More than just a Hollywood trope, the Dark Web provides cover for nefarious individuals and organizations to launch anonymous attacks on corporate networks to exfiltrate valuable data. Attackers are targeting high-value communities and enterprises through this network of virtual tunnels and evolving threats like ransomware.

Read this issue of the IBM X-Force Threat Intelligence Quarterly to learn more from the security research experts at IBM X-Force about how to protect your network. Topics include:

  • Ransomware: How has it evolved into a threat that nets criminals millions of dollars each year through “ransomware as a service” toolkits and “ransomweb” attacks targeting specific high-value communities?
  • Should companies take measures to block connections to the Dark Web from their networks in order to limit attack surface and liability issues from content originating from Tor nodes?
  • Vulnerability disclosures in the first half of 2015 totaled just over 4,000, and are on track to be the lowest in four years.
  • The updated CVSS v3 scoring methodology now more accurately reflects the scope and impact of modern vulnerabilities.

Download the complete IBM X-Force Threat Intelligence Quarterly – 3Q 2015

More from Advanced Threats

Black Hat 2022 Sneak Peek: How to Build a Threat Hunting Program

4 min read - You may recall my previous blog post about how our X-Force veteran threat hunter Neil Wyler (a.k.a “Grifter”) discovered nation-state attackers exfiltrating unencrypted, personally identifiable information (PII) from a company’s network, unbeknownst to the security team. The post highlighted why threat hunting should be a baseline activity in any environment. Before you can embark on a threat hunting exercise, however, it’s important to understand how to build, implement and mature a repeatable, internal threat hunting program. What are the components…

4 min read

Top-Ranking Banking Trojan Ramnit Out to Steal Payment Card Data

4 min read - Shopping online is an increasingly popular endeavor, and it has accelerated since the COVID-19 pandemic. Online sales during the 2021 holiday season rose nearly 9% to a record $204.5 billion. Mastercard says that shopping jumped 8.5% this year compared to 2020 and 61.4% compared to pre-pandemic levels. Cyber criminals are not missing this trend. The Ramnit Trojan, in particular, is out for a shopping spree that’s designed to take over people’s online accounts and steal their payment card data. IBM…

4 min read

Detections That Can Help You Identify Ransomware

12 min read - One of the benefits of being part of a global research-driven incident response firm like X-Force Incidence Response (IR) is that the team has the ability to take a step back and analyze incidents, identifying trends and commonalities that span geographies, industries and affiliations. Leveraging that access and knowledge against the ransomware threat has revealed tools, techniques and procedures that can often be detected through the default Windows event logs (WELs). In particular, the X-Force IR team has identified several…

12 min read

How to Report Scam Calls and Phishing Attacks

5 min read - With incidents such as the Colonial Pipeline infection and the Kaseya supply chain attack making so many headlines these days, it can be easy to forget that malicious actors are still preying on individual users. They're not using ransomware to do that so much anymore, though. Not since the rise of big game hunting, anyway. This term marks ransomware actors' shift away from attacks against individual users and towards operations targeting large enterprises, noted CNBC. But attacks like phishing and…

5 min read
Your browser doesn't support HTML5 audio
Press play to continue listening
00:00 00:00