2017 has proved to be a lucrative year for cybercrime. Prominent malware and attack methods continue to evolve, creatively bypassing existing security solutions. In 2016, we witnessed sophisticated new malware emerging on a regular basis, exposing new capabilities, distribution methods, and attack services offered for sale through multiple platforms. 2017 is shedding light on a new trend – simple, yet highly effective malware families are causing rapid destruction globally.
So far, in 2017 cyber attacks are occurring at a higher frequency than previous years. Recent infiltrations have demonstrated the agility, scale and persistence of an attack that criminals are capable of executing. All regions have suffered from these large scale attacks, reinforcing the need for proactive solutions. Massive attack campaigns such as WannaCry, NotPetya and Fireball showcase the nature of today’s threat landscape. As the year progressed, we were able to witness the reoccurring global trends listed below:
- Nation-state cyber weapons are now in the hands of criminals
- The line between Adware and malware is fading, and mobile adware botnets are on the rise
- Macro-based downloaders continue to evolve
- A new wave of mobile bankers on GooglePlay
Even with massive outbreaks such as WannaCry and NotPetya making global news, most organizations continue to rely on a strategy of detection and response after an attack has occurred rather than prevention. Many of these prominent attacks use known malware variants that could easily have been blocked had the proper security been implemented before the attack had occurred. To stay one step ahead of cybercriminals, organizations should remain attuned to the ever-changing threat landscape.
By understanding emerging threats and implementing the latest prevention technologies, organizations can create a solid cyber security defensive posture. The Cyber Attack Trends: Mid-Year Report provides you with a comprehensive overview of the cyber landscape; ransomware, banking and mobile threats based on data drawn from the ThreatCloud World Cyber Threat Map between January and June of 2017.
Read more on Check Point Research
Download the Report