March 20, 2018 By Douglas Bonderud 2 min read

Security intelligence isn’t fire and forget. As evidenced by a new report, organizations must be able to identify, adapt and respond to emerging threats if they hope to keep networks safe.

The latest volume of the “Microsoft Security Intelligence Report” examined the current attack landscape for security professionals. It found that the combination of botnets, ransomware and phishing campaigns has created a triple threat that’s hard to defeat and even harder to dislodge.

A One-Two-Three Punch

The report found that botnets are on the rise worldwide as attackers leverage connected devices to create massive networks that can take down web servers, decimate defenses and infect devices. One popular botnet, Gamarue, distributed over 80 different malware families last year, including ransomware, Trojans and backdoors.

According to the Microsoft report, phishing still ranks as the top malware delivery system, making up 53 percent of all Office 365-based threats in the last half of 2017. Since attackers only need one click or download for a successful attack, spamming company emails with wave after wave of supposedly legitimate messages tends to pay off.

Ransomware is also an effective tactic for malware-makers, but it causes numerous problems for victims. According to CyberEdge’s “2018 Cyberthreat Defense Report,” only 19 percent of victims get their stolen files back after paying a ransom. In some cases, it comes down to sheer criminal intention. In others, poorly constructed code makes it impossible to decrypt files without causing damage.

Individually, these threats represent real risks to organizations. Together, they make up an overlapping triple threat: Botnets provide the sheer scope and throughput necessary to distribute ransomware across the globe, while phishing provides the low-friction entry method needed to bypass advanced firewalls and detection solutions.

It’s a case of new meets old: Evolving, insecure Internet of Things (IoT) networks make botnets viable options for cybercriminals, while the human condition means email is always at risk. Despite increasing awareness of ransomware threats, many companies still pay up rather than waiting out demands or opting for alternative methods.

Smart Practices Strengthen Security Intelligence

The bad news is that there’s no silver bullet to ward off the potential of a triple-threat infection. The good news is that best practices help.

The Microsoft report noted that humans are “often the weakest link in cybersecurity” and employees remain prone to email-based attacks. The authors suggested that training, education and mock phishing exercises can go a long way toward improving organizational security practices.

Phishing awareness and prevention is particularly noteworthy. According to an Akamai report, botnets are now pivoting to leverage more credential abuse. But if companies can lock down email access, the path from code to compromise becomes much more difficult.

Standard security smarts still apply: Educate employees about the dangers of phishing attacks and how they should respond, update all security solutions regularly and ensure that IoT deployments are properly secured.

More from

Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future

3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is where the idea of autonomous security for cloud (ASC) comes into play.Security and compliance aren't just technical buzzwords; they are crucial for businesses of all sizes. With data breaches and cyber threats on the rise, having systems that ensure your…

Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity

4 min read - Nation-state adversaries are changing their approach, pivoting from data destruction to prioritizing stealth and espionage. According to the Microsoft 2023 Digital Defense Report, "nation-state attackers are increasing their investments and launching more sophisticated cyberattacks to evade detection and achieve strategic priorities."These actors pose a critical threat to United States infrastructure and protected data, and compromising either resource could put citizens at risk.Thankfully, there's an upside to these malicious efforts: information. By analyzing nation-state tactics, government agencies and private enterprises are…

6 Principles of Operational Technology Cybersecurity released by joint NSA initiative

4 min read - Today’s critical infrastructure organizations rely on operational technology (OT) to help control and manage the systems and processes required to keep critical services to the public running. However, due to the highly integrated nature of OT deployments, cybersecurity has become a primary concern.On October 2, 2024, the NSA (National Security Agency) released a new CSI titled “Principles of Operational Technology Cybersecurity.” This new guide was created in collaboration with the Australian Signals Directorate’s Australian Cyber Security Centre (ASD SCSC) to…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today