Netskope: Attackers Double Down On Social Engineering Techniques & Malicious Functionalities Leading To Sharp Increase In Malware Downloads

- Advertisement -

Netskope, a leader in Secure Access Service Edge (SASE), today unveiled new research confirming that attackers are finding new ways to evade detection and blend in with normal network traffic using HTTP and HTTPS to deliver malware. In its latest Cloud & Threat Report: Global Cloud and Web Malware Trends, Netskope identified that on average, five out of every 1,000 enterprise users attempted to download malware in Q1 2023, and new malware families and variants represented 72% of those malware downloads. 

Social Engineering and Search Engine Data Voids on the Rise

In the research, Netskope uncovered that nearly 10% of all malware downloads in Q1 were referred from search engines. These downloads mostly resulted from weaponized data voids, or combinations of search terms that have very few results, which means that any content matching those terms is likely to appear very high in the search results. This represents just one of many social engineering techniques that attackers are accelerating.

- Advertisement -

Social engineering as a whole continues to dominate as a leading malware infiltration technique with attackers abusing not only search engines, but email, collaboration apps, and chat apps to trick their victims. As the top two malware types, Trojans accounted for 60% of malware downloads in Q1 and phishing downloads accounted for 13%.

Evaluation of Primary Communication Channels for Attackers 

For the first time in its quarterly cloud and threat reporting, Netskope analyzed attacker communication channels. Researchers found that attackers, in order to consistently evade detection, have used HTTP and HTTPS over ports 80 and 443 as their primary communication channel. In fact, of the new malware executables analyzed by Netskope that communicated with external hosts, 85% did so over port 80 (HTTP) and 67% did so over port 443 (HTTPS). This approach enables attackers to easily go unnoticed and blend in with the abundance of HTTP and HTTPS traffic already on the network. 

Additionally, to evade DNS-based security controls, some malware samples sidestep DNS lookups, instead reaching out directly to remote hosts using their IP addresses. In Q1 2023, most malware samples that initiated external communications did so using a combination of IP addresses and hostnames, with 61% communicating directly with at least one IP address and 91% communicating with at least one host via a DNS lookup.

“Job number one for attackers is finding new ways to cover their tracks as enterprises put more resources into threat detection, but these findings indicate just how easy it still is for attackers to do so in plain sight,” said Ray Canzanese, Threat Research Director, Netskope Threat Labs. “As attackers gravitate towards cloud services that are widely used in the enterprise and leverage popular channels to communicate, cross-functional risk mitigation is more necessary than ever.” 

Extended Look into Global Cloud and Web Malware Trends

Other notable findings uncovered by Netskope’s research team include: 

  • 55% of HTTP/HTTPS malware downloads came from cloud apps, up from 35% for the same period one year earlier. The primary driver of the increase is an increase in malware downloads from the most popular enterprise cloud applications, with Microsoft OneDrive tracked as the most popular enterprise app by a wide margin.
  • The number of applications with malware downloads also continued to increase, reaching a high of 261 distinct apps in Q1 2023. 
  • Only a small fraction of total web malware downloads were delivered over web categories traditionally considered risky. Instead, downloads are spread out among a wide variety of sites, with content servers (CDNs) responsible for the largest slice, at 7.7%.

As enterprises work to defend against the onslaught of malware, cross-functional collaboration across multiple teams is required, including network, security operations, incident response, leadership, and even individual contributors. Some of the additional steps organizations can take to reduce risks include:  

  • Inspect all HTTP and HTTPS downloads, including all web and cloud traffic, to prevent malware from infiltrating your network
  • Ensure that security controls recursively inspect the content of popular archive files and that high-risk file types are thoroughly inspected 
  • Configure policies to block downloads from apps that are not used in your organization to reduce risk surface.
- Advertisement -

Related Artcles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Buzz

1Q23: Indian PC Shipments Fall 35% YoY, Still Above Pre-Pandemic Levels

0
Tablet shipments in India fell below the million-unit mark for the first time in two years As per the latest report from Canalys for Q1...

Tata Group Subsidiary To Set Up EV Battery Plant in Gujarat

0
Sources said that the decision to set up the EV battery plant at Sanand was taken around a week ago at a Tata...

MeitY Transfers Li-ion Battery Recycling Tech To Recycling Industry

0
The secondary raw materials could be used for battery manufacturing or in other potential applications Under the 'Promote Circularity Campaign' of Mission LiFE, the Ministry...

Exclusive

1Q23: Indian PC Shipments Fall 35% YoY, Still Above Pre-Pandemic Levels

0
Tablet shipments in India fell below the million-unit mark for the first time in two years As per the latest report from Canalys for Q1...

US PC Shipments Hit; Declined 28% Y-o-Y in 1Q23

0
Strong iPad performance led tablets shipments to perform relatively better Canalys forecasts the US PC shipments in 2024 to be 13% higher than...

IoT Analytics Lowers Five-Year IoT Market Outlook

0
The amount of money invested in global IoT start-ups decreased significantly in the last 12 months. Several major companies that were selling IoT...

Important Sectors

Tata Group Subsidiary To Set Up EV Battery Plant in Gujarat

0
Sources said that the decision to set up the EV battery plant at Sanand was taken around a week ago at a Tata...

MeitY Transfers Li-ion Battery Recycling Tech To Recycling Industry

0
The secondary raw materials could be used for battery manufacturing or in other potential applications Under the 'Promote Circularity Campaign' of Mission LiFE, the Ministry...

Centre Considers Cutting Import Duty On Solar Panels

0
The renewable energy ministry held talks with the finance ministry to reduce import duty on solar panels by half As per the latest report from...

Modified Semicon India: Govt Invites Applications For Setting Up Semicon & Display Fabs

0
Under the Modified Programme, a financial incentive of 50% of the project cost will be provided for setting up of semiconductor/ display fabs in...

British Gas Unveils The New Hive EV Charger

0
British Gas only provides £100 in credit to Hive customers who move to the EV rate and £50 in Hive vouchers with every order...

Manufacturing

Tata Group Subsidiary To Set Up EV Battery Plant in Gujarat

0
Sources said that the decision to set up the EV battery plant at Sanand was taken around a week ago at a Tata...

Centre Considers Cutting Import Duty On Solar Panels

0
The renewable energy ministry held talks with the finance ministry to reduce import duty on solar panels by half As per the latest report from...

Modified Semicon India: Govt Invites Applications For Setting Up Semicon & Display Fabs

0
Under the Modified Programme, a financial incentive of 50% of the project cost will be provided for setting up of semiconductor/ display fabs in...

British Gas Unveils The New Hive EV Charger

0
British Gas only provides £100 in credit to Hive customers who move to the EV rate and £50 in Hive vouchers with every order...

MeitY Invites Applications For Incentives Under PLI 2.0 For IT Hardware

0
The ministry notified the scheme on May 29 and plans to open the window of applications from June 01, 2023 With the aim to push...