Hackers turn to email phishing as security investments mount

Gone are the days when criminals hacked into software to steal data, Microsoft claims

Hackers are still seeking out the easiest methods to launch attacks on victims, such as phishing or encouraging users to click on a link, rather than attempting to infiltrate software, a report by Microsoft has revealed.

The company's Microsoft Security Intelligence Report, which examines common themes in security over the last 12 months, revealed that hackers no longer want to invest the same time or money in hacking into software as they used to - the suggestion being that recent security investments by software vendors are beginning to pay off.

Hundreds of billions of email phishing attacks containing malicious URLs targeted users between February 2017 and January 2018, according to Microsoft's analysis of more than 400 billion emails on 1.2 billion devices, making up 53% of threats.

As well as using phishing methods to obtain private information, criminals are targeting ill-secured cloud apps. The company's report discovered that 86% of SaaS collaboration apps were not using any form of encryption, either at rest or in transit, and that only 3% of cloud apps used HTTPs protection.

Advertisement
Advertisement - Article continues below

Microsoft's security report also investigated into the impact of botnets on the computing industry - specifically the Gamarue botnet. As one of the leaders in botnet research, the company looked into 44,000 malware samples to understand how it operates and found that the botnet distributed more than 80 different malware families, with ransomware, trojans, and backdoors making up the majority of threats.

Its third major finding was the growing threat of ransomware attacks. During 2017, there were three major examples of this cybercrime technique: WannaCry, Petya/NotPetya, and BadRabbit, all of which had a significant impact on global businesses.

The problem will all three attacks was the speed at which they spread - faster than humans could stop or fix. This made them a lot more severe than previous ransomware attacks and demonstrates how cyber criminals are changing tact to make sure their threats have the biggest impact possible.

Microsoft also observed that all three major findings are all interconnected. Ransomware was the most common type of malware distributed by the Gamarue botnet and criminals are increasingly taking advantage of legitimate platform feature - such as the ability to attach a document to an email - with which to launch a phishing attack.

Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/cloud/amazon-web-services-aws/354223/what-to-expect-from-aws-reinvent-2019
Amazon Web Services (AWS)

What to expect from AWS Re:Invent 2019

29 Nov 2019
Visit/hardware/354232/raspberry-pi-4-owners-complain-of-broken-wi-fi-when-using-hdmi
Hardware

Raspberry Pi 4 owners complain of broken Wi-Fi when using HDMI

29 Nov 2019
Visit/mobile/google-android/354189/samsung-galaxy-a90-5g-review-simply-the-best-value-5g-phone
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019