Trend Micro recently releases its 2019 Mid Year Security Roundup: Evasive Threats, Pervasive Effective and found that organizations are dealing with a wide range of security threats, from ransomware and malware to phishing and high impact vulnerabilities. 

The report found that in the first half of 2019, attackers were more strategic when selecting ransomware targets, focusing mostly on large enterprises and government entities. The infamous WannaCry ransomware, which devastated organizations worldwide in 2017, remained the most detected ransomware strain by a landslide, followed by LockerGoga, RobbinHood, Ryuk, BitBaymer, and MegaCotex.  The WannaCy ransomware was detected between 40,000 and 45,000 times during the first half of 2019. 

LockerGoga infected Norsk Hydro leaving the company with $5 million in incurred losses, RobinHood infected systems at the City of Baltimore and left the city to pay $5.3 million to repair systems after the attack, and Ryuk infected systems at Lake City and Key Biscayne which forced both cities to pay the ransom to recover encrypted files and systems.

Threat actors were also spotted using fileless techniques to distribute cryptocurrency mining malware, ransomware, and banking trojans. All these threats involved PowerShell abuse. 

The report also found that Business Email Compromise (BEC) scams increased by over 50% compared to the second half of 2018, with attackers generally impersonating CEOs or other high-level executives to trick employees into transferring funds to their bank accounts. It was also reported last month by the Financial Crimes Enforcement Network (FinCEN) that cybercriminals conducting BEC scams make over $300 million per month from US victims alone. 

The number of zero-day vulnerabilities detected is also on the rise, with the report stating between January 2019 and June 219 there were 40 rated as Critical, 335 listed as High, 101 as Medium, and 107 as Low. 

To defend against this range of security threats, NNT suggests adopting the CIS Controls. The CIS Controls represent 20 critical areas that we must address in order to defend against today's most common and pervasive attacks. 

Learn more about the CIS Controls by downloading our solution brief

NNT Suite of Products

change tracker gen7r2 logo

Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!

fastcloud logo

Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.

log tracker logo logo

Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.

vulnerability tracker logo

Continuously scan and identify vulnerabilities with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

USA Offices
New Net Technologies LLC
Suite #10115, 9128 Strada Place
Naples, Florida, 34108
1175 Peachtree St NE
Atlanta, Georgia, 30361.
4145 SW Watson, Suite 350
Beaverton, Oregon, 97005.

Tel: (844) 898-8358
email [email protected]
UK Office
New Net Technologies Ltd
Rivers Lodge, West Common
Harpenden, Hertfordshire

Tel: 01582 287310
email [email protected]
CIS benchmarking SEWP Cybersecurity 500Sans Institute Now Certified IBM Security
Copyright 2019, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.