October 18, 2016 By Larry Loeb 2 min read

Proofpoint’s “Q3 2016 Threat Summary” outlined some disturbing trends. It highlighted how email, social media and mobile serve as attack vectors that lie outside the enterprise’s perimeter. The Proofpoint threat report also described some usual cybersecurity tools that can be used to protect a network.

Locky Streak

Threats shifted in the third quarter, according to the report, with both the volume of campaigns and the variety of threats increasing. The volume of malware-laced spam emails also reached historically high numbers.

Startlingly, Proofpoint found traces of Locky ransomware in 96.8 percent of the malicious file attachments it observed in Q3. This represented a 28 percent increase from the second quarter of 2016 and a 64 percent jump from the first quarter.

Attachments were most likely to be ZIP files containing JavaScript files, according to Softpedia. Also in the mix were Office documents infected with malicious macro scripts, HTML executable files and Windows Script files.

Java Blues

Speaking of emails, nefarious messages containing JavaScript attachments rose 69 percent compared to the second quarter. These attacks peaked at hundreds of millions of messages per day, shattering records set in the previous quarter.

The Proofpoint threat report also found social media to be a fertile area for cybercriminals. Social phishing — efforts aimed at tricking users into handing over their account credentials — has doubled since the second quarter. Since these kinds of attacks live outside of the enterprise’s network perimeter and involve accounts not owned by the enterprise, traditional security tools can be totally blind to them.

Some Good News

The threat report did contain some encouraging news: Exploit kit (EK) activity decreased 65 percent in the third quarter compared to the second and 93 percent compared to the first quarter. The slide in EK use has leveled off, according to the report, which may be due to the shutdown of the Angler and Nuclear exploit kits earlier this year.

The Proofpoint threat report summed up what most security professionals already know: The current lineup of threats is similar to what we’ve already seen. However, that likely won’t stop the exploits from being successful if defensive teams aren’t prepared.

More from

CISA releases landmark cyber incident reporting proposal

2 min read - Due to ongoing cyberattacks and threats, critical infrastructure organizations have been on high alert. Now, the Cybersecurity and Infrastructure Security Agency (CISA) has introduced a draft of landmark regulation outlining how organizations will be required to report cyber incidents to the federal government.The 447-page Notice of Proposed Rulemaking (NPRM) has been released and is open for public feedback through the Federal Register. CISA was required to develop this report by the Cyber Incident Reporting for Critical Infrastructure Act of 2022…

Ransomware payouts hit all-time high, but that’s not the whole story

3 min read - Ransomware payments hit an all-time high of $1.1 billion in 2023, following a steep drop in total payouts in 2022. Some factors that may have contributed to the decline in 2022 were the Ukraine conflict, fewer victims paying ransoms and cyber group takedowns by legal authorities.In 2023, however, ransomware payouts came roaring back to set a new all-time record. During 2023, nefarious actors targeted high-profile institutions and critical infrastructure, including hospitals, schools and government agencies.Still, it’s not all roses for…

What should an AI ethics governance framework look like?

4 min read - While the race to achieve generative AI intensifies, the ethical debate surrounding the technology also continues to heat up. And the stakes keep getting higher.As per Gartner, “Organizations are responsible for ensuring that AI projects they develop, deploy or use do not have negative ethical consequences.” Meanwhile, 79% of executives say AI ethics is important to their enterprise-wide AI approach, but less than 25% have operationalized ethics governance principles.AI is also high on the list of United States government concerns.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today