SlideShare a Scribd company logo
1 of 16
Download to read offline
Global Threat Landscape Report
1H 2020
AUGUST 2020
A Semiannual Report by FortiGuard Labs
H1 2020 Threat Landscape Report
2
Table of Contents
Overview and Key Findings  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 		 3
Top Threats During 1H 2020  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 		 4
	 Vulnerabilities and Exploits  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 		 4
	 Malware Detections .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 		 6
	 Botnet Activity  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 		 8
Featured Threats and Trends  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 		 10
	 Exploiting a Global Pandemic  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 		 10
	 From the DVR to the DMZ .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 		 11
	 OT Threats, Past and Present  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 		 12
	 Ransomware Spreads Its Wings  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 		 13
	 The Age of Exploitation  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 		 15
3
H1 2020 Threat Landscape Report
1H 2020 Overview and Key Findings
Years down the road when we all reflect back on 2020, it’s unlikely that cybersecurity will displace the COVID-19 pandemic at the top of
our collective memories. It’s an unprecedented series of events and we’ll be dealing with the aftermath for a long time to come. But that
doesn’t change the fact that the first six months of 2020 also saw significant developments across the cyber threat landscape. Some
trends relate to those aforementioned events, while others have their own drivers. We’re here to distill it all down so you enter the latter
half of the year more prepared for whatever comes next.
OT Threats After Stuxnet
June marked the 10th anniversary of Stuxnet, which forever
changed the way we view operational technology (OT) security.
A lot has happened since then and the Ramsay espionage
framework is the latest example of threat actors looking to
infiltrate air-gapped industrial environments. Learn how to keep
them out.
The Perimeter Gets Personal
Let’s do one more in the work-from-home (WFH) theme. Exploit
attempts against several consumer-grade routers and IoT
devices made our top IPS detections. We hate making spurious
connections but can’t help but wonder if this also stems from
criminals trying to take advantage of “The New Normal” of the
network perimeter extending to the home.
The Age of Exploitation
So far, 2020 is on pace to shatter the record for the total number
of disclosed vulnerabilities. But 2020 also has the lowest ratio
ever recorded for vulnerabilities with active exploits in the wild. Will
a lower percentage of a higher number mean more or less work
for vulnerability management teams? Read on to find out.
Ransomware Not Running Away
An attack on a well-known manufacturer in June that interfered
with their operations and caused temporary production
interruptions at several of the company’s facilities capped
another six months of ransomware activity targeted at enterprise
organizations.
The Rona Was Rampant
The coronavirus spread quickly but it’s possible cyber criminals
moved even quicker in distributing all manner of pandemic-
themed lures and scams. We hit the high points so you don’t fall
for their next scheme spawned from whatever global event we
face next.
Battle for the Browser
Speaking of lures, web-based malware used in phishing and
other campaigns outranked other delivery vectors early this year.
We also noted a drop in corporate web traffic due to people
surfing from home rather than the office. The combination
of those two trends means firms need to button up those
browsers.
4
H1 2020 Threat Landscape Report
Top Threats During 1H 2020
The findings in this report represent the collective intelligence of FortiGuard Labs, drawn from a vast array of network sensors collecting
billions of threat events observed in live production environments around the world. According to independent research,1
Fortinet has
the largest security device footprint in the industry. This unique vantage offers excellent views of the cyber threat landscape from multiple
perspectives that we’re glad to share with you.
Vulnerabilities and Exploits
IPS activity captured by our sensors reveal how adversaries recon and attempt to compromise vulnerable systems. Triggering one of
these detection signatures doesn’t mean the attack succeeded, but it does provide good intelligence on which types of vulnerabilities and
systems are actively in the crosshairs. Top platforms and technologies targeted by exploit activity in the first half of 2020 are plotted month
over month in Figure 1. We’ve taken the liberty of highlighting those that show the greatest movement, with discussion following below.
Figure 1: Most prevalent IPS detections by month during 1H 2020.
ThinkPHP.Controller
JAWS.DVR
Joomla!.Core
vBulletin.Routestring
ThinkPHP.Request
Bash.Function
Drupal.Core
ThinkPHP.HTTP
Shenzhen.TVT
NETGEAR.DGN1000
Dasan.GPON
Apache.Struts
HTTP.Unix
PHP.CGI
PHPUnit.Eval-stdin
JAWS.DVR
PHP.CGI
ThinkPHP.Controller
NETGEAR.DGN1000
ThinkPHP.Request
PHPUnit.Eval-stdin
HTTP.Unix
Joomla!.Core
vBulletin.Routestring
Drupal.Core
ThinkPHP.HTTP
Dasan.GPON
Apache.Struts
Shenzhen.TVT
Bash.Function
5%
10%
15%
20%
25%
30%
Jan Feb Mar Apr May Jun
OrganizationalPrevalence
Let’s review the composition of the top detections before getting into the monthly shifts. With one exception (Shenzhen), the list of
technologies on the left and right of the figure looks very similar to our prior reports. The seemingly constant presence of content
management systems (CMS) like ThinkPHP, Joomla, Drupal, and vBulletin at the top of our charts serves as a reminder that these
platforms receive a ton of flak from cyber artillery. We can’t stress enough that if your organization uses these tools, they must be
diligently maintained.
Setting aside the oft-discussed Apache Struts flaw tied to the Equifax breach of 2017, several other technologies fall in the network device
category. We have a featured story on such devices later in this report, so we’ll leave it at that for now. Shenzhen, however, is worth calling
out here because of its newbie status among the IPS elite. First discovered in 2018, it rocketed from nearly nowhere late last year to a
peak as the second most prevalent detection during a week in February. This activity ties back to a single exploit targeting a remote code
execution vulnerability in Shenzhen TVT DVR and OEM. The exploit contains indicators that may reflect an association with Lizard Squad,
a group known for DDoS attacks against online gaming services. It’s yet another example of criminals looking to build massive botnets of
consumer IoT devices for assorted schemes.
5
H1 2020 Threat Landscape Report
Beyond listing the top targets, we chose this type of chart to highlight a few of the rather large shifts that occurred. A remote code
execution (RCE) vulnerability in Bash was the major mover in January, with the first of several drops before settling into last place among
the top-tier detections by the end of June. It should be noted that this vulnerability is basically the infamous Shellshock RCE that was
discovered in 2014 and was considered to be worse than Heartbleed. February saw a major surge in detections related to an old argument
injection vulnerability in PHP CGI. Another PHP-related detection surged in March, this time targeting another RCE flaw in PHPUnit.
Shenzhen was once again a huge upstart in April and then a big downer in May.
Now let’s adjust our search to focus on exploits that weren’t necessarily global chart toppers, but did achieve a measure of regional fame.
These are featured in Figure 2. Zivif, TrueOnline, and Allegro offer additional examples of attempts to recon vulnerable IoT devices. It’s not
always intuitive why certain exploits gain traction in a certain region, and TrueOnline, an ISP in Thailand, is a good case in point.
Figure 2: Regionally prevalent IPS detections during 1H 2020 (percent of organizations).
The vulnerability in view affects a modified version of a ZyXEL router that TrueOnline distributes to its (presumably Thai) customers. That
begs the question of why the prevalence of detections in Latin America is so much higher than in Asia. The answer is fairly simple. The
router’s firmware contains a language package, enabling international distribution. When ISPs were migrating from ADSL to VDSL circa
2016, ZyXEL routers became widely distributed across Latam countries. Current activity reflects that history.
Switching gears again, we’ll take a look at IPS detections that exhibited unusually high prevalence within certain industries. We’ll call out
a few high-level observations based on Figure 3 and leave it to you to review the details for your sector. We note that some of these (e.g.,
TAR-Archive and FTP.Login) are fairly easy to exploit and look like criminals hoping to take advantage of security slip-ups.
DotNetNuke is a CMS based on .NET According to their website, the U.S. Department of Defense runs hundreds of public websites on
DotNetNuke. That probably has something to do with the elevated rate of detections for the public sector. The bump for PostgreSQL exploits
observed for MSSPs may indicate databases unintentionally left accessible to the internet. A Shodan search reveals hundreds of thousands
of PostgreSQL databases, many of which are hosted in Amazon Web Services (AWS). Is your MSSP exposing your sensitive data?
8.2% 5.2% 10.5% 6.7% 4.5% 6.1% 9.0%
4.4% 3.2% 2.9% 2.2% 6.7% 3.6% 3.7%
3.8% 2.7% 8.8% 5.8% 2.1% 10.5% 11.4%
0.3% 0.3% 1.1% 0.4% 2.4% 9.4% 0.5%
5.6% 1.6% 0.9% 0.9% 1.3% 1.0% 0.6%
3.7% 0.4% 10.8% 15.4% 4.8% 1.8% 0.4%
4.2% 32.7% 11.1% 12.4% 15.2% 4.6% 23.1%
Africa Asia Europe
Latin
America
Middle
East
Northern
America Oceania
Pulse.Secure
SonicWall.GMS
Allegro.RomPager
TrueOnline.ZyXEL
Adobe.Reader
Zivif.PR115-204-P-RS
Sun.Java
6
H1 2020 Threat Landscape Report
Figure 3: Industry-focused IPS detections during 1H 2020 (percent of organizations).
In general, education institutions, media companies, MSSPs, and telcos have more hotspots than other industries. If your company falls into
one of those groups, ensure defenses are ready to thwart a wider range of threats. On the other hand, notice how legal firms and nonprofits
show a cool blue all the way down. That indicates we didn’t detect any particular threats that were abnormally prevalent or unique to those
industries. That doesn’t mean those industries aren’t in the crosshairs; it just means they weren’t the target of many novel exploit attempts
during the first part of the year. You’ll see in the next section that they don’t get off so easily when it comes to malware.
Malware Detections
Malware trends reflect adversary intent and capability. Similar to IPS detections, malware picked up by our sensors does not always indicate
confirmed infections, but rather the weaponization and/or distribution of malicious code. Detections can occur at the network, application,
and host level on an array of devices.
Figure 4 ranks the most prevalent malware for each of the first six months of 2020. Similar to how we truncated IPS detections to focus on
technologies, we’ve chosen to group malware into families, or categories, rather than specific variants. Our purpose in doing this is to group
the numerous, often short-lived variants by their similarities so that we don’t miss the malware forest for the trees.
0.0%
0.0%
1.2%
0.8%
0.0%
0.0%
0.0%
1.2%
0.0%
0.4%
0.0%
0.0%
1.6%
0.0%
0.0%
0.0%
0.2%
0.0%
0.2%
0.1%
0.2%
0.5%
0.0%
0.1%
0.0%
0.5%
0.2%
0.2%
0.3%
1.8%
0.4%
0.0%
0.0%
0.0%
0.0%
0.5%
0.0%
0.2%
0.4%
0.6%
0.1%
0.0%
0.0%
0.0%
0.1%
0.1%
0.8%
0.4%
1.1%
1.4%
1.3%
0.3%
0.3%
0.3%
0.0%
0.3%
0.5%
0.4%
0.0%
0.1%
0.0%
0.1%
0.3%
0.4%
1.5%
0.0%
0.4%
0.4%
0.0%
0.0%
0.0%
0.0%
0.0%
0.2%
0.2%
1.1%
0.0%
0.0%
0.0%
0.0%
0.1%
1.3%
0.4%
0.6%
0.8%
0.8%
0.1%
0.1%
0.1%
0.4%
0.1%
0.2%
0.6%
0.6%
0.2%
0.0%
0.0%
0.1%
0.2%
0.0%
0.2%
0.0%
0.2%
0.0%
0.0%
0.0%
0.0%
0.0%
0.0%
0.1%
0.3%
0.8%
0.0%
0.0%
0.0%
0.2%
0.1%
0.1%
0.9%
0.5%
1.4%
0.0%
0.0%
0.1%
0.5%
2.1%
0.8%
1.4%
1.1%
0.8%
0.8%
0.3%
1.1%
0.6%
1.1%
0.2%
0.0%
0.1%
0.2%
0.0%
0.0%
0.0%
0.0%
0.2%
0.1%
0.3%
0.4%
0.8%
0.0%
0.0%
0.0%
0.0%
0.4%
0.3%
0.8%
0.6%
0.9%
0.4%
0.2%
0.1%
0.6%
0.6%
0.5%
1.3%
1.2%
1.5%
2.3%
0.4%
0.3%
0.5%
1.2%
0.1%
0.4%
0.3%
0.8%
0.1%
0.1%
0.2%
0.0%
0.1%
Aerospace&Defense
Agriculture
Automotive
Banking/Finance/Insurance
Consulting
Education
Energy&Utilities
Environmental
Food&Beverage
Government
Healthcare
Legal
Manufacturing
Media/Communications
MSSP
Nonprofit
Retail/Hospitality
Technology
Telco/Carrier
TransportationandLogistics
Joomla!.com_media
PostgreSQL.COPY
WuFTP.Glob
DotNetNuke.Cookie
FTP.Login
Mozilla.Multiple
Java.Deserializing
Java.Web
TAR.Archive
W32/Bancos
JS/Miner
Linux/Gafgyt
CVE-2017-11882
VBA/Agent
HTML/ScrInject
JS/Agent
AutoIt/Injector
W32/Agent
HTML/Phishing
W32/Bancos
JS/Miner
HTML/ScrInject
VBA/Agent
W32/Injector
AutoIt/Injector
JS/Agent
CVE-2017-11882
W32/Agent
HTML/Phishing
W32/Bancos
VBA/Agent
JS/Miner
AutoIt/Injector
HTML/ScrInject
W32/Injector
HTML/Phishing
JS/Agent
CVE-2017-11882
W32/Agent
JS/Miner
HTML/REDIR
W32/Bancos
HTML/ScrInject
JS/Agent
W32/Injector
W32/Agent
AutoIt/Injector
HTML/Phishing
CVE-2017-11882
JS/Miner
VBA/Agent
HTML/ScrInject
JS/Agent
W32/Bancos
W32/Agent
AutoIt/Injector
W32/Injector
HTML/Phishing
CVE-2017-11882
JS/Miner
W32/BDoor
HTML/ScrInject
HTML/REDIR
HTML/Phishing
W32/Bancos
W32/Injector
W32/Agent
JS/Agent
CVE-2017-11882
10
9
8
7
6
5
4
3
2
1
January February March April May June
Rank
Figure 4: Most prevalent malware categories by month during 1H 2020.
7
H1 2020 Threat Landscape Report
Figure 5: Industry-focused malware detections during 1H 2020 (percent of organizations).
One area of that forest that bears mention here is the HTML/Phishing family that includes all variants of web-based phishing lures and
scams. They sit firmly atop the list in January and February and only drop out of the top five in June. Together with its HTML cousins of
/ScrInject (browser script injection attacks) and /REDIR (browser redirection schemes), this demonstrates strong interest from cyber
criminals to get us where we’re often most vulnerable and gullible—browsing the web. Web-based malware often obfuscates and/or
bypasses conventional AV products, upping the chance of successful infection. That’s even more concerning because we noted a marked
drop in corporate web traffic due to people surfing from home rather than the office. Savvy defenders should note that the browser was a
prime delivery vector for malware in the first half of 2020 and act accordingly to ensure consistent controls for remote systems.
The other part of the forest we’d like to spotlight from Figure 5 is malware that exploits CVE-2017-11882. This bug has been public
for a few years now (the bug itself is much, much older), but it steadily climbed in prevalence over the first half of 2020 and held the #1
spot for four straight months. And we weren’t the only ones to note the increase. On April 1 (not a joke), the U.S. Secret Service (USSS)
posted an alert about fraudulent COVID-19 emails using malicious attachments. A representative of the USSS’s Criminal Investigative
Division told CSO Magazine that the malware spreaders were seeking to exploit CVE-2017-11882 for multiple campaigns. One that
seems particularly mean purports to come from the U.S. Department of Health and Human Services (HHS) and informs the recipient that
they’ve contracted COVID-19. Another targets medical equipment manufacturers with a (malware-laden) document sent via email asking
them to provide equipment.
Figure 5 follows the method used by Figure 3 to identify malware families that exhibit unusually high prevalence within certain industries.
Scanning the columns, it’s apparent that no industry is blue all the way down. Every sector has at least one malware hot(ter) spot and some
of them have several.
0.0%
0.0%
1.9%
1.9%
1.3%
0.6%
0.0%
0.0%
1.9%
0.6%
0.0%
0.6%
0.0%
0.0%
2.1%
1.5%
0.6%
0.3%
0.0%
0.0%
0.3%
0.3%
0.0%
0.3%
0.0%
0.0%
0.6%
0.7%
0.3%
1.2%
0.1%
0.0%
0.3%
0.3%
0.3%
1.6%
0.1%
0.1%
2.0%
0.8%
0.2%
0.2%
0.2%
0.1%
0.0%
0.4%
0.2%
0.8%
0.1%
0.0%
0.8%
0.3%
0.3%
0.2%
0.1%
0.0%
0.0%
0.1%
0.0%
0.9%
1.6%
0.4%
0.4%
1.5%
0.0%
0.0%
0.3%
0.1%
0.2%
0.3%
0.0%
1.5%
0.1%
0.1%
2.7%
0.9%
1.0%
0.3%
0.3%
0.1%
0.1%
0.4%
0.1%
1.2%
0.0%
0.0%
0.6%
0.6%
0.6%
0.6%
0.6%
0.0%
0.6%
0.6%
1.2%
0.6%
0.3%
0.1%
0.9%
0.3%
1.3%
0.9%
0.0%
0.0%
0.1%
0.3%
0.0%
1.1%
0.0%
0.1%
1.0%
2.4%
0.2%
0.3%
0.4%
0.0%
0.0%
0.2%
0.0%
0.2%
0.2%
0.0%
0.4%
1.4%
0.3%
0.3%
0.1%
0.1%
0.0%
0.2%
0.1%
0.6%
0.0%
0.0%
0.3%
0.3%
0.3%
0.0%
0.0%
0.0%
0.0%
1.2%
0.0%
0.3%
0.1%
0.0%
1.2%
0.8%
0.8%
0.5%
0.1%
0.1%
0.6%
0.4%
0.1%
2.3%
0.6%
0.0%
1.7%
0.5%
0.3%
0.5%
0.3%
0.2%
0.3%
0.3%
0.0%
0.6%
0.5%
0.0%
0.5%
2.2%
1.1%
0.0%
0.0%
1.6%
0.0%
1.1%
0.0%
1.1%
0.5%
0.0%
1.0%
0.2%
0.3%
0.0%
1.0%
0.2%
0.0%
0.5%
0.2%
1.2%
0.0%
0.0%
1.5%
0.8%
0.7%
0.7%
0.2%
0.0%
0.1%
0.3%
0.0%
1.0%
0.3%
0.0%
0.9%
0.8%
0.4%
0.9%
0.1%
0.0%
0.4%
0.5%
0.1%
1.3%
0.5%
1.2%
1.2%
1.2%
0.7%
0.2%
0.5%
0.0%
0.0%
1.2%
0.2%
1.2%
0.1%
0.0%
1.3%
1.1%
1.5%
0.9%
0.3%
0.2%
0.2%
0.5%
0.1%
0.8%
Aerospace&Defense
Agriculture
Automotive
Banking/Finance/Insurance
Consulting
Education
Energy&Utilities
Environmental
Food&Beverage
Government
Healthcare
Legal
Manufacturing
Media/Communications
MSSP
Nonprofit
Retail/Hospitality
Technology
Telco/Carrier
TransportationandLogistics
MSWord/CVE20170199
Adware/Ewind!Android
Riskware/FusionCore
W32/CryptExe
W32/Qjwmonkey
W32/Dloader
JS/Banker
W32/PECompact!tr
HTML/Redirector
Adware/Bundlore
PowerShell/Csvdwl
W32/DarkMoon
We realize malware names aren’t always clear—our threat encyclopedia should help with that—but some are intuitive. Telcos see more
malware on Android devices, for instance. Adware roams the halls of academia. JS/Banker steals from government agencies and MSSPs
more often than banks. PowerShell in the automotive industry raises an eyebrow. We could go on, but we’ll leave you to explore your sector
as desired and transition on to our discussion of botnets. Hopefully these details help you focus security efforts on threats that matter most
to your organization.
8
H1 2020 Threat Landscape Report
Botnet Activity
Whereas exploit and malware trends usually show the pre-compromise side of attacks, botnets give a post-compromise viewpoint. Once
infected, systems often communicate with remote hosts, making this traffic an important part of monitoring the full scope of malicious activity.
One lesson botnet data imparts every time we examine it is that pervasive and persistent control is a prized commodity among cyber criminals.
A side effect of this is that activity for the top bots is remarkably consistent. Figure 6 illustrates this perfectly. The month-by-month rankings for
prevalence are far more consistent than seen for IPS and malware detections. We’ve studied botnet persistence in prior reports and saw that
enterprise security teams will typically identify botnet traffic and snuff out infected systems within a reasonable time frame. But botnets infecting
small businesses and millions of consumer devices tend to stick around for quite a while. And that’s a lot of what we see here.
Figure 6: Most prevalent botnet detections during 1H 2020 (not split vertical axis).
Gh0st.Rat
Mirai
Mirai
Gh0st.Rat
Zeroaccess
Pushdo
Xtreme.RAT
Sality
Conficker
Torpig.Mebroot
Rockloader
Ganiw
Gozi
Zeroaccess
Pushdo
Xtreme.RAT
Sality
Ganiw
Conficker
Torpig.Mebroot
Gozi
Rockloader
Jan Feb Mar Apr May Jun
60%
70%
80%
0%
5%
10%
15%
OrganizationalPrevalence
The first two botnets in Figure 6, Mirai and Gh0st, predominate the chart and did so for the latter part of 2019 as well. Driven by apparent
growing interest by attackers targeting old and new vulnerabilities in consumer IoT products, Mirai surged into first place among botnets
by early May. This trend is noteworthy because it could suggest cyber criminals are seeking to gain a foothold in enterprise networks by
exploiting devices that WFH employees might be using to connect to the enterprise network. In a sense, the corporate network perimeter
has extended to the home—and that’s not a very comforting thought.
Gh0st, an old malware-botnet crime family, was also leveraged for campaigns targeting WFH users and applications. Gh0st is a remote
access botnet that allows an attacker to take full control of the infected system, log keystrokes, provide live webcam and microphone feeds,
download and upload files, and other nefarious activities.
9
H1 2020 Threat Landscape Report
Figure 7: Most prevalent botnets by region during 1H 2020 (percent of organizations).
To better highlight variation that does exist among botnets, Figure 7 expands the list of chart-toppers from Figure 6 and compares them
across regions. Mirai and Gh0st are still omnipresent, but it’s apparent that their activity is not uniform around the world. The proportion of
organizations that detected traffic related to one of Mirai’s many variants, for example, is more than 20% higher in Europe than Asia. But
Europe lands in third place for Gh0st activity.
0.5%
0.8% 0.9%
0.9%
1.0%
1.0%
1.0%
1.0%
1.1%
1.1%
1.2% 1.2%
1.2%1.2%
1.2%
1.4%
1.4%
1.5%
1.6%
1.7%
1.7%
1.9%
1.9%
1.9%
2.0%
2.0%
2.0%
2.0%
2.1%
2.1%
2.2%
2.2%
2.2%
2.3%
2.3%
2.3%
2.4%
2.4%
2.4%
2.5%
2.5%
2.5% 2.6%
2.6%
2.7%
2.7%
2.7%
2.7%
3.0%
3.1%
3.2%
3.2%
3.3%
3.4%
3.4%
3.4%
3.5%
3.5%
3.5%
3.7%
3.7%
3.7%
3.8%
3.8%
4.3%
4.4%
4.5%
4.6%
4.6%
4.7%
4.9%
5.0%
5.3%
5.4%
5.8%
5.9% 5.9%
6.1%
6.2%
6.2%
6.2%
6.3%6.4%
6.5%
6.8%
7.2%
7.3%
7.3%
7.4%
7.6%
8.1%
8.1%
8.3%
8.8%9.0%9.2%
9.5%
9.7%
10.0%
10.2%
10.4%
10.4%
10.5%
10.8%
10.9% 10.9%
11.4%
11.4%
11.7%
12.4%
12.4%
12.6% 12.8%
13.2%
14.1%
14.3% 14.7%
15.0% 15.9%
16.6%
17.4%
17.4% 19.3%19.7%20.0% 21.6%
58.0%59.2% 60.6%62.7%
63.3%
66.7%
68.3%70.7%
72.5%72.9%
78.0% 84.8% 85.3%85.6%
Africa Asia Europe
Latin
America
Middle
East
Northern
America Oceania
Emotet.Cridex
njRAT
Ramnit
Nitol
Zeus
XorDDOS
Rockloader
Conficker
FinFisher
Necurs
Gozi
Mariposa
Torpig.Mebroot
Sality
Xtreme.RAT
Ganiw
Zeroaccess
Pushdo
Gh0st.Rat
Mirai
As you move down Figure 7, some even stronger regional differences emerge. Gozi pops in Africa and FinFisher is particularly active
in Asia. Emotet.Cridex is the only botnet shown that leads in Latin America. Sality jumps among organizations in the Middle East, and
North America owns the Pushdo crown. Curiously, Oceania doesn’t take the #1 spot for any of the botnets shown here (though it’s a
very close second for Mirai). Myriad factors account for such differences, including targeting, infrastructure, technology adoption, security
configurations, and user behavior.
10
H1 2020 Threat Landscape Report
Featured Threats and Trends
Exploiting a Global Pandemic
Security researchers and other vendors have written a lot already on the enormous impact that COVID-19 has had on cybersecurity. We’ve
done so ourselves here, here, here, here, here, and more. Even so, it would be remiss of us to ignore the topic for that reason, especially in
a report summing up threat activity in the first half of 2020.
Predictably, cyber criminals of all shades—from opportunistic phishers to scheming nation-state actors—found some way to exploit the
pandemic for their benefit. Organizations around the world were suddenly confronted with a situation where they had to support a majority
of employees working from home. For attackers, the shift presented an unprecedented opportunity to break into enterprise networks by
targeting weakly protected home networks, consumer devices, VPN connections, and video communication and collaboration tools.
Figure 8: Comparison of COVID-related Google search trends and malicious COVID-themed URLs.
COVID related IOCs (Trend)
COVID Google search trends
0
2000
4000
6000
0
25
50
75
100
January February March April May June July
Numberofuniquecovidrelatedurls
GoogleTrends
Indicators of threat activity began to emerge almost in lockstep with growing societal awareness of the scope and ramifications of the
pandemic. Figure 8 illustrates this by comparing COVID-related Google search trends and COVID-themed malicious URLs picked up by our
web filters. Many of the domains contained names such as “coronavirus,” “vaccine,” “chloroquine,” and “remdesvir” and were created to
harvest credentials or distribute malware and spam. It shows how quickly attackers move to take advantage of major news developments
and events with broad social impact.
We also observed a sharp increase in malicious emails with documents purportedly containing pandemic-related guidance seemingly
sent from trusted sources—such as the Centers for Disease Control and Prevention (CDC) and the World Health Organization (WHO). The
operators of the Emotet banking Trojan were among the first to leverage the coronavirus scare to try and distribute their malware in this way.
Over the following weeks and months, we observed a widening range of malicious activity involving the use of COVID-19-related lures. This
included phishing and business email compromise schemes, nation-state backed campaigns, and ransomware attacks. Some examples of
the several threats we tracked include:
11
H1 2020 Threat Landscape Report
	n the distribution of the AZORult information stealer via a website with a fake coronavirus infection-spread map;
	n a phishing campaign targeting Ukrainian military and intelligence targets by the Gamaredon APT group;
	n attacks against targets in mainland China by the Vietnam-affiliated APT32 group;
	n targeted attacks against South Korean organizations by the North Korea-linked Kimsuky APT group.
Generally, organizations in the U.S., China, and Russia were the most frequent targets of coronavirus-themed attacks in the first half of 2020.
Ransomware hidden in COVID-19-themed messages, attachments, and documents was another threat. We tracked three ransomware
samples that fell into this category in H1 2020 —NetWalker, Ransomware-GVZ, and CoViper. Of the three, CoViper was especially
pernicious because it rewrote the computer’s master boot record (MBR) before encrypting data. We have observed several attacks in the
past where adversaries have used MBR wipers in combination with ransomware to effectively cripple the PC.
Toward the end of the first half of the year, there were also several reports of potentially state-backed threat groups attacking organizations
involved in COVID-19-related research in the U.S. and other countries.
It’s unclear how damaging—or not—the pandemic-related malicious activity in the first half of this year may have been ultimately. But for
many organizations, the attacks highlighted the need for better approaches—including zero-trust models—for protecting their networks
against threats posed by workers connecting from weakly protected home networks. It also emphasizes the importance that defenders
keep an eye on the news to stay ahead of the threat du jour.
From the DVR to the DMZ
The recent surge in remote work as a result of the COVID-19 pandemic has focused considerable attention on the security of routers,
DVRs, and other internet-connected devices at home. One concern is that attackers can exploit the subpar security in these systems to
try and gain a foothold on enterprise networks or on devices that WFH employees might be using to connect to the enterprise network.
Another issue is that attackers can exploit these devices to quickly assemble massive botnets—in Mirai-like fashion—that can be used to
launch DDoS attacks or distribute malware.
Figure 9: IPS detections targeting common network device brands during 1H 2020.
Shenzhen
Netcore
Linksys
D-Link
0
100k
200k
300k
400k
January February March April May June
TotalIoTDeviceDetections
12
H1 2020 Threat Landscape Report
In the first half of 2020 we saw plenty of evidence to suggest sustained attacker interest in exploiting old and new vulnerabilities in
consumer-focused IoT products. We’ve already discussed the dramatic increase in malicious activity targeting the flaw in Shenzhen TVT
DVRs, so we won’t elaborate on that again here. Another vulnerability that elicited a lot of attacker interest in the first half of 2020 involved
D-Link routers. The command execution flaw exists in multiple D-Link router models and gives attackers a way to take complete control of
a vulnerable device. We observed most of the malicious activity targeting this vulnerability happening in May and June. Though the volume
of attacks and the number of devices targeted was higher—around 160,000 at the peak—compared to the Shenzhen DVR flaw, this was
substantial enough to suggest a high level of attacker interest.
The most sustained high-volume attack activity that we observed, though, impacted Netcore/Netis routers. From January through the
end of June, threat actors kept relentlessly pounding away at a hard-coded password security bypass issue in Netcore/Netis routers.
The backdoor vulnerability was first discovered in August 2014 and has since then been one of the top triggered IPS signatures we have
tracked. During the peak of the attacks in May, we collected well over 60 million hits from this signature.
An authentication-bypass vulnerability in Linksys routers and another remote command execution flaw in Linksys E-Series routers were two
other router flaws that received considerable attention from attackers in the first half of 2020.
Attackers have already successfully exploited some of these flaws to assemble dangerously large botnets. One example is Dark Nexus, an
IoT botnet that emerged in the first half of this year, consisting of thousands of exploited ASUS and D-Link routers. Mozi, a peer-to-peer
botnet that was also identified by researchers in the first half of 2020, is another botnet built from exploited routers and DVRs including
D-Link devices with the command execution flaw referenced above.
The presence of such vulnerable devices on home networks significantly expands the attack surface for organizations with a large number
of remote workers. Thus, organizations should evaluate options for achieving the same level of protection for WFH employees as they had
in the office.
OT Threats, Past and Present
On the opposite end of the spectrum from IT devices featured in the previous section are operational technologies (OT). The prevalence
of threats targeting supervisory control and data acquisition (SCADA) systems and other types of industrial control systems (ICS) is
understandably much less than IT, but that fact in no way diminishes their importance. Figure 10 provides a breakdown of exploit detections
targeting ICS manufacturers and components.
If you’re not responsible for managing OT, you might have missed an important anniversary this past June. 2020 marks 10 years since
the discovery of Stuxnet, the malicious worm that made headlines by sabotaging industrial facilities critical to the nuclear program in
Iran. Since that momentous event, there have been many instances of sophisticated cyberattacks on OT systems worldwide. This may
be due in part to the fact that OT networks are now increasingly connected to the internet, making them more vulnerable to attack. That
hypothesis is supported by our “State of Operational Technology and Cybersecurity Report” that found 74% of OT organizations had
experienced a malware intrusion in the past 12 months!
13
H1 2020 Threat Landscape Report
In terms of more recent developments in the realm of OT threats, two in particular caught our attention in the first half of 2020. January
saw a surge across our IPS sensors in the U.S., Brazil, and Germany of activity involving Modbus TCP servers and programmable logic
controllers (PLCs) that could result in information leakage. This helped make Modbus-related detections the most voluminous of all OT
systems featured in Figure 10. Note, however, that all triggers of this signature aren’t necessarily malicious. But it’s worth monitoring
because an attacker infiltrating the SCADA network could certainly cause trouble by accessing the Modbus controller.
The second noteworthy development came in May when researchers uncovered Ramsay, an espionage framework designed for the
collection and exfiltration of sensitive files within air-gapped or highly restricted networks. OT environments fit those characteristics, which is
why we mention it here. It’s not quite clear how long Ramsay has been active, but it’s been tied to an older APT group, Darkhotel. As their
name suggests, Darkhotel is more known for exploiting hotel Wi-Fi networks than industrial facilities, but we’re more interested in Ramsay’s
potential than its progenitors.
Fortinet is one of the few security vendors committed to protecting and securing OT operations, especially those that are part of critical
infrastructures. You can read more here about the unique challenges of securing operational technology environments and how we can help.
Ransomware Spreads Its Wings
An attack on a well-known manufacturer in June that interfered with their operations and caused temporary production interruptions at
several of the company’s facilities capped another six months of ransomware activity targeted at enterprise organizations.
Security researchers identified the malware used in the attack as EKANS (which is sometimes referred to publicly as Snake), a ransomware
sample with several features tailored to attack systems in ICS. Our analysis of the malware showed it to be heavily obfuscated, written in
the GO programming language, and not very different from other ransomware tools except for its targeting of OT and ICS systems. The
attack—and the use of EKANS—was troubling because it suggested that adversaries might be broadening the focus of ransomware
attacks to OT environments as well.
Over the course of the first half of 2020 we analyzed activity specific to several other ransomware threats, including the COVID-19-themed
ones mentioned in the previous section. One trend we observed was an increase in ransomware incidents where adversaries not only
locked a victim organization’s data but stole it as well and used the threat of widescale release as additional leverage to try and extort a
ransom payment.
Figure 10: Prevalence and volume of IPS detections involving industrial systems.
3S-Smart
7-Technologies
ABB
Advantech
Allen
AzeoTech
BlackIce
BMC
Broadwin
Cambium
Citect
CoDeSys
Cogent
Dahua
DATAC
Delta
Digium
DNP3
Eaton
Ecava
Fatek
Fuji
Galil
GE
Geutebruck
Hikvision
Honeywell
Iconics
InduSoft
Intellicom
KingScada
Measuresoft Meteocontrol
Microsys
Mitsubishi
Modbus
Moxa
OMRON
Panasonic
Phoenix
Progea
QNX
RealFlex
Rockwell
SafeNet
Samsung
Schneider
SearchBlox
Siemens
Sinapsi
Sixnet
Sunway
TeeChart
Triangle
Trihedral
Unitronics
VIPA
WECON
WellinTech
WindRiver
Wonderware
Yokogawa
100
100k
100m
1 in
100k
1 in
10k
1 in
1k
1 in
100
1 in
10
Organizational Prevalence
TotalVolume
14
H1 2020 Threat Landscape Report
Figure 11: Percent of organizations detecting ransomware during 1H 2020.
One example is DoppelPaymer, a ransomware used in attacks against a supplier of custom parts to the automotive and aerospace
industries, a NASA contractor, and the city of Torrance, California. Our analysis showed Doppelpaymer to both encrypt files and offload
them to a website where the data is published if the victim refuses to pay the demanded ransom.
The tactic was first observed being used in January when the operator of Maze ransomware published nearly 10GB of private research
data belonging to Medical Diagnostic Laboratories after the latter refused to pay the Maze team a demanded ransom amount. Since
then, the operators of Sodinokibi and DoppelPaymer have adopted the hybrid model as well. The trend significantly heightens the risks of
organizations losing invaluable IP, trade secrets, and other sensitive data in future ransomware attacks.
Ransomware-as-a-Service (RaaS) continued to gain traction among cyber criminals in the first half of 2020 as well. One such threat we tracked
was Phobos, a ransomware-type that exploits the Remote Desktop Protocol (RDP) attack vector to gain initial access to a network. We
observed the malware to be capable of brute forcing credentials, using stolen credentials, or taking advantage of insecure connections on port
3389. The malware is being sold via a RaaS model, which has made it relatively easily available to even less sophisticated threat actors.
For organizations, malware like Phobos is another reminder to secure RDP servers. Poorly secured, internet-exposed RDP servers have
long been favorite targets for criminals looking for a way to gain initial access to an enterprise network. Numerous underground forums
and marketplaces sell relatively cheap access to previously hacked RDP servers so criminals in many cases don’t even have to do any
initial legwork of their own to break into one. Despite repeated warnings, hundreds of thousands of these systems remain accessible and
vulnerable to attack over the internet.
Sodinokibi, Nemty, and DeathRansom were three other ransomware types that we observed being distributed via a RaaS model in H1 2020.
An early version of DeathRansom that we analyzed did not actually encrypt files, however we found a more recent version that indeed does so.
Zooming out for a wider perspective, Figure 11 rebuts the fallacy of thinking “ransomware doesn’t affect companies like mine.” It reveals
that no industry was spared from ransomware activity over the first six months of the year. The five most heavily targeted sectors were
telcos, MSSP, education, government, and tech. Though healthcare is often associated with ransomware, it falls middle of the pack here.
7.1%
9.1%
10.8%
7.7%
9.9%
13.9%
13.1%
8.1%
9.9%
13.5%
11.9%
3.7%
12.1%
11.3%
15.8%
7.3%
10.6%
13.4%
20.3%
12.5%
Legal
Aerospace & Defense
Nonprofit
Banking/Finance/Insurance
Environmental
Agriculture
Consulting
Food & Beverage
Retail/Hospitality
Automotive
Media/Communications
Healthcare
Manufacturing
Transportation and Logistics
Energy & Utilities
Technology
Government
Education
MSSP
Telco/Carrier
0% 5% 10% 15% 20%
The success cyber criminals have had in extracting sizable ransoms from some victims almost certainly means we’ll see little letup in
ransomware activity for the foreseeable future. In fact, the rise in hybrid attacks and the growing availability of RaaS suggests that things are
only going to get worse before they get better. It’s not hopeless; however, there are quite a few effective ways to combat ransomware for
your organization.
15
H1 2020 Threat Landscape Report
Figure 12: Percentage of CVEs with exploits detected (left) and percent of organizations detecting those exploits (right) by year.
The Age of Exploitation
There’s been a resurgence of interest of late in efforts to model and predict the exploitation of vulnerabilities. In part, this goes back to
the long-standing defender’s dilemma of not having enough time or resources to fix everything flagged by the latest vuln scan. Another,
more recent driver is that the number of published vulnerabilities added to the CVE List has risen sharply over the last few years, mainly
because MITRE expanded the set of organizations authorized to assign CVEs to vulnerabilities. Easier, more comprehensive tracking
of CVEs is a good thing ... but it also means that list of things to fix only gets longer. And so prioritizing vulnerability remediation has
become increasingly important.
One way of doing this is to prioritize vulnerabilities that have actually been exploited in the wild. The challenge with this, of course, is that
knowing which CVEs have been exploited requires an expansive deployment of sensors to detect said exploitation. Thankfully, Fortinet has
that covered.
The horizontal axis in Figure 12 shows the percentage of CVEs published each year for which we detected exploit activity during the first
half of 2020. Overall, that ratio stands at 6%, but it’s easy to see that more recent CVEs (reddish color) show lower rates of exploitation. So
far, 2020 has the lowest exploitation rate (<1%) ever recorded in the 20+ year history of the CVE List! Part of that phenomenon ties back to
the aforementioned increase in CVEs and part simply reflects the fact that exploit development and distribution takes time.
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014 2015
2016
2017
2018
2019
2020
20%
40%
60%
0% 5% 10% 15%
Fraction of CVEs found in that year used in attacks
FractionoforgsattackedusingCVEsfromthatyear
The vertical axis in Figure 12 offers a different perspective. It reveals the percentage of organizations that detected exploit activity targeting
CVEs published each year. From this, it’s apparent that 2018 vulnerabilities claim the highest exploitation prevalence (65%), yet more than
a quarter of firms registered attempts to exploit CVEs from 15 years earlier in 2005. There’s a lesson there: Don’t assume old vulnerabilities
can’t cause new problems. The general pattern here, though, is that newer vulnerabilities tend to garner more widespread exploitation
(allowing for the time needed for at-scale exploits to be developed and distributed via legitimate and malicious hacking tools).
At the end of the day, all of this points to the fact that defenders increasingly contend with not only more vulnerabilities across their networks
but also more vulnerabilities that are actively being exploited in the wild. We understand the challenge of keeping up and hope analysis like
we’ve presented in this report makes it a little easier to do so. See you in our next edition, where we’ll examine how the latter half of 2020
shaped the cyber threat landscape.
1
Source: IDC Worldwide Security Appliance Tracker, April 2020 (based on annual unit shipments of Firewall, UTM, and VPN appliances)
Copyright © 2020 Fortinet, Inc. All rights reserved. Fortinet®
, FortiGate®
, FortiCare®
and FortiGuard®
, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law
trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other
results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied,
except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in
such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal
lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most
current version of the publication shall be applicable. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this
publication without notice, and the most current version of the publication shall be applicable.
www.fortinet.com
Threat-Report-H1-2020744120-0-0-EN

More Related Content

What's hot

Evolution of-exploit-kits
Evolution of-exploit-kitsEvolution of-exploit-kits
Evolution of-exploit-kitsArpit Sharma
 
Cisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportCisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportJames Gachie
 
Malware detection techniques for mobile devices
Malware detection techniques for mobile devicesMalware detection techniques for mobile devices
Malware detection techniques for mobile devicesijmnct
 
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICESMALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICESijmnct
 
CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문Jiransoft Korea
 
Microsoft Security Intelligence Report vol. 21
Microsoft Security Intelligence Report vol. 21Microsoft Security Intelligence Report vol. 21
Microsoft Security Intelligence Report vol. 21Ioannis Aligizakis, M.Sc.
 
Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0mobileironmarketing
 
Hii assessing the_effectiveness_of_antivirus_solutions
Hii assessing the_effectiveness_of_antivirus_solutionsHii assessing the_effectiveness_of_antivirus_solutions
Hii assessing the_effectiveness_of_antivirus_solutionsAnatoliy Tkachev
 
Security Software Supply Chains - Sonatype - DevSecCon Singapore March 2019
Security Software Supply Chains - Sonatype - DevSecCon Singapore March 2019Security Software Supply Chains - Sonatype - DevSecCon Singapore March 2019
Security Software Supply Chains - Sonatype - DevSecCon Singapore March 2019Cameron Townshend
 
AVG Android App Report Q3 2015
AVG Android App Report Q3 2015AVG Android App Report Q3 2015
AVG Android App Report Q3 2015AVG Technologies
 
Dev Secops Software Supply Chain
Dev Secops Software Supply ChainDev Secops Software Supply Chain
Dev Secops Software Supply ChainCameron Townshend
 
Honeypot Methods and Applications
Honeypot Methods and ApplicationsHoneypot Methods and Applications
Honeypot Methods and Applicationsijtsrd
 
AVG Community Powered Threat Report: Q1 2012
AVG Community Powered Threat Report: Q1 2012AVG Community Powered Threat Report: Q1 2012
AVG Community Powered Threat Report: Q1 2012AVG Technologies AU
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAnatoliy Tkachev
 
2019 04-18 -DevSecOps-software supply chain
2019 04-18 -DevSecOps-software supply chain2019 04-18 -DevSecOps-software supply chain
2019 04-18 -DevSecOps-software supply chainCameron Townshend
 

What's hot (18)

Evolution of-exploit-kits
Evolution of-exploit-kitsEvolution of-exploit-kits
Evolution of-exploit-kits
 
Cisco Annual Security Report 2016
Cisco Annual Security Report 2016Cisco Annual Security Report 2016
Cisco Annual Security Report 2016
 
Cisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportCisco 2016 Annual Security Report
Cisco 2016 Annual Security Report
 
Cisco Annual Security Report
Cisco Annual Security ReportCisco Annual Security Report
Cisco Annual Security Report
 
Malware detection techniques for mobile devices
Malware detection techniques for mobile devicesMalware detection techniques for mobile devices
Malware detection techniques for mobile devices
 
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICESMALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
 
CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문
 
Microsoft Security Intelligence Report vol. 21
Microsoft Security Intelligence Report vol. 21Microsoft Security Intelligence Report vol. 21
Microsoft Security Intelligence Report vol. 21
 
Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0
 
2016 Trends in Security
2016 Trends in Security 2016 Trends in Security
2016 Trends in Security
 
Hii assessing the_effectiveness_of_antivirus_solutions
Hii assessing the_effectiveness_of_antivirus_solutionsHii assessing the_effectiveness_of_antivirus_solutions
Hii assessing the_effectiveness_of_antivirus_solutions
 
Security Software Supply Chains - Sonatype - DevSecCon Singapore March 2019
Security Software Supply Chains - Sonatype - DevSecCon Singapore March 2019Security Software Supply Chains - Sonatype - DevSecCon Singapore March 2019
Security Software Supply Chains - Sonatype - DevSecCon Singapore March 2019
 
AVG Android App Report Q3 2015
AVG Android App Report Q3 2015AVG Android App Report Q3 2015
AVG Android App Report Q3 2015
 
Dev Secops Software Supply Chain
Dev Secops Software Supply ChainDev Secops Software Supply Chain
Dev Secops Software Supply Chain
 
Honeypot Methods and Applications
Honeypot Methods and ApplicationsHoneypot Methods and Applications
Honeypot Methods and Applications
 
AVG Community Powered Threat Report: Q1 2012
AVG Community Powered Threat Report: Q1 2012AVG Community Powered Threat Report: Q1 2012
AVG Community Powered Threat Report: Q1 2012
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
 
2019 04-18 -DevSecOps-software supply chain
2019 04-18 -DevSecOps-software supply chain2019 04-18 -DevSecOps-software supply chain
2019 04-18 -DevSecOps-software supply chain
 

Similar to Global threat-landscape report by fortinet.

Netscout threat report 2018
Netscout threat report 2018Netscout threat report 2018
Netscout threat report 2018Gabe Akisanmi
 
Trends for 2014: The Challenge of Internet Privacy
Trends for 2014: The Challenge of Internet PrivacyTrends for 2014: The Challenge of Internet Privacy
Trends for 2014: The Challenge of Internet PrivacyESET
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-naAndreas Hiller
 
Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014- Mark - Fullbright
 
State of Software Security - Public Companies Supplement
State of Software Security - Public Companies SupplementState of Software Security - Public Companies Supplement
State of Software Security - Public Companies Supplementstemkat
 
Centurylink 2018 threat report
Centurylink 2018 threat reportCenturylink 2018 threat report
Centurylink 2018 threat reportAndrew Prosser
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationPECB
 
2020-trustwave-global-security-report.pdf
2020-trustwave-global-security-report.pdf2020-trustwave-global-security-report.pdf
2020-trustwave-global-security-report.pdfOscarMauricioHernand9
 
Weekly UAV Threat Intelligence - DroneSec Notify #42
Weekly UAV Threat Intelligence - DroneSec Notify #42Weekly UAV Threat Intelligence - DroneSec Notify #42
Weekly UAV Threat Intelligence - DroneSec Notify #42DroneSec
 
WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s Website Security Statistics Report 2015WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s Website Security Statistics Report 2015Jeremiah Grossman
 
WatchGuard Internet Security Report
WatchGuard Internet Security ReportWatchGuard Internet Security Report
WatchGuard Internet Security ReportBAKOTECH
 
Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs
 
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapM-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapFireEye, Inc.
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...Cyber Security Alliance
 
M-Trends® 2010: The Advanced Persistent Threat
 M-Trends® 2010: The Advanced Persistent Threat M-Trends® 2010: The Advanced Persistent Threat
M-Trends® 2010: The Advanced Persistent ThreatFireEye, Inc.
 

Similar to Global threat-landscape report by fortinet. (20)

Netscout threat report 2018
Netscout threat report 2018Netscout threat report 2018
Netscout threat report 2018
 
Trends for 2014: The Challenge of Internet Privacy
Trends for 2014: The Challenge of Internet PrivacyTrends for 2014: The Challenge of Internet Privacy
Trends for 2014: The Challenge of Internet Privacy
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
 
Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014
 
State of Software Security - Public Companies Supplement
State of Software Security - Public Companies SupplementState of Software Security - Public Companies Supplement
State of Software Security - Public Companies Supplement
 
Centurylink 2018 threat report
Centurylink 2018 threat reportCenturylink 2018 threat report
Centurylink 2018 threat report
 
Cisco 2017 Midyear Cybersecurity Report
Cisco 2017 Midyear Cybersecurity ReportCisco 2017 Midyear Cybersecurity Report
Cisco 2017 Midyear Cybersecurity Report
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 
2020-trustwave-global-security-report.pdf
2020-trustwave-global-security-report.pdf2020-trustwave-global-security-report.pdf
2020-trustwave-global-security-report.pdf
 
Weekly UAV Threat Intelligence - DroneSec Notify #42
Weekly UAV Threat Intelligence - DroneSec Notify #42Weekly UAV Threat Intelligence - DroneSec Notify #42
Weekly UAV Threat Intelligence - DroneSec Notify #42
 
WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s Website Security Statistics Report 2015WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s Website Security Statistics Report 2015
 
AVG Q3 2012 Threat Report
AVG Q3 2012 Threat ReportAVG Q3 2012 Threat Report
AVG Q3 2012 Threat Report
 
IoT security Q3 2020 overview
IoT security Q3 2020 overview IoT security Q3 2020 overview
IoT security Q3 2020 overview
 
Comodo 2017 report
Comodo 2017 reportComodo 2017 report
Comodo 2017 report
 
WatchGuard Internet Security Report
WatchGuard Internet Security ReportWatchGuard Internet Security Report
WatchGuard Internet Security Report
 
Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs annual report 2017
Qrator Labs annual report 2017
 
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapM-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security Gap
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
 
M-Trends® 2010: The Advanced Persistent Threat
 M-Trends® 2010: The Advanced Persistent Threat M-Trends® 2010: The Advanced Persistent Threat
M-Trends® 2010: The Advanced Persistent Threat
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 

More from Reham Maher El-Safarini

More from Reham Maher El-Safarini (20)

Ux
Ux Ux
Ux
 
Dynamics AX/ X++
Dynamics AX/ X++Dynamics AX/ X++
Dynamics AX/ X++
 
Microsoft sql-and-the-gdpr
Microsoft sql-and-the-gdprMicrosoft sql-and-the-gdpr
Microsoft sql-and-the-gdpr
 
AWS Cloud economics
AWS Cloud economicsAWS Cloud economics
AWS Cloud economics
 
Cloud skills development
Cloud skills developmentCloud skills development
Cloud skills development
 
AWS cloud adoption framework (caf)
AWS cloud adoption framework (caf)AWS cloud adoption framework (caf)
AWS cloud adoption framework (caf)
 
Application and database migration workshop
Application and database migration workshopApplication and database migration workshop
Application and database migration workshop
 
Containers on AWS
Containers on AWSContainers on AWS
Containers on AWS
 
Security and governance with aws control tower and aws organizations
Security and governance with aws control tower and aws organizationsSecurity and governance with aws control tower and aws organizations
Security and governance with aws control tower and aws organizations
 
Digital transformation on aws
Digital transformation on awsDigital transformation on aws
Digital transformation on aws
 
Security in the cloud
Security in the cloudSecurity in the cloud
Security in the cloud
 
2. migration, disaster recovery and business continuity in the cloud
2. migration, disaster recovery and business continuity in the cloud2. migration, disaster recovery and business continuity in the cloud
2. migration, disaster recovery and business continuity in the cloud
 
1. aws overview
1. aws overview1. aws overview
1. aws overview
 
Pgp
PgpPgp
Pgp
 
ssl for securing
ssl for securingssl for securing
ssl for securing
 
03 unity 3_d_part_2
03 unity 3_d_part_203 unity 3_d_part_2
03 unity 3_d_part_2
 
02 unity 3_d_part_1
02 unity 3_d_part_102 unity 3_d_part_1
02 unity 3_d_part_1
 
01 unity 3_d_introduction
01 unity 3_d_introduction01 unity 3_d_introduction
01 unity 3_d_introduction
 
unity basics
unity basicsunity basics
unity basics
 
Introduction to OS.
Introduction to OS.Introduction to OS.
Introduction to OS.
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 

Global threat-landscape report by fortinet.

  • 1. Global Threat Landscape Report 1H 2020 AUGUST 2020 A Semiannual Report by FortiGuard Labs
  • 2. H1 2020 Threat Landscape Report 2 Table of Contents Overview and Key Findings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Top Threats During 1H 2020 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Vulnerabilities and Exploits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Malware Detections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Botnet Activity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Featured Threats and Trends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Exploiting a Global Pandemic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 From the DVR to the DMZ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 OT Threats, Past and Present . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Ransomware Spreads Its Wings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 The Age of Exploitation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
  • 3. 3 H1 2020 Threat Landscape Report 1H 2020 Overview and Key Findings Years down the road when we all reflect back on 2020, it’s unlikely that cybersecurity will displace the COVID-19 pandemic at the top of our collective memories. It’s an unprecedented series of events and we’ll be dealing with the aftermath for a long time to come. But that doesn’t change the fact that the first six months of 2020 also saw significant developments across the cyber threat landscape. Some trends relate to those aforementioned events, while others have their own drivers. We’re here to distill it all down so you enter the latter half of the year more prepared for whatever comes next. OT Threats After Stuxnet June marked the 10th anniversary of Stuxnet, which forever changed the way we view operational technology (OT) security. A lot has happened since then and the Ramsay espionage framework is the latest example of threat actors looking to infiltrate air-gapped industrial environments. Learn how to keep them out. The Perimeter Gets Personal Let’s do one more in the work-from-home (WFH) theme. Exploit attempts against several consumer-grade routers and IoT devices made our top IPS detections. We hate making spurious connections but can’t help but wonder if this also stems from criminals trying to take advantage of “The New Normal” of the network perimeter extending to the home. The Age of Exploitation So far, 2020 is on pace to shatter the record for the total number of disclosed vulnerabilities. But 2020 also has the lowest ratio ever recorded for vulnerabilities with active exploits in the wild. Will a lower percentage of a higher number mean more or less work for vulnerability management teams? Read on to find out. Ransomware Not Running Away An attack on a well-known manufacturer in June that interfered with their operations and caused temporary production interruptions at several of the company’s facilities capped another six months of ransomware activity targeted at enterprise organizations. The Rona Was Rampant The coronavirus spread quickly but it’s possible cyber criminals moved even quicker in distributing all manner of pandemic- themed lures and scams. We hit the high points so you don’t fall for their next scheme spawned from whatever global event we face next. Battle for the Browser Speaking of lures, web-based malware used in phishing and other campaigns outranked other delivery vectors early this year. We also noted a drop in corporate web traffic due to people surfing from home rather than the office. The combination of those two trends means firms need to button up those browsers.
  • 4. 4 H1 2020 Threat Landscape Report Top Threats During 1H 2020 The findings in this report represent the collective intelligence of FortiGuard Labs, drawn from a vast array of network sensors collecting billions of threat events observed in live production environments around the world. According to independent research,1 Fortinet has the largest security device footprint in the industry. This unique vantage offers excellent views of the cyber threat landscape from multiple perspectives that we’re glad to share with you. Vulnerabilities and Exploits IPS activity captured by our sensors reveal how adversaries recon and attempt to compromise vulnerable systems. Triggering one of these detection signatures doesn’t mean the attack succeeded, but it does provide good intelligence on which types of vulnerabilities and systems are actively in the crosshairs. Top platforms and technologies targeted by exploit activity in the first half of 2020 are plotted month over month in Figure 1. We’ve taken the liberty of highlighting those that show the greatest movement, with discussion following below. Figure 1: Most prevalent IPS detections by month during 1H 2020. ThinkPHP.Controller JAWS.DVR Joomla!.Core vBulletin.Routestring ThinkPHP.Request Bash.Function Drupal.Core ThinkPHP.HTTP Shenzhen.TVT NETGEAR.DGN1000 Dasan.GPON Apache.Struts HTTP.Unix PHP.CGI PHPUnit.Eval-stdin JAWS.DVR PHP.CGI ThinkPHP.Controller NETGEAR.DGN1000 ThinkPHP.Request PHPUnit.Eval-stdin HTTP.Unix Joomla!.Core vBulletin.Routestring Drupal.Core ThinkPHP.HTTP Dasan.GPON Apache.Struts Shenzhen.TVT Bash.Function 5% 10% 15% 20% 25% 30% Jan Feb Mar Apr May Jun OrganizationalPrevalence Let’s review the composition of the top detections before getting into the monthly shifts. With one exception (Shenzhen), the list of technologies on the left and right of the figure looks very similar to our prior reports. The seemingly constant presence of content management systems (CMS) like ThinkPHP, Joomla, Drupal, and vBulletin at the top of our charts serves as a reminder that these platforms receive a ton of flak from cyber artillery. We can’t stress enough that if your organization uses these tools, they must be diligently maintained. Setting aside the oft-discussed Apache Struts flaw tied to the Equifax breach of 2017, several other technologies fall in the network device category. We have a featured story on such devices later in this report, so we’ll leave it at that for now. Shenzhen, however, is worth calling out here because of its newbie status among the IPS elite. First discovered in 2018, it rocketed from nearly nowhere late last year to a peak as the second most prevalent detection during a week in February. This activity ties back to a single exploit targeting a remote code execution vulnerability in Shenzhen TVT DVR and OEM. The exploit contains indicators that may reflect an association with Lizard Squad, a group known for DDoS attacks against online gaming services. It’s yet another example of criminals looking to build massive botnets of consumer IoT devices for assorted schemes.
  • 5. 5 H1 2020 Threat Landscape Report Beyond listing the top targets, we chose this type of chart to highlight a few of the rather large shifts that occurred. A remote code execution (RCE) vulnerability in Bash was the major mover in January, with the first of several drops before settling into last place among the top-tier detections by the end of June. It should be noted that this vulnerability is basically the infamous Shellshock RCE that was discovered in 2014 and was considered to be worse than Heartbleed. February saw a major surge in detections related to an old argument injection vulnerability in PHP CGI. Another PHP-related detection surged in March, this time targeting another RCE flaw in PHPUnit. Shenzhen was once again a huge upstart in April and then a big downer in May. Now let’s adjust our search to focus on exploits that weren’t necessarily global chart toppers, but did achieve a measure of regional fame. These are featured in Figure 2. Zivif, TrueOnline, and Allegro offer additional examples of attempts to recon vulnerable IoT devices. It’s not always intuitive why certain exploits gain traction in a certain region, and TrueOnline, an ISP in Thailand, is a good case in point. Figure 2: Regionally prevalent IPS detections during 1H 2020 (percent of organizations). The vulnerability in view affects a modified version of a ZyXEL router that TrueOnline distributes to its (presumably Thai) customers. That begs the question of why the prevalence of detections in Latin America is so much higher than in Asia. The answer is fairly simple. The router’s firmware contains a language package, enabling international distribution. When ISPs were migrating from ADSL to VDSL circa 2016, ZyXEL routers became widely distributed across Latam countries. Current activity reflects that history. Switching gears again, we’ll take a look at IPS detections that exhibited unusually high prevalence within certain industries. We’ll call out a few high-level observations based on Figure 3 and leave it to you to review the details for your sector. We note that some of these (e.g., TAR-Archive and FTP.Login) are fairly easy to exploit and look like criminals hoping to take advantage of security slip-ups. DotNetNuke is a CMS based on .NET According to their website, the U.S. Department of Defense runs hundreds of public websites on DotNetNuke. That probably has something to do with the elevated rate of detections for the public sector. The bump for PostgreSQL exploits observed for MSSPs may indicate databases unintentionally left accessible to the internet. A Shodan search reveals hundreds of thousands of PostgreSQL databases, many of which are hosted in Amazon Web Services (AWS). Is your MSSP exposing your sensitive data? 8.2% 5.2% 10.5% 6.7% 4.5% 6.1% 9.0% 4.4% 3.2% 2.9% 2.2% 6.7% 3.6% 3.7% 3.8% 2.7% 8.8% 5.8% 2.1% 10.5% 11.4% 0.3% 0.3% 1.1% 0.4% 2.4% 9.4% 0.5% 5.6% 1.6% 0.9% 0.9% 1.3% 1.0% 0.6% 3.7% 0.4% 10.8% 15.4% 4.8% 1.8% 0.4% 4.2% 32.7% 11.1% 12.4% 15.2% 4.6% 23.1% Africa Asia Europe Latin America Middle East Northern America Oceania Pulse.Secure SonicWall.GMS Allegro.RomPager TrueOnline.ZyXEL Adobe.Reader Zivif.PR115-204-P-RS Sun.Java
  • 6. 6 H1 2020 Threat Landscape Report Figure 3: Industry-focused IPS detections during 1H 2020 (percent of organizations). In general, education institutions, media companies, MSSPs, and telcos have more hotspots than other industries. If your company falls into one of those groups, ensure defenses are ready to thwart a wider range of threats. On the other hand, notice how legal firms and nonprofits show a cool blue all the way down. That indicates we didn’t detect any particular threats that were abnormally prevalent or unique to those industries. That doesn’t mean those industries aren’t in the crosshairs; it just means they weren’t the target of many novel exploit attempts during the first part of the year. You’ll see in the next section that they don’t get off so easily when it comes to malware. Malware Detections Malware trends reflect adversary intent and capability. Similar to IPS detections, malware picked up by our sensors does not always indicate confirmed infections, but rather the weaponization and/or distribution of malicious code. Detections can occur at the network, application, and host level on an array of devices. Figure 4 ranks the most prevalent malware for each of the first six months of 2020. Similar to how we truncated IPS detections to focus on technologies, we’ve chosen to group malware into families, or categories, rather than specific variants. Our purpose in doing this is to group the numerous, often short-lived variants by their similarities so that we don’t miss the malware forest for the trees. 0.0% 0.0% 1.2% 0.8% 0.0% 0.0% 0.0% 1.2% 0.0% 0.4% 0.0% 0.0% 1.6% 0.0% 0.0% 0.0% 0.2% 0.0% 0.2% 0.1% 0.2% 0.5% 0.0% 0.1% 0.0% 0.5% 0.2% 0.2% 0.3% 1.8% 0.4% 0.0% 0.0% 0.0% 0.0% 0.5% 0.0% 0.2% 0.4% 0.6% 0.1% 0.0% 0.0% 0.0% 0.1% 0.1% 0.8% 0.4% 1.1% 1.4% 1.3% 0.3% 0.3% 0.3% 0.0% 0.3% 0.5% 0.4% 0.0% 0.1% 0.0% 0.1% 0.3% 0.4% 1.5% 0.0% 0.4% 0.4% 0.0% 0.0% 0.0% 0.0% 0.0% 0.2% 0.2% 1.1% 0.0% 0.0% 0.0% 0.0% 0.1% 1.3% 0.4% 0.6% 0.8% 0.8% 0.1% 0.1% 0.1% 0.4% 0.1% 0.2% 0.6% 0.6% 0.2% 0.0% 0.0% 0.1% 0.2% 0.0% 0.2% 0.0% 0.2% 0.0% 0.0% 0.0% 0.0% 0.0% 0.0% 0.1% 0.3% 0.8% 0.0% 0.0% 0.0% 0.2% 0.1% 0.1% 0.9% 0.5% 1.4% 0.0% 0.0% 0.1% 0.5% 2.1% 0.8% 1.4% 1.1% 0.8% 0.8% 0.3% 1.1% 0.6% 1.1% 0.2% 0.0% 0.1% 0.2% 0.0% 0.0% 0.0% 0.0% 0.2% 0.1% 0.3% 0.4% 0.8% 0.0% 0.0% 0.0% 0.0% 0.4% 0.3% 0.8% 0.6% 0.9% 0.4% 0.2% 0.1% 0.6% 0.6% 0.5% 1.3% 1.2% 1.5% 2.3% 0.4% 0.3% 0.5% 1.2% 0.1% 0.4% 0.3% 0.8% 0.1% 0.1% 0.2% 0.0% 0.1% Aerospace&Defense Agriculture Automotive Banking/Finance/Insurance Consulting Education Energy&Utilities Environmental Food&Beverage Government Healthcare Legal Manufacturing Media/Communications MSSP Nonprofit Retail/Hospitality Technology Telco/Carrier TransportationandLogistics Joomla!.com_media PostgreSQL.COPY WuFTP.Glob DotNetNuke.Cookie FTP.Login Mozilla.Multiple Java.Deserializing Java.Web TAR.Archive W32/Bancos JS/Miner Linux/Gafgyt CVE-2017-11882 VBA/Agent HTML/ScrInject JS/Agent AutoIt/Injector W32/Agent HTML/Phishing W32/Bancos JS/Miner HTML/ScrInject VBA/Agent W32/Injector AutoIt/Injector JS/Agent CVE-2017-11882 W32/Agent HTML/Phishing W32/Bancos VBA/Agent JS/Miner AutoIt/Injector HTML/ScrInject W32/Injector HTML/Phishing JS/Agent CVE-2017-11882 W32/Agent JS/Miner HTML/REDIR W32/Bancos HTML/ScrInject JS/Agent W32/Injector W32/Agent AutoIt/Injector HTML/Phishing CVE-2017-11882 JS/Miner VBA/Agent HTML/ScrInject JS/Agent W32/Bancos W32/Agent AutoIt/Injector W32/Injector HTML/Phishing CVE-2017-11882 JS/Miner W32/BDoor HTML/ScrInject HTML/REDIR HTML/Phishing W32/Bancos W32/Injector W32/Agent JS/Agent CVE-2017-11882 10 9 8 7 6 5 4 3 2 1 January February March April May June Rank Figure 4: Most prevalent malware categories by month during 1H 2020.
  • 7. 7 H1 2020 Threat Landscape Report Figure 5: Industry-focused malware detections during 1H 2020 (percent of organizations). One area of that forest that bears mention here is the HTML/Phishing family that includes all variants of web-based phishing lures and scams. They sit firmly atop the list in January and February and only drop out of the top five in June. Together with its HTML cousins of /ScrInject (browser script injection attacks) and /REDIR (browser redirection schemes), this demonstrates strong interest from cyber criminals to get us where we’re often most vulnerable and gullible—browsing the web. Web-based malware often obfuscates and/or bypasses conventional AV products, upping the chance of successful infection. That’s even more concerning because we noted a marked drop in corporate web traffic due to people surfing from home rather than the office. Savvy defenders should note that the browser was a prime delivery vector for malware in the first half of 2020 and act accordingly to ensure consistent controls for remote systems. The other part of the forest we’d like to spotlight from Figure 5 is malware that exploits CVE-2017-11882. This bug has been public for a few years now (the bug itself is much, much older), but it steadily climbed in prevalence over the first half of 2020 and held the #1 spot for four straight months. And we weren’t the only ones to note the increase. On April 1 (not a joke), the U.S. Secret Service (USSS) posted an alert about fraudulent COVID-19 emails using malicious attachments. A representative of the USSS’s Criminal Investigative Division told CSO Magazine that the malware spreaders were seeking to exploit CVE-2017-11882 for multiple campaigns. One that seems particularly mean purports to come from the U.S. Department of Health and Human Services (HHS) and informs the recipient that they’ve contracted COVID-19. Another targets medical equipment manufacturers with a (malware-laden) document sent via email asking them to provide equipment. Figure 5 follows the method used by Figure 3 to identify malware families that exhibit unusually high prevalence within certain industries. Scanning the columns, it’s apparent that no industry is blue all the way down. Every sector has at least one malware hot(ter) spot and some of them have several. 0.0% 0.0% 1.9% 1.9% 1.3% 0.6% 0.0% 0.0% 1.9% 0.6% 0.0% 0.6% 0.0% 0.0% 2.1% 1.5% 0.6% 0.3% 0.0% 0.0% 0.3% 0.3% 0.0% 0.3% 0.0% 0.0% 0.6% 0.7% 0.3% 1.2% 0.1% 0.0% 0.3% 0.3% 0.3% 1.6% 0.1% 0.1% 2.0% 0.8% 0.2% 0.2% 0.2% 0.1% 0.0% 0.4% 0.2% 0.8% 0.1% 0.0% 0.8% 0.3% 0.3% 0.2% 0.1% 0.0% 0.0% 0.1% 0.0% 0.9% 1.6% 0.4% 0.4% 1.5% 0.0% 0.0% 0.3% 0.1% 0.2% 0.3% 0.0% 1.5% 0.1% 0.1% 2.7% 0.9% 1.0% 0.3% 0.3% 0.1% 0.1% 0.4% 0.1% 1.2% 0.0% 0.0% 0.6% 0.6% 0.6% 0.6% 0.6% 0.0% 0.6% 0.6% 1.2% 0.6% 0.3% 0.1% 0.9% 0.3% 1.3% 0.9% 0.0% 0.0% 0.1% 0.3% 0.0% 1.1% 0.0% 0.1% 1.0% 2.4% 0.2% 0.3% 0.4% 0.0% 0.0% 0.2% 0.0% 0.2% 0.2% 0.0% 0.4% 1.4% 0.3% 0.3% 0.1% 0.1% 0.0% 0.2% 0.1% 0.6% 0.0% 0.0% 0.3% 0.3% 0.3% 0.0% 0.0% 0.0% 0.0% 1.2% 0.0% 0.3% 0.1% 0.0% 1.2% 0.8% 0.8% 0.5% 0.1% 0.1% 0.6% 0.4% 0.1% 2.3% 0.6% 0.0% 1.7% 0.5% 0.3% 0.5% 0.3% 0.2% 0.3% 0.3% 0.0% 0.6% 0.5% 0.0% 0.5% 2.2% 1.1% 0.0% 0.0% 1.6% 0.0% 1.1% 0.0% 1.1% 0.5% 0.0% 1.0% 0.2% 0.3% 0.0% 1.0% 0.2% 0.0% 0.5% 0.2% 1.2% 0.0% 0.0% 1.5% 0.8% 0.7% 0.7% 0.2% 0.0% 0.1% 0.3% 0.0% 1.0% 0.3% 0.0% 0.9% 0.8% 0.4% 0.9% 0.1% 0.0% 0.4% 0.5% 0.1% 1.3% 0.5% 1.2% 1.2% 1.2% 0.7% 0.2% 0.5% 0.0% 0.0% 1.2% 0.2% 1.2% 0.1% 0.0% 1.3% 1.1% 1.5% 0.9% 0.3% 0.2% 0.2% 0.5% 0.1% 0.8% Aerospace&Defense Agriculture Automotive Banking/Finance/Insurance Consulting Education Energy&Utilities Environmental Food&Beverage Government Healthcare Legal Manufacturing Media/Communications MSSP Nonprofit Retail/Hospitality Technology Telco/Carrier TransportationandLogistics MSWord/CVE20170199 Adware/Ewind!Android Riskware/FusionCore W32/CryptExe W32/Qjwmonkey W32/Dloader JS/Banker W32/PECompact!tr HTML/Redirector Adware/Bundlore PowerShell/Csvdwl W32/DarkMoon We realize malware names aren’t always clear—our threat encyclopedia should help with that—but some are intuitive. Telcos see more malware on Android devices, for instance. Adware roams the halls of academia. JS/Banker steals from government agencies and MSSPs more often than banks. PowerShell in the automotive industry raises an eyebrow. We could go on, but we’ll leave you to explore your sector as desired and transition on to our discussion of botnets. Hopefully these details help you focus security efforts on threats that matter most to your organization.
  • 8. 8 H1 2020 Threat Landscape Report Botnet Activity Whereas exploit and malware trends usually show the pre-compromise side of attacks, botnets give a post-compromise viewpoint. Once infected, systems often communicate with remote hosts, making this traffic an important part of monitoring the full scope of malicious activity. One lesson botnet data imparts every time we examine it is that pervasive and persistent control is a prized commodity among cyber criminals. A side effect of this is that activity for the top bots is remarkably consistent. Figure 6 illustrates this perfectly. The month-by-month rankings for prevalence are far more consistent than seen for IPS and malware detections. We’ve studied botnet persistence in prior reports and saw that enterprise security teams will typically identify botnet traffic and snuff out infected systems within a reasonable time frame. But botnets infecting small businesses and millions of consumer devices tend to stick around for quite a while. And that’s a lot of what we see here. Figure 6: Most prevalent botnet detections during 1H 2020 (not split vertical axis). Gh0st.Rat Mirai Mirai Gh0st.Rat Zeroaccess Pushdo Xtreme.RAT Sality Conficker Torpig.Mebroot Rockloader Ganiw Gozi Zeroaccess Pushdo Xtreme.RAT Sality Ganiw Conficker Torpig.Mebroot Gozi Rockloader Jan Feb Mar Apr May Jun 60% 70% 80% 0% 5% 10% 15% OrganizationalPrevalence The first two botnets in Figure 6, Mirai and Gh0st, predominate the chart and did so for the latter part of 2019 as well. Driven by apparent growing interest by attackers targeting old and new vulnerabilities in consumer IoT products, Mirai surged into first place among botnets by early May. This trend is noteworthy because it could suggest cyber criminals are seeking to gain a foothold in enterprise networks by exploiting devices that WFH employees might be using to connect to the enterprise network. In a sense, the corporate network perimeter has extended to the home—and that’s not a very comforting thought. Gh0st, an old malware-botnet crime family, was also leveraged for campaigns targeting WFH users and applications. Gh0st is a remote access botnet that allows an attacker to take full control of the infected system, log keystrokes, provide live webcam and microphone feeds, download and upload files, and other nefarious activities.
  • 9. 9 H1 2020 Threat Landscape Report Figure 7: Most prevalent botnets by region during 1H 2020 (percent of organizations). To better highlight variation that does exist among botnets, Figure 7 expands the list of chart-toppers from Figure 6 and compares them across regions. Mirai and Gh0st are still omnipresent, but it’s apparent that their activity is not uniform around the world. The proportion of organizations that detected traffic related to one of Mirai’s many variants, for example, is more than 20% higher in Europe than Asia. But Europe lands in third place for Gh0st activity. 0.5% 0.8% 0.9% 0.9% 1.0% 1.0% 1.0% 1.0% 1.1% 1.1% 1.2% 1.2% 1.2%1.2% 1.2% 1.4% 1.4% 1.5% 1.6% 1.7% 1.7% 1.9% 1.9% 1.9% 2.0% 2.0% 2.0% 2.0% 2.1% 2.1% 2.2% 2.2% 2.2% 2.3% 2.3% 2.3% 2.4% 2.4% 2.4% 2.5% 2.5% 2.5% 2.6% 2.6% 2.7% 2.7% 2.7% 2.7% 3.0% 3.1% 3.2% 3.2% 3.3% 3.4% 3.4% 3.4% 3.5% 3.5% 3.5% 3.7% 3.7% 3.7% 3.8% 3.8% 4.3% 4.4% 4.5% 4.6% 4.6% 4.7% 4.9% 5.0% 5.3% 5.4% 5.8% 5.9% 5.9% 6.1% 6.2% 6.2% 6.2% 6.3%6.4% 6.5% 6.8% 7.2% 7.3% 7.3% 7.4% 7.6% 8.1% 8.1% 8.3% 8.8%9.0%9.2% 9.5% 9.7% 10.0% 10.2% 10.4% 10.4% 10.5% 10.8% 10.9% 10.9% 11.4% 11.4% 11.7% 12.4% 12.4% 12.6% 12.8% 13.2% 14.1% 14.3% 14.7% 15.0% 15.9% 16.6% 17.4% 17.4% 19.3%19.7%20.0% 21.6% 58.0%59.2% 60.6%62.7% 63.3% 66.7% 68.3%70.7% 72.5%72.9% 78.0% 84.8% 85.3%85.6% Africa Asia Europe Latin America Middle East Northern America Oceania Emotet.Cridex njRAT Ramnit Nitol Zeus XorDDOS Rockloader Conficker FinFisher Necurs Gozi Mariposa Torpig.Mebroot Sality Xtreme.RAT Ganiw Zeroaccess Pushdo Gh0st.Rat Mirai As you move down Figure 7, some even stronger regional differences emerge. Gozi pops in Africa and FinFisher is particularly active in Asia. Emotet.Cridex is the only botnet shown that leads in Latin America. Sality jumps among organizations in the Middle East, and North America owns the Pushdo crown. Curiously, Oceania doesn’t take the #1 spot for any of the botnets shown here (though it’s a very close second for Mirai). Myriad factors account for such differences, including targeting, infrastructure, technology adoption, security configurations, and user behavior.
  • 10. 10 H1 2020 Threat Landscape Report Featured Threats and Trends Exploiting a Global Pandemic Security researchers and other vendors have written a lot already on the enormous impact that COVID-19 has had on cybersecurity. We’ve done so ourselves here, here, here, here, here, and more. Even so, it would be remiss of us to ignore the topic for that reason, especially in a report summing up threat activity in the first half of 2020. Predictably, cyber criminals of all shades—from opportunistic phishers to scheming nation-state actors—found some way to exploit the pandemic for their benefit. Organizations around the world were suddenly confronted with a situation where they had to support a majority of employees working from home. For attackers, the shift presented an unprecedented opportunity to break into enterprise networks by targeting weakly protected home networks, consumer devices, VPN connections, and video communication and collaboration tools. Figure 8: Comparison of COVID-related Google search trends and malicious COVID-themed URLs. COVID related IOCs (Trend) COVID Google search trends 0 2000 4000 6000 0 25 50 75 100 January February March April May June July Numberofuniquecovidrelatedurls GoogleTrends Indicators of threat activity began to emerge almost in lockstep with growing societal awareness of the scope and ramifications of the pandemic. Figure 8 illustrates this by comparing COVID-related Google search trends and COVID-themed malicious URLs picked up by our web filters. Many of the domains contained names such as “coronavirus,” “vaccine,” “chloroquine,” and “remdesvir” and were created to harvest credentials or distribute malware and spam. It shows how quickly attackers move to take advantage of major news developments and events with broad social impact. We also observed a sharp increase in malicious emails with documents purportedly containing pandemic-related guidance seemingly sent from trusted sources—such as the Centers for Disease Control and Prevention (CDC) and the World Health Organization (WHO). The operators of the Emotet banking Trojan were among the first to leverage the coronavirus scare to try and distribute their malware in this way. Over the following weeks and months, we observed a widening range of malicious activity involving the use of COVID-19-related lures. This included phishing and business email compromise schemes, nation-state backed campaigns, and ransomware attacks. Some examples of the several threats we tracked include:
  • 11. 11 H1 2020 Threat Landscape Report n the distribution of the AZORult information stealer via a website with a fake coronavirus infection-spread map; n a phishing campaign targeting Ukrainian military and intelligence targets by the Gamaredon APT group; n attacks against targets in mainland China by the Vietnam-affiliated APT32 group; n targeted attacks against South Korean organizations by the North Korea-linked Kimsuky APT group. Generally, organizations in the U.S., China, and Russia were the most frequent targets of coronavirus-themed attacks in the first half of 2020. Ransomware hidden in COVID-19-themed messages, attachments, and documents was another threat. We tracked three ransomware samples that fell into this category in H1 2020 —NetWalker, Ransomware-GVZ, and CoViper. Of the three, CoViper was especially pernicious because it rewrote the computer’s master boot record (MBR) before encrypting data. We have observed several attacks in the past where adversaries have used MBR wipers in combination with ransomware to effectively cripple the PC. Toward the end of the first half of the year, there were also several reports of potentially state-backed threat groups attacking organizations involved in COVID-19-related research in the U.S. and other countries. It’s unclear how damaging—or not—the pandemic-related malicious activity in the first half of this year may have been ultimately. But for many organizations, the attacks highlighted the need for better approaches—including zero-trust models—for protecting their networks against threats posed by workers connecting from weakly protected home networks. It also emphasizes the importance that defenders keep an eye on the news to stay ahead of the threat du jour. From the DVR to the DMZ The recent surge in remote work as a result of the COVID-19 pandemic has focused considerable attention on the security of routers, DVRs, and other internet-connected devices at home. One concern is that attackers can exploit the subpar security in these systems to try and gain a foothold on enterprise networks or on devices that WFH employees might be using to connect to the enterprise network. Another issue is that attackers can exploit these devices to quickly assemble massive botnets—in Mirai-like fashion—that can be used to launch DDoS attacks or distribute malware. Figure 9: IPS detections targeting common network device brands during 1H 2020. Shenzhen Netcore Linksys D-Link 0 100k 200k 300k 400k January February March April May June TotalIoTDeviceDetections
  • 12. 12 H1 2020 Threat Landscape Report In the first half of 2020 we saw plenty of evidence to suggest sustained attacker interest in exploiting old and new vulnerabilities in consumer-focused IoT products. We’ve already discussed the dramatic increase in malicious activity targeting the flaw in Shenzhen TVT DVRs, so we won’t elaborate on that again here. Another vulnerability that elicited a lot of attacker interest in the first half of 2020 involved D-Link routers. The command execution flaw exists in multiple D-Link router models and gives attackers a way to take complete control of a vulnerable device. We observed most of the malicious activity targeting this vulnerability happening in May and June. Though the volume of attacks and the number of devices targeted was higher—around 160,000 at the peak—compared to the Shenzhen DVR flaw, this was substantial enough to suggest a high level of attacker interest. The most sustained high-volume attack activity that we observed, though, impacted Netcore/Netis routers. From January through the end of June, threat actors kept relentlessly pounding away at a hard-coded password security bypass issue in Netcore/Netis routers. The backdoor vulnerability was first discovered in August 2014 and has since then been one of the top triggered IPS signatures we have tracked. During the peak of the attacks in May, we collected well over 60 million hits from this signature. An authentication-bypass vulnerability in Linksys routers and another remote command execution flaw in Linksys E-Series routers were two other router flaws that received considerable attention from attackers in the first half of 2020. Attackers have already successfully exploited some of these flaws to assemble dangerously large botnets. One example is Dark Nexus, an IoT botnet that emerged in the first half of this year, consisting of thousands of exploited ASUS and D-Link routers. Mozi, a peer-to-peer botnet that was also identified by researchers in the first half of 2020, is another botnet built from exploited routers and DVRs including D-Link devices with the command execution flaw referenced above. The presence of such vulnerable devices on home networks significantly expands the attack surface for organizations with a large number of remote workers. Thus, organizations should evaluate options for achieving the same level of protection for WFH employees as they had in the office. OT Threats, Past and Present On the opposite end of the spectrum from IT devices featured in the previous section are operational technologies (OT). The prevalence of threats targeting supervisory control and data acquisition (SCADA) systems and other types of industrial control systems (ICS) is understandably much less than IT, but that fact in no way diminishes their importance. Figure 10 provides a breakdown of exploit detections targeting ICS manufacturers and components. If you’re not responsible for managing OT, you might have missed an important anniversary this past June. 2020 marks 10 years since the discovery of Stuxnet, the malicious worm that made headlines by sabotaging industrial facilities critical to the nuclear program in Iran. Since that momentous event, there have been many instances of sophisticated cyberattacks on OT systems worldwide. This may be due in part to the fact that OT networks are now increasingly connected to the internet, making them more vulnerable to attack. That hypothesis is supported by our “State of Operational Technology and Cybersecurity Report” that found 74% of OT organizations had experienced a malware intrusion in the past 12 months!
  • 13. 13 H1 2020 Threat Landscape Report In terms of more recent developments in the realm of OT threats, two in particular caught our attention in the first half of 2020. January saw a surge across our IPS sensors in the U.S., Brazil, and Germany of activity involving Modbus TCP servers and programmable logic controllers (PLCs) that could result in information leakage. This helped make Modbus-related detections the most voluminous of all OT systems featured in Figure 10. Note, however, that all triggers of this signature aren’t necessarily malicious. But it’s worth monitoring because an attacker infiltrating the SCADA network could certainly cause trouble by accessing the Modbus controller. The second noteworthy development came in May when researchers uncovered Ramsay, an espionage framework designed for the collection and exfiltration of sensitive files within air-gapped or highly restricted networks. OT environments fit those characteristics, which is why we mention it here. It’s not quite clear how long Ramsay has been active, but it’s been tied to an older APT group, Darkhotel. As their name suggests, Darkhotel is more known for exploiting hotel Wi-Fi networks than industrial facilities, but we’re more interested in Ramsay’s potential than its progenitors. Fortinet is one of the few security vendors committed to protecting and securing OT operations, especially those that are part of critical infrastructures. You can read more here about the unique challenges of securing operational technology environments and how we can help. Ransomware Spreads Its Wings An attack on a well-known manufacturer in June that interfered with their operations and caused temporary production interruptions at several of the company’s facilities capped another six months of ransomware activity targeted at enterprise organizations. Security researchers identified the malware used in the attack as EKANS (which is sometimes referred to publicly as Snake), a ransomware sample with several features tailored to attack systems in ICS. Our analysis of the malware showed it to be heavily obfuscated, written in the GO programming language, and not very different from other ransomware tools except for its targeting of OT and ICS systems. The attack—and the use of EKANS—was troubling because it suggested that adversaries might be broadening the focus of ransomware attacks to OT environments as well. Over the course of the first half of 2020 we analyzed activity specific to several other ransomware threats, including the COVID-19-themed ones mentioned in the previous section. One trend we observed was an increase in ransomware incidents where adversaries not only locked a victim organization’s data but stole it as well and used the threat of widescale release as additional leverage to try and extort a ransom payment. Figure 10: Prevalence and volume of IPS detections involving industrial systems. 3S-Smart 7-Technologies ABB Advantech Allen AzeoTech BlackIce BMC Broadwin Cambium Citect CoDeSys Cogent Dahua DATAC Delta Digium DNP3 Eaton Ecava Fatek Fuji Galil GE Geutebruck Hikvision Honeywell Iconics InduSoft Intellicom KingScada Measuresoft Meteocontrol Microsys Mitsubishi Modbus Moxa OMRON Panasonic Phoenix Progea QNX RealFlex Rockwell SafeNet Samsung Schneider SearchBlox Siemens Sinapsi Sixnet Sunway TeeChart Triangle Trihedral Unitronics VIPA WECON WellinTech WindRiver Wonderware Yokogawa 100 100k 100m 1 in 100k 1 in 10k 1 in 1k 1 in 100 1 in 10 Organizational Prevalence TotalVolume
  • 14. 14 H1 2020 Threat Landscape Report Figure 11: Percent of organizations detecting ransomware during 1H 2020. One example is DoppelPaymer, a ransomware used in attacks against a supplier of custom parts to the automotive and aerospace industries, a NASA contractor, and the city of Torrance, California. Our analysis showed Doppelpaymer to both encrypt files and offload them to a website where the data is published if the victim refuses to pay the demanded ransom. The tactic was first observed being used in January when the operator of Maze ransomware published nearly 10GB of private research data belonging to Medical Diagnostic Laboratories after the latter refused to pay the Maze team a demanded ransom amount. Since then, the operators of Sodinokibi and DoppelPaymer have adopted the hybrid model as well. The trend significantly heightens the risks of organizations losing invaluable IP, trade secrets, and other sensitive data in future ransomware attacks. Ransomware-as-a-Service (RaaS) continued to gain traction among cyber criminals in the first half of 2020 as well. One such threat we tracked was Phobos, a ransomware-type that exploits the Remote Desktop Protocol (RDP) attack vector to gain initial access to a network. We observed the malware to be capable of brute forcing credentials, using stolen credentials, or taking advantage of insecure connections on port 3389. The malware is being sold via a RaaS model, which has made it relatively easily available to even less sophisticated threat actors. For organizations, malware like Phobos is another reminder to secure RDP servers. Poorly secured, internet-exposed RDP servers have long been favorite targets for criminals looking for a way to gain initial access to an enterprise network. Numerous underground forums and marketplaces sell relatively cheap access to previously hacked RDP servers so criminals in many cases don’t even have to do any initial legwork of their own to break into one. Despite repeated warnings, hundreds of thousands of these systems remain accessible and vulnerable to attack over the internet. Sodinokibi, Nemty, and DeathRansom were three other ransomware types that we observed being distributed via a RaaS model in H1 2020. An early version of DeathRansom that we analyzed did not actually encrypt files, however we found a more recent version that indeed does so. Zooming out for a wider perspective, Figure 11 rebuts the fallacy of thinking “ransomware doesn’t affect companies like mine.” It reveals that no industry was spared from ransomware activity over the first six months of the year. The five most heavily targeted sectors were telcos, MSSP, education, government, and tech. Though healthcare is often associated with ransomware, it falls middle of the pack here. 7.1% 9.1% 10.8% 7.7% 9.9% 13.9% 13.1% 8.1% 9.9% 13.5% 11.9% 3.7% 12.1% 11.3% 15.8% 7.3% 10.6% 13.4% 20.3% 12.5% Legal Aerospace & Defense Nonprofit Banking/Finance/Insurance Environmental Agriculture Consulting Food & Beverage Retail/Hospitality Automotive Media/Communications Healthcare Manufacturing Transportation and Logistics Energy & Utilities Technology Government Education MSSP Telco/Carrier 0% 5% 10% 15% 20% The success cyber criminals have had in extracting sizable ransoms from some victims almost certainly means we’ll see little letup in ransomware activity for the foreseeable future. In fact, the rise in hybrid attacks and the growing availability of RaaS suggests that things are only going to get worse before they get better. It’s not hopeless; however, there are quite a few effective ways to combat ransomware for your organization.
  • 15. 15 H1 2020 Threat Landscape Report Figure 12: Percentage of CVEs with exploits detected (left) and percent of organizations detecting those exploits (right) by year. The Age of Exploitation There’s been a resurgence of interest of late in efforts to model and predict the exploitation of vulnerabilities. In part, this goes back to the long-standing defender’s dilemma of not having enough time or resources to fix everything flagged by the latest vuln scan. Another, more recent driver is that the number of published vulnerabilities added to the CVE List has risen sharply over the last few years, mainly because MITRE expanded the set of organizations authorized to assign CVEs to vulnerabilities. Easier, more comprehensive tracking of CVEs is a good thing ... but it also means that list of things to fix only gets longer. And so prioritizing vulnerability remediation has become increasingly important. One way of doing this is to prioritize vulnerabilities that have actually been exploited in the wild. The challenge with this, of course, is that knowing which CVEs have been exploited requires an expansive deployment of sensors to detect said exploitation. Thankfully, Fortinet has that covered. The horizontal axis in Figure 12 shows the percentage of CVEs published each year for which we detected exploit activity during the first half of 2020. Overall, that ratio stands at 6%, but it’s easy to see that more recent CVEs (reddish color) show lower rates of exploitation. So far, 2020 has the lowest exploitation rate (<1%) ever recorded in the 20+ year history of the CVE List! Part of that phenomenon ties back to the aforementioned increase in CVEs and part simply reflects the fact that exploit development and distribution takes time. 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 20% 40% 60% 0% 5% 10% 15% Fraction of CVEs found in that year used in attacks FractionoforgsattackedusingCVEsfromthatyear The vertical axis in Figure 12 offers a different perspective. It reveals the percentage of organizations that detected exploit activity targeting CVEs published each year. From this, it’s apparent that 2018 vulnerabilities claim the highest exploitation prevalence (65%), yet more than a quarter of firms registered attempts to exploit CVEs from 15 years earlier in 2005. There’s a lesson there: Don’t assume old vulnerabilities can’t cause new problems. The general pattern here, though, is that newer vulnerabilities tend to garner more widespread exploitation (allowing for the time needed for at-scale exploits to be developed and distributed via legitimate and malicious hacking tools). At the end of the day, all of this points to the fact that defenders increasingly contend with not only more vulnerabilities across their networks but also more vulnerabilities that are actively being exploited in the wild. We understand the challenge of keeping up and hope analysis like we’ve presented in this report makes it a little easier to do so. See you in our next edition, where we’ll examine how the latter half of 2020 shaped the cyber threat landscape. 1 Source: IDC Worldwide Security Appliance Tracker, April 2020 (based on annual unit shipments of Firewall, UTM, and VPN appliances)
  • 16. Copyright © 2020 Fortinet, Inc. All rights reserved. Fortinet® , FortiGate® , FortiCare® and FortiGuard® , and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable. www.fortinet.com Threat-Report-H1-2020744120-0-0-EN