Application attack landscape: latest trends and tools
Cyberattacks have escalated during the coronavirus pandemic as cybercrooks exploit technical and emotional vulnerabilities
The coronavirus pandemic is widely evidenced as an accelerant for digital transformation, remote working, video conferencing and ecommerce. Yet these surging trends are also exploited by nefarious characters aiming to take advantage of cybersecurity vulnerabilities, as new developments have significantly expanded attack surfaces. And, as apparent chaos reigns and emotions run high, the criminals have wasted little time.
In the two weeks to May 12, researchers at Check Point, a global cybersecurity organisation, documented 192,000 coronavirus-related cyberattacks a week, a 30 per cent rise on previous weeks.
There has been a considerable jump in COVID-19-related phishing attacks, with hackers impersonating the World Health Organization, United Nations, Google and Zoom, among others, in malicious communications. Further, some 2,500 new Zoom-related domains were registered between April 21 and May 12, with 14 per cent deemed suspicious.
Seattle-based Mike Klepper, AT&T Cybersecurity’s national practice director for application security, threat and vulnerability management, is unsurprised that cybercriminals have sharpened their tools. “Social engineering campaigns are being used to perform credential harvesting or collect personal data for fraud attempts,” he says.
“Solicited data can be used to open fraudulent accounts, take over existing accounts or through forcing a password reset by answering ‘secret’ questions. These tactics are not new, but the strong emotional response people have to the pandemic is driving the effectiveness of social engineering attempts.”
The strong emotional response people have to the pandemic is driving the effectiveness of social engineering attempts
Personal data: the greatest lure for cybercriminals
Publication, on May 19, of Verizon’s 2020 Data Breach Investigations Report (DBIR), which provides an analysis of more than 157,000 security incidents and over 3,900 confirmed data breaches investigated across 81 countries during the last 12 months, is timely. One of the key takeaways is that personal data is increasingly at risk as the greatest lure for cybercriminals.
Indeed, personal data, such as email addresses, names, phone numbers, physical addresses and other types of information found hiding in an email or stored in a misconfigured database, was involved in 58 per cent of breaches, nearly twice the percentage in Verizon’s 2019 report.
Credential theft, social attacks – phishing and business email compromise, for instance – and errors cause more than two thirds (67 per cent) of breaches, according to DBIR lead author Philippe Langlois. “These tactics prove effective for attackers, so they return to them time and again,” he says. “One of the things that we’ve seen is just the scalability of these types of attacks.
“As organisations have adopted and moved a lot of their workloads towards web applications, we’ve seen a similar trend with breaches, with over 43 per cent involving a web application, doubling from last year.
“When you look further into the attacks targeting web applications, we find the typical suspects like stolen credentials and phishing. We also find that the third most common action associated is malware based. In these cases, criminals are using compromised web servers to capture data, with the majority of it targeting financial data, such as payment cards.
“Criminals are adapting to our increased use of online ecommerce sites and leveraging that for their benefits. This should be a major focus as the ongoing COVID-19 lockdowns are likely to lead to an increase of activity being conducted online than ever before. Criminals operate based on our deficiencies and how we do business, so as we continue to evolve in our day-to-day operations, so will criminals.”
Choose your weapon: manual or automated?
Certainly, “credential stuffing”, whereby hackers use information leaked from one data breach and attempt to apply it en masse against other websites and take over user accounts, is “a problem that has exploded”. So says Jarrod Overson, director of engineering at Shape Security, which was acquired by F5 for a reported $1 billion in December.
Consider in 2018 there were one billion new credentials spilt, while the record number of attacks Shape has blocked in one day is two billion. Moreover, the most extensive recorded attack campaign against one URL in a week is three billion.
This level of brute-force attack is physically impossible for one person or even an army of humans. Thanks to recent advances in automation, though, engaging a bot militia can make good business sense for hackers. However, for more sophisticated targeted campaigns, a human touch is more rewarding.
“Manual, or low-and-slow attacks, will always be hardest to spot,” says Daniel Cohen, head of anti-fraud products and strategy at RSA Security. “Fraudsters work slowly and deliberately to establish or compromise an identity, which can then be used to apply for a loan, credit card or another instrument.
“Meanwhile, in automated attacks, fraudsters leverage software robots to carry out the fraud for them. If we consider the repetitive nature of these automated attacks, they are typically more easily detected.”
Lowering the barrier of entry for hackers
Verizon’s research into the criminal and underground marketplaces shows 5 per cent of posts offer cyberattack services, “both in terms of as a way of teaching people into the trade of fraud, but also in terms of playing a key role in an attacker’s process, such as hacking, ransomware and denial-of-service attacks”.
Langlois posits: “Through the use of these services, it lowers the barrier for entry into cybercrime and has increased its professionalisation and specialisation.”
Kevin Prone, head of service development at Derby-headquartered cybersecurity firm Nowcomm, agrees. “The dark web means hackers can search how to hack, profile, and break down a target, and how to steal credentials,” he says. “If hackers can obtain a password used for something like a wifi network, chances are it may be used all over a person’s digital footprint. “Credentials are available for purchase on the dark web in bitcoins where returns can be high. We are seeing an increase in customer details available on hacker forums hosted across the dark web, which even include accounts belonging to financial institutions, banks, and colleges.
“Finally, the availability of public cloud infrastructure has made it even easier for cybercriminals to make money out of fraudulent activities. By using services such as Amazon Web Services or Microsoft Azure, they have access to powerful virtual machines capable of running complex cyberfraud operations.”
Greater threats loom on the horizon. Klepper, of AT&T Cybersecurity, spies two trends that will drive the effectiveness of application fraud. “The first is the ability to perform data mining at scale across large populations of people,” he says. “The second is the ability to create deepfake audio and video content. This capability will significantly complicate efforts to distinguish legitimate users from fraud actors.”
Perhaps it’s time to increase the cybersecurity budget, before it’s too late.