2.8 Million Encrypted Malware Attacks in First Half of 2019
CYBER NEWS

2.8 Million Encrypted Malware Attacks in First Half of 2019

1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
Loading...

A brand new cybersecurity report points that “in 2018, global malware volume hit a record-breaking 10.52 billion attacks, the most ever recorded by SonicWall Capture Labs threat researchers”. Of all these attacks, scanning of non-standard ports and the deployment of encrypted malware is increasing steadily.




More than 2.8 Million Encrypted Malware Attacks

The researchers logged more than 2.8 million encrypted malware attacks, or 27 percent more than the previous year, with the threat of encrypted malware accelerating throughout 2019. More specifically, 2.4 million encrypted attackers were registered, marking a 76 percent year-to-date increase, the report highlighted.

What does scanning of non-standard ports mean? First of all, a non-standard-port is a service running on a port different than the default assignment, which typically is defined by the IANA port numbers registry.

For example, Ports 80 and 443 are standard ports for web traffic, which is where most firewalls focus. But cybercriminals understand this too, so they are sending malware through non-standard port traffic to help deploy their payloads undetected in target environments.

In May 2019, the research team observed an alarming spike in these attacks – a quarter of all recorded attacks were coming through non-standard ports.

Related:
What are the files which viruses are mostly using to infect your computer? What are the file types which are part of the viruses' payload after they infect?
Windows File Types Used by Malware (2019)

Another staggering observation is the increased number of brand new malware variants. A total of 194,171 new variants have been registered, meaning that 1,078 new variants were discovered each day of the year.

But Capture ATP is only part of the story. Included with Capture ATP, SonicWall Real-Time Deep Memory InspectionTM unveiled 74,360 ‘never-before-seen’ malware variants during the first half of the year,” the report said.

In addition to these numbers, numerous cases of unique variants leveraging various forms of PDF file types for their exploits were also unearthed. Here are some examples:

Various types of scams and frauds, which typically include links to scam sites in the PDF-based campaigns. Even though they are not malware by definition, they are still extremely malicious and dangerous, urging users to visit malicious websites.

Malicious URLs where standard PDF files include links that download the next stage of a malicious Microsoft Office file. The final payload is real malware, such as the infamous Emotet.

Phishing attacks where a PDF with direct links to either malware downloads or phishing sites is included.

Avatar

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum for 4 years. Enjoys ‘Mr. Robot’ and fears ‘1984’. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles!

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...