Trend Micro recently releases its 2019 Mid Year Security Roundup: Evasive Threats, Pervasive Effective and found that organizations are dealing with a wide range of security threats, from ransomware and malware to phishing and high impact vulnerabilities. 

The report found that in the first half of 2019, attackers were more strategic when selecting ransomware targets, focusing mostly on large enterprises and government entities. The infamous WannaCry ransomware, which devastated organizations worldwide in 2017, remained the most detected ransomware strain by a landslide, followed by LockerGoga, RobbinHood, Ryuk, BitBaymer, and MegaCotex.  The WannaCy ransomware was detected between 40,000 and 45,000 times during the first half of 2019. 

LockerGoga infected Norsk Hydro leaving the company with $5 million in incurred losses, RobinHood infected systems at the City of Baltimore and left the city to pay $5.3 million to repair systems after the attack, and Ryuk infected systems at Lake City and Key Biscayne which forced both cities to pay the ransom to recover encrypted files and systems.

Threat actors were also spotted using fileless techniques to distribute cryptocurrency mining malware, ransomware, and banking trojans. All these threats involved PowerShell abuse. 

The report also found that Business Email Compromise (BEC) scams increased by over 50% compared to the second half of 2018, with attackers generally impersonating CEOs or other high-level executives to trick employees into transferring funds to their bank accounts. It was also reported last month by the Financial Crimes Enforcement Network (FinCEN) that cybercriminals conducting BEC scams make over $300 million per month from US victims alone. 

The number of zero-day vulnerabilities detected is also on the rise, with the report stating between January 2019 and June 219 there were 40 rated as Critical, 335 listed as High, 101 as Medium, and 107 as Low. 

To defend against this range of security threats, NNT suggests adopting the CIS Controls. The CIS Controls represent 20 critical areas that we must address in order to defend against today's most common and pervasive attacks. 

The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)

[email protected]

United Kingdom

5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023

 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.