October 18, 2016 By Larry Loeb 2 min read

Proofpoint’s “Q3 2016 Threat Summary” outlined some disturbing trends. It highlighted how email, social media and mobile serve as attack vectors that lie outside the enterprise’s perimeter. The Proofpoint threat report also described some usual cybersecurity tools that can be used to protect a network.

Locky Streak

Threats shifted in the third quarter, according to the report, with both the volume of campaigns and the variety of threats increasing. The volume of malware-laced spam emails also reached historically high numbers.

Startlingly, Proofpoint found traces of Locky ransomware in 96.8 percent of the malicious file attachments it observed in Q3. This represented a 28 percent increase from the second quarter of 2016 and a 64 percent jump from the first quarter.

Attachments were most likely to be ZIP files containing JavaScript files, according to Softpedia. Also in the mix were Office documents infected with malicious macro scripts, HTML executable files and Windows Script files.

Java Blues

Speaking of emails, nefarious messages containing JavaScript attachments rose 69 percent compared to the second quarter. These attacks peaked at hundreds of millions of messages per day, shattering records set in the previous quarter.

The Proofpoint threat report also found social media to be a fertile area for cybercriminals. Social phishing — efforts aimed at tricking users into handing over their account credentials — has doubled since the second quarter. Since these kinds of attacks live outside of the enterprise’s network perimeter and involve accounts not owned by the enterprise, traditional security tools can be totally blind to them.

Some Good News

The threat report did contain some encouraging news: Exploit kit (EK) activity decreased 65 percent in the third quarter compared to the second and 93 percent compared to the first quarter. The slide in EK use has leveled off, according to the report, which may be due to the shutdown of the Angler and Nuclear exploit kits earlier this year.

The Proofpoint threat report summed up what most security professionals already know: The current lineup of threats is similar to what we’ve already seen. However, that likely won’t stop the exploits from being successful if defensive teams aren’t prepared.

More from

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Testing the limits of generative AI: How red teaming exposes vulnerabilities in AI models

4 min read - With generative artificial intelligence (gen AI) on the frontlines of information security, red teams play an essential role in identifying vulnerabilities that others can overlook.With the average cost of a data breach reaching an all-time high of $4.88 million in 2024, businesses need to know exactly where their vulnerabilities lie. Given the remarkable pace at which they’re adopting gen AI, there’s a good chance that some of those vulnerabilities lie in AI models themselves — or the data used to…

FBI, CISA issue warning for cross Apple-Android texting

3 min read - CISA and the FBI recently released a joint statement that the People's Republic of China (PRC) is targeting commercial telecommunications infrastructure as part of a significant cyber espionage campaign. As a result, the agencies released a joint guide, Enhanced Visibility and Hardening Guidance for Communications Infrastructure, with best practices organizations and agencies should adopt to protect against this espionage threat. According to the statement, PRC-affiliated actors compromised networks at multiple telecommunication companies. They stole customer call records data as well…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today