The pandemic’s work-from-home reality resulted in an unprecedented change for organizations as they fought to defend exponentially greater attack surfaces from cybercriminals armed with powerful cloud-based tools, cloud storage and endless targets. As working environments evolved, so did the methods of threat actors and other motivated perpetrators, as detailed in the SonicWall report.
Threat actors eyeing remote workforces
“2020 offered a perfect storm for cybercriminals and a critical tipping point for the cyber arms race,” said SonicWall President and CEO Bill Conner.
“The pandemic — along with remote work, a charged political climate, record prices of cryptocurrency, and threat actors weaponizing cloud storage and tools — drove the effectiveness and volume of cyberattacks to new highs. This latest threat intelligence offers a look at how cybercriminals shifted and refined their tactics, painting a picture of what they are doing amid the uncertain future that lies ahead.”
The report highlights how COVID-19 provided threat actors with ample opportunity for more powerful, aggressive and numerous attacks, thriving on the fear and uncertainty of remote and mobile workforces navigating corporate networks from home.
“There is no code of conduct when it comes to cybercriminals, their methods of attacks and the selection of their targets,” said Conner.
“Technology is moving at an unprecedented rate. Threats that were once thought to be two or three years away are now a reality, with do-it-yourself, cloud-based tools creating an army of cybercriminals armed with the same devastating force and impact of a nation-state or larger criminal enterprise. Organizations must remain vigilant and proactive in hardening their cybersecurity posture.”
The report goes inside the stories that headlined 2020, and takes a closer look at new and disruptive cyber threats to provide insight into the evolving cyber threat landscape.
Ransomware reaches new heights with increasingly targeted attacks: A 62% increase in ransomware globally, and 158% spike in North America, points to cybercriminals using more sophisticated tactics and more dangerous variants, like Ryuk, to earn an easy payday.
Ryuk ransomware rises from obscurity, sees astronomical increase: First identified in August 2018, Ryuk did not appear outside of North America, Europe or Asia as late as January 2020. The following month, Ryuk began climbing the charts, eventually overtaking top-ranking Cerber ransomware. With 109.9 million cases detected worldwide, Ryuk was logged nearly every eight seconds in September alone.
More ‘never-before-seen’ malware variants identified: 268,362 ‘never-before-seen’ malware variants were discovered in 2020, a 74% year-over-year increase.
Malicious Office files surpass last year’s preferred PDFs: The research shows the shift to employees working from home full-time could be directly linked to the increased utilization of Office files and PDFs as malicious vehicles armed with phishing URLs, embedded malicious files and other dangerous exploits. New data indicates a 67% increase in malicious Office files in 2020, while malicious PDFs dropped 22%.
Cryptojacking returns as cryptocurrency breaks records: Once thought to be a dying attack vector after the industry’s major mining operation boarded its online service, cryptojacking is back thanks to rising cryptocurrency values and its appeal of concealed payouts. Total cryptojacking for 2020 set records with 81.9 million hits, a 28% increase from last year’s 64.1 million total.
IoT malware increases as pandemic creates potential network of disruption: In March 2020, masses of employees packed their personal office belongings and equipment to work from home for months on end, simultaneously creating an explosion of new attack vectors. In 2020, threat researchers recorded 56.9 million IoT malware attempts, a 66% increase that showed shifting tactics for lurking cybercriminals.
Intrusion attempts up as attack patterns change: The distribution of intrusion attacks took on an entirely new character as a result of the changes brought on by the pandemic. In 2020, Directory Traversal tactics (34%) took over the top spot after a tie with remote code execution (21% for both) in 2019.
Retail, healthcare and government face mounting ransomware volume: Industry-specific ransomware data reflects the impact cybercriminals had on retail (365%), healthcare (123%) and government (21%) sectors over the course of the pandemic.