March 20, 2018 By Douglas Bonderud 2 min read

Security intelligence isn’t fire and forget. As evidenced by a new report, organizations must be able to identify, adapt and respond to emerging threats if they hope to keep networks safe.

The latest volume of the “Microsoft Security Intelligence Report” examined the current attack landscape for security professionals. It found that the combination of botnets, ransomware and phishing campaigns has created a triple threat that’s hard to defeat and even harder to dislodge.

A One-Two-Three Punch

The report found that botnets are on the rise worldwide as attackers leverage connected devices to create massive networks that can take down web servers, decimate defenses and infect devices. One popular botnet, Gamarue, distributed over 80 different malware families last year, including ransomware, Trojans and backdoors.

According to the Microsoft report, phishing still ranks as the top malware delivery system, making up 53 percent of all Office 365-based threats in the last half of 2017. Since attackers only need one click or download for a successful attack, spamming company emails with wave after wave of supposedly legitimate messages tends to pay off.

Ransomware is also an effective tactic for malware-makers, but it causes numerous problems for victims. According to CyberEdge’s “2018 Cyberthreat Defense Report,” only 19 percent of victims get their stolen files back after paying a ransom. In some cases, it comes down to sheer criminal intention. In others, poorly constructed code makes it impossible to decrypt files without causing damage.

Individually, these threats represent real risks to organizations. Together, they make up an overlapping triple threat: Botnets provide the sheer scope and throughput necessary to distribute ransomware across the globe, while phishing provides the low-friction entry method needed to bypass advanced firewalls and detection solutions.

It’s a case of new meets old: Evolving, insecure Internet of Things (IoT) networks make botnets viable options for cybercriminals, while the human condition means email is always at risk. Despite increasing awareness of ransomware threats, many companies still pay up rather than waiting out demands or opting for alternative methods.

Smart Practices Strengthen Security Intelligence

The bad news is that there’s no silver bullet to ward off the potential of a triple-threat infection. The good news is that best practices help.

The Microsoft report noted that humans are “often the weakest link in cybersecurity” and employees remain prone to email-based attacks. The authors suggested that training, education and mock phishing exercises can go a long way toward improving organizational security practices.

Phishing awareness and prevention is particularly noteworthy. According to an Akamai report, botnets are now pivoting to leverage more credential abuse. But if companies can lock down email access, the path from code to compromise becomes much more difficult.

Standard security smarts still apply: Educate employees about the dangers of phishing attacks and how they should respond, update all security solutions regularly and ensure that IoT deployments are properly secured.

More from

Unpacking the NIST cybersecurity framework 2.0

4 min read - The NIST cybersecurity framework (CSF) helps organizations improve risk management using common language that focuses on business drivers to enhance cybersecurity.NIST CSF 1.0 was released in February 2014, and version 1.1 in April 2018. In February 2024, NIST released its newest CSF iteration: 2.0. The journey to CSF 2.0 began with a request for information (RFI) in February 2022. Over the next two years, NIST engaged the cybersecurity community through analysis, workshops, comments and draft revision to refine existing standards…

What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?

3 min read - The IBM X-Force 2024 Threat Intelligence Index has been released. The headlines are in and among them are the fact that a global identity crisis is emerging. X-Force noted a 71% increase year-to-year in attacks using valid credentials.In this blog post, I’ll explore three cybersecurity recommendations from the Threat Intelligence Index, and define a checklist your Security Operations Center (SOC) should consider as you help your organization manage identity risk.The report identified six action items:Remove identity silosReduce the risk of…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today