top of page

Threat Intelligence Report Date of Report: 15 May 2024 Reporting Period: 8 May 2024 – 14 May 2024

Updated: 1 day ago



Overview


Over the past week, the cybersecurity landscape has seen varied and intense activities, with significant incidents and trends that underline the ever-evolving nature of cyber threats globally.


High-Level Threat Indicators

  • Increase in Cloud Intrusions: There was a 75% increase in cloud intrusions, indicating a significant vulnerability that cybercriminals are exploiting, especially in cloud configurations and identity-based attacks.

  • Rise in AI-Enhanced Attacks: The use of artificial intelligence by both defenders and attackers is shaping the cybersecurity landscape. AI-driven attacks, particularly through phishing, have become more sophisticated, leading to higher open rates and more successful breaches.

  • Significant Use of Stolen Credentials: Attackers are increasingly relying on stolen or compromised credentials, making up 71% of cyber incidents. This shift emphasizes the need for robust identity and access management strategies.


Detailed Analysis of Notable Incidents

  1. Identity-based Attacks: Advanced phishing and social engineering tactics are being used to mimic legitimate users, gaining unauthorized access to secure accounts. Notable threat actors like Fancy Bear and Cozy Bear have been active in exploiting these techniques.

  2. Exploitation of Cloud Vulnerabilities: Attackers are not only exploiting cloud misconfigurations but also targeting cloud-specific features, leading to a 110% rise in cloud-conscious cases. ECrime groups, particularly Scattered Spider, are notable contributors to this trend.

  3. DDoS Attack Proliferation: There has been a diversification in DDoS attack methodologies, with increasing incidents of politically driven hacktivism and targeted assaults on critical infrastructure, emphasizing the need for adaptive DDoS protection solutions.


Profiles of Major Threat Actors

  • Fancy Bear and Cozy Bear: These Russian nation-state attackers continue to lead in identity-based and social engineering attacks, leveraging advanced phishing tactics to infiltrate networks.

  • Scattered Spider: An eCrime group known for its sophisticated approach to cloud intrusions, using advanced methods to breach cloud environments.


Tools, Techniques, and Recommendations (MITRE ATT&CK Alignment)

  • Enhanced Identity and Access Management:

  • Credential Access (T1003): Implement multi-factor authentication and continuous monitoring to detect and respond to unauthorized access attempts.

  • Valid Accounts (T1078): Monitor and manage the use of legitimate credentials to prevent misuse by attackers.

  • Robust Patch Management:

  • Exploitation of Public-Facing Application (T1190): Regularly update and patch vulnerabilities in software and applications to prevent exploitation.

  • Patch and Configuration Management (T0074): Establish a comprehensive patch management strategy to quickly apply security patches and configure systems to correct vulnerabilities and perform configuration audits.

  • AI Defense Strategies:

  • User Execution (T1204): Educate users on the risks of AI-driven threats and the importance of scrutinizing AI-generated content or requests.

  • Security Software Discovery (T1518): Use security solutions that can detect and mitigate AI-driven attacks, such as those involving adversarial AI and machine learning techniques.

  • Defending Against Software Supply Chain Attacks:

  • Supply Chain Compromise (T1195): Increase the security of the software development and distribution processes to prevent supply chain attacks. This involves vetting third-party code, using software composition analysis tools, and implementing secure software development practices.

  • IoT Device Security:

  • Exploit Public-Facing Application (T1190): Apply strong security measures to IoT devices, including regular updates, secure authentication, and monitoring for unusual activity to defend against targeted malware attacks.


Sector-Specific Recommendations

  • Healthcare and Financial Services: Focus on enhancing security measures to protect against ransomware and phishing attacks, which are expected to remain significant threats due to the critical nature and valuable data handled by these sectors.

  • Manufacturing: Address the surge in IoT malware attacks by securing devices and networks against these increasingly common threats.

Trends and Predictions for Upcoming Period

  • Continued Rise in AI-Driven Threats: As AI becomes more embedded in both attack and defense strategies, expect a continued escalation in AI-driven cyber threats.

  • Increase in Sophisticated Phishing Attacks: Phishing attacks are likely to become more sophisticated, utilizing AI to create more effective scams.


This report highlights the ongoing need for vigilance and proactive security measures across all sectors globally to combat the evolving cyber threat landscape.


Published by

Sean Morris

Threathunter at Securicom

Comments


bottom of page