The Recycler
  • Katun web banner December 2022 NEW
  • G&G Feb 24 Masthead Banner
  • Biuromax Masthead web banner March 2024

HP discusses latest threat insights report

August 11, 2022

The HP Wolf Security report highlights the latest techniques and phishing lures targeting employees and putting companies at risk.

HP Inc. issued its quarterly Threat Insights Report revealing that a wave of cybercriminals spreading malware families, including QakBot, IceID, Emotet, and RedLine Stealer, are shifting to shortcut (LNK) files to deliver malware. Shortcuts are replacing Office macros, which are starting to be blocked by default in Office, as a way for attackers to get a foothold within networks by tricking users into infecting their PCs with malware.

This access can be used to steal valuable company data, or sold on to ransomware groups, leading to large-scale breaches that could stall business operations and result in significant remediation costs, HP explained.

The latest global HP Wolf Security Threat Insights Report shows an 11% rise in archive files containing malware, including LNK files. Attackers often place shortcut files in ZIP email attachments, to help them evade email scanners. The team also spotted LNK malware builders available for purchase on hacker forums, making it easy for cybercriminals to shift to this “macro-free” code execution technique by creating weaponized shortcut files and spreading them to businesses.

“As macros downloaded from the web become blocked by default in Office, we’re keeping a close eye on alternative execution methods being tested out by cybercriminals. Opening a shortcut or HTML file may seem harmless to an employee but can result in a major risk to the enterprise,” explained Alex Holland, Senior Malware Analyst, HP Wolf Security threat research team, HP Inc. “Organisations must take steps now to protect against techniques increasingly favoured by attackers or leave themselves exposed as they become pervasive. We’d recommend immediately blocking shortcut files received as email attachments or downloaded from the web where possible.”

By isolating threats on PCs that have evaded detection tools, HP Wolf Security has specific insight into the latest techniques being used by cybercriminals. In addition to the increase in LNK files, the threat research team have highlighted the following insights this quarter:

  • HTML smuggling reaches critical mass – HP identified several phishing campaigns using emails posing as regional post services or – as predicted by HP – major events like Doha Expo 2023 (which will attract 3M+ global attendees) that used HTML smuggling to deliver malware. Using this technique, dangerous file types that would otherwise be blocked by email gateways can be smuggled into organisations and lead to malware infections.
  • Attackers exploit the window of vulnerability created by the Follina (CVE-2022-30190) zero-day vulnerability – Following its disclosure, multiple threat actors exploited the recent zero-day vulnerability in the Microsoft Support Diagnostic Tool (MSDT) – dubbed “Follina” – to distribute QakBot, Agent Tesla, and the Remcos RAT (Remote Access Trojan) before a patch was available. The vulnerability is particularly dangerous because it lets attackers run arbitrary code to deploy malware, and requires little user interaction to exploit on target machines.
  • Novel execution technique sees shellcode hidden in documents spread SVCReady malware – HP uncovered a campaign distributing a new malware family called SVCReady, notable for the unusual way it is delivered to target PCs – through shellcode hidden in the properties of Office documents. The malware – mainly designed to download secondary malware payloads to infected computers after collecting system information and taking screenshots – is still in an early stage of development, having been updated several times in recent months.

The findings are based on data from millions of endpoints running HP Wolf Security. HP Wolf Security runs risky tasks like opening email attachments, downloading files and clicking links in isolated, micro-virtual machines (micro-VMs) to protect users, capturing detailed traces of attempted infections.

HP’s application isolation technology mitigates threats that can slip past other security tools, and provides unique insights into novel intrusion techniques and threat actor behaviour. To date, HP customers have clicked on over 18 billion email attachments, web pages, and downloaded files with no reported breaches.

HP said that further key findings in the report include:

  • 14% of email malware captured by HP Wolf Security bypassed at least one email gateway scanner.
  • Threat actors used 593 different malware families in their attempts to infect organisations, compared to 545 in the previous quarter.
  • Spreadsheets remained the top malicious file type, but the threat research team saw an 11% rise in archive threats – suggesting attackers are increasingly placing files in archive files before sending them in order to evade detection.
  • 69% of malware detected was delivered via email, while web downloads were responsible for 17%.
  • The most common phishing lures were business transactions such as “Order”, “Payment”, “Purchase”, “Request” and “Invoice”.

“Attackers are testing new malicious file formats or exploits at pace to bypass detection, so organisations must prepare for the unexpected. This means taking an architectural approach to endpoint security, for example by containing the most common attack vectors like email, browsers, and downloads, so threats are isolated regardless of whether they can be detected,” commented Dr. Ian Pratt, Global Head of Security for Personal Systems, HP Inc. “This will eliminate the attack surface for entire classes of threats, while also giving the organisation the time needed to coordinate patch cycles securely without disrupting services.”

Categories : World Focus

Tags : Cybercrime Cybersecurity HP Inc Malware Wolf Security Report

  • Apex Feb Web Banner Big & Bold
  • IR Italiana Web ad January 2021
  • Static Control June 2022 Big & Bold Ad
  • TN Group Web ad March 2024
  • Ink Tank Web Ad March 2024
  • Aster Feb 2024 Web Ad
  • Biuromax 300 x 500 Banner February 2024
  • Mito Web advert July 2023
  • GM Technology Web Ad March 2024
  • G&G Big & Bold Web banner January 2024
  • Cartridge Web Ad March 2024
  • HYB Web banner Jan 2024
  • Denner Feb 2024 Web Ad
  • PCL Feb 2024 Web Ad
  • Zhono Web ad March 2024
  • CET Web ad December 2023
  • Altkin Web ad March 2024
  • ITP Web ad January 2021
  • Altkin Web ad March 2024
  • Zhono Web ad March 2024
  • ITP Web ad January 2021
  • Denner Feb 2024 Web Ad
  • PCL Feb 2024 Web Ad
  • HYB Web banner Jan 2024
  • CET Web ad December 2023
  • Denner Feb 2024 Web Ad
  • CET Web ad December 2023
  • PCL Feb 2024 Web Ad
  • ITP Web ad January 2021
  • Altkin Web ad March 2024
  • Zhono Web ad March 2024
  • HYB Web banner Jan 2024

The Recycler, Wittas House, Two Rivers, Station Lane, Witney, OX28 4BH, United Kingdom | Tel: +44 (0) 1993 899800 | Fax : +44 (0) 1993 226899
©2006-2023 The Recycler - Terms & Conditions - Privacy Policy including cookie use

Web design Dorset | Websites by Mark

The Recycler Subscribe Web ad January 2021
The Recycler Subscribe Web ad January 2021