of performing ransomware , keylogger , RAT functions , SMS interception , lock screen and call forwarding . Keeping tabs of morphing attacks with actionable threat intelligence is vital as creativity expands .
Malware developers leverage agile development
Malware authors have long relied on polymorphism to evade detection . Recent attack trends show they are turning to agile development practices to make their malware even more difficult to detect and to counter the latest tactics of anti-malware products . GandCrab had many new releases this year and its developers continue to update this malware at a rapid pace .
While automation of malware attacks presents new challenges , so does agile development because of the skills and processes to rollout new evading releases of attack methods . To keep pace with the agile development cybercriminals are employing , organisations need advanced threat protection and detection capabilities that help them pinpoint these recycled vulnerabilities .
Effective targeting of vulnerabilities is a greater need for a wider diversity of applications . These organisations will require a security approach that breaks down silos between each of these apps , including their multi-cloud environments , for transparent visibility and security controls .
Combating evolving attacks requires integrated security powered by threat intelligence
The threat data in this quarter ’ s report once again reinforces many of the prediction trends unveiled by the FortiGuard Labs global research team for 2018 . A security fabric that is integrated across the attack surface and between each security element is vital . This approach enables actionable threat intelligence to be shared at speed and scale , shrinks the necessary windows of detection and provides the automated remediation required for the multi-vector exploits of today . β€’
Phil Quade , Chief Information Security Officer , Fortinet
Adversaries are selective in determining what vulnerabilities they target . With exploits examined from the lens of prevalence and volume of related exploit detections , only 5.7 % of known vulnerabilities were exploited in the wild . If the vast majority of vulnerabilities won ’ t be exploited , organisations should consider taking a much more proactive and strategic approach to vulnerability remediation .
Education and government application usage
When comparing application count usage across industries , government use of SaaS applications is 108 % higher than the mean and is second to education in the total number of applications used daily , 22.5 % and 69 % higher than the mean , respectively . The likely cause for the higher usage in these two industry segments
www . intelligentcio . com INTELLIGENTCIO
33
INFOGRAPHIC from the Bankbot family introduced several innovations. It is capable of performing ransomware, keylogger, RAT functions, SMS interception, lock screen and call forwarding. Keeping tabs of morphing attacks with actionable threat intelligence is vital as creativity expands. Malware developers leverage agile development Malware authors have long relied on polymorphism to evade detection. Recent attack trends show they are turning to agile development practices to make their malware even more difficult to detect and to counter the latest tactics of anti-malware products. GandCrab had many new releases this year and its developers continue to update this malware at a rapid Α…”Έ)]‘₯±”…ΥΡ½΅…Ρ₯½Έ½˜΅…±έ…Ι”…ΡΡ…­Μ)ΑΙ•Ν•ΉΡ́Ή•ά‘…±±•Ή•Μ°ΝΌ‘½•Μ…₯±”)‘•Ω•±½Α΅•ΉΠ‰•…ΥΝ”½˜Ρ‘”Ν­₯±±Μ…Ή)ΑΙ½•Ν͕́ѼΙ½±±½ΥЁΉ•ά•Ω…‘₯ΉœΙ•±•…Ν•Μ)½˜…ΡΡ…¬΅•Ρ‘½‘ΜΈQΌ­••ΐΑ…”έ₯Ρ )Ρ‘”…₯±”‘•Ω•±½Α΅•ΉΠε‰•ΙΙ₯΅₯Ή…±Μ)…Ι”•΅Α±½ε₯Ήœ°½Ι…Ή₯Ν…Ρ₯½ΉΜΉ••)…‘Ω…Ή•Ρ‘Ι•…ЁΑΙ½Ρ•Ρ₯½Έ…Ή‘•Ρ•Ρ₯½Έ)…Α…‰₯±₯Ρ₯•ΜΡ‘…Ё‘•±ΐΡ‘•΄Α₯ΉΑ½₯ΉΠΡ‘•Ν”)Ι•ε±•ΩΥ±Ή•Ι…‰₯±₯Ρ₯•ΜΈ)₯́„Ι•…ѕȁΉ••™½Θ„έ₯‘•Θ‘₯Ω•ΙΝ₯Ρ䁽˜)…ΑΑ±₯…Ρ₯½ΉΜΈQ‘•Ν”½Ι…Ή₯Ν…Ρ₯½ΉΜέ₯±°Ι•ΕΥ₯Ι”)„Ν•ΥΙ₯Ρ䁅ΑΑΙ½… Ρ‘…Ё‰Ι•…­Μ‘½έΈΝ₯±½Μ)‰•Ρέ••Έ•… ½˜Ρ‘•Ν”…ΑΑΜ°₯Ή±Υ‘₯ΉœΡ‘•₯Θ)΅Υ±Ρ€΅±½Υ•ΉΩ₯Ι½Ή΅•ΉΡΜ°™½ΘΡΙ…ΉΝΑ…Ι•ΉΠ)Ω₯Ν₯‰₯±₯Ρ䁅ΉΝ•ΥΙ₯Ρ䁍½ΉΡΙ½±ΜΈ) ½΅‰…Ρ₯Ήœ•Ω½±Ω₯Ήœ…ΡΡ…­ΜΙ•ΕΥ₯Ι•Μ)₯ΉΡ•Ι…Ρ•Ν•ΥΙ₯ΡδΑ½έ•Ι•‰δ)Ρ‘Ι•…Ё₯ΉΡ•±±₯•Ή”)Q‘”Ρ‘Ι•…Ё‘…Ρ„₯ΈΡ‘₯́ΕΥ…ΙΡ•ΛŠéɕΑ½ΙЁ½Ή”)……₯ΈΙ•₯Ή™½Ι•Μ΅…Ήδ½˜Ρ‘”ΑΙ•‘₯Ρ₯½Έ)ΡΙ•Ή‘́չٕ₯±•‰δΡ‘”½ΙΡ₯Յɐ1…‰Μ)±½‰…°Ι•Ν•…ɍ Ρ•…΄™½Θ€ΘΐΔกΝ•ΥΙ₯Ρδ)™…‰Ι₯ŒΡ‘…Ё₯́₯ΉΡ•Ι…Ρ•…Ι½Ν́ё”…ΡΡ…¬)ΝΥΙ™…”…Ή‰•Ρέ••Έ•… Ν•ΥΙ₯Ρ䁕±•΅•ΉΠ)₯́Ω₯Ρ…°ΈQ‘₯́…ΑΑΙ½… •Ή…‰±•Μ…Ρ₯½Ή…‰±”)Ρ‘Ι•…Ё₯ΉΡ•±±₯•Ή”ΡΌ‰”Ν‘…Ι•…ЁΝΑ••)…ΉΝ…±”°Ν‘Ι₯Ή­ΜΡ‘”Ή••ΝΝ…Ιδέ₯Ή‘½έΜ)½˜‘•Ρ•Ρ₯½Έ…ΉΑΙ½Ω₯‘•ΜΡ‘”…ΥΡ½΅…Ρ•)Ι•΅•‘₯…Ρ₯½ΈΙ•ΕΥ₯Ι•™½ΘΡ‘”΅Υ±Ρ€΅Ω•Ρ½Θ)•αΑ±½₯Ρ́½˜Ρ½‘…丁Έ)A‘₯°EΥ…‘”° ‘₯•˜%Ή™½Ι΅…Ρ₯½ΈM•ΥΙ₯Ρδ)=™™₯•Θ°½ΙΡ₯Ή•Π)™™•Ρ₯Ω”Ρ…ɝ•Ρ₯Ήœ½˜ΩΥ±Ή•Ι…‰₯±₯Ρ₯•Μ)‘Ω•ΙΝ…Ι₯•Μ…Ι”Ν•±•Ρ₯Ω”₯Έ‘•Ρ•Ι΅₯Ή₯Ήœέ‘…Π)ΩΥ±Ή•Ι…‰₯±₯Ρ₯•ΜΡ‘•δΡ…ɝ•ΠΈ]₯Ρ •αΑ±½₯ΡΜ)•α…΅₯Ή•™Ι½΄Ρ‘”±•ΉΜ½˜ΑΙ•Ω…±•Ή”)…ΉΩ½±Υ΅”½˜Ι•±…Ρ••αΑ±½₯Ё‘•Ρ•Ρ₯½ΉΜ°)½Ή±δ€ΤΈά”½˜­Ή½έΈΩΥ±Ή•Ι…‰₯±₯Ρ₯•Μέ•Ι”)•αΑ±½₯Ρ•₯ΈΡ‘”έ₯±Έ%˜Ρ‘”Ω…ΝЁ΅…©½Ι₯Ρδ)½˜ΩΥ±Ή•Ι…‰₯±₯Ρ₯•Μέ½»ŠeЁ‰”•αΑ±½₯Ρ•°)½Ι…Ή₯Ν…Ρ₯½ΉΜΝ‘½Υ±½ΉΝ₯‘•ΘΡ…­₯Ήœ„΅Υ )΅½Ι”ΑΙ½…Ρ₯Ω”…ΉΝΡΙ…Ρ•₯Œ…ΑΑΙ½… ΡΌ)ΩΥ±Ή•Ι…‰₯±₯ΡδΙ•΅•‘₯…Ρ₯½ΈΈ)‘Ս…Ρ₯½Έ…Ή½Ω•ΙΉ΅•ΉΠ)…ΑΑ±₯…Ρ₯½ΈΥΝ…”)]‘•Έ½΅Α…Ι₯Ήœ…ΑΑ±₯…Ρ₯½Έ½ΥΉΠΥΝ…”)…Ι½Ν́₯Ή‘ΥΝΡΙ₯•Μ°½Ω•ΙΉ΅•ΉΠΥΝ”½˜M……L)…ΑΑ±₯…Ρ₯½ΉΜ₯Μ€Δΐΰ”‘₯‘•ΘΡ‘…ΈΡ‘”)΅•…Έ…Ή₯͕́½ΉΡΌ•‘Ս…Ρ₯½Έ₯ΈΡ‘”)Ρ½Ρ…°ΉΥ΅‰•Θ½˜…ΑΑ±₯…Ρ₯½ΉΜΥΝ•‘…₯±δ°(ΘΘΈΤ”…Ή€Ψ䔁‘₯‘•ΘΡ‘…ΈΡ‘”΅•…Έ°)Ι•ΝΑ•Ρ₯Ω•±δΈQ‘”±₯­•±δ…ΥΝ”™½ΘΡ‘”‘₯‘•Θ)ΥΝ…”₯ΈΡ‘•Ν”ΡέΌ₯Ή‘ΥΝΡΙδΝ•΅•ΉΡΜ)έέάΉ₯ΉΡ•±±₯•ΉΡ₯ΌΉ½΄)%9Q11%9Q %<(ΜΜ