Netskope: Attackers Double Down On Social Engineering Techniques & Malicious Functionalities Leading To Sharp Increase In Malware Downloads

- Advertisement -

Netskope, a leader in Secure Access Service Edge (SASE), today unveiled new research confirming that attackers are finding new ways to evade detection and blend in with normal network traffic using HTTP and HTTPS to deliver malware. In its latest Cloud & Threat Report: Global Cloud and Web Malware Trends, Netskope identified that on average, five out of every 1,000 enterprise users attempted to download malware in Q1 2023, and new malware families and variants represented 72% of those malware downloads. 

Social Engineering and Search Engine Data Voids on the Rise

In the research, Netskope uncovered that nearly 10% of all malware downloads in Q1 were referred from search engines. These downloads mostly resulted from weaponized data voids, or combinations of search terms that have very few results, which means that any content matching those terms is likely to appear very high in the search results. This represents just one of many social engineering techniques that attackers are accelerating.

- Advertisement -

Social engineering as a whole continues to dominate as a leading malware infiltration technique with attackers abusing not only search engines, but email, collaboration apps, and chat apps to trick their victims. As the top two malware types, Trojans accounted for 60% of malware downloads in Q1 and phishing downloads accounted for 13%.

Evaluation of Primary Communication Channels for Attackers 

For the first time in its quarterly cloud and threat reporting, Netskope analyzed attacker communication channels. Researchers found that attackers, in order to consistently evade detection, have used HTTP and HTTPS over ports 80 and 443 as their primary communication channel. In fact, of the new malware executables analyzed by Netskope that communicated with external hosts, 85% did so over port 80 (HTTP) and 67% did so over port 443 (HTTPS). This approach enables attackers to easily go unnoticed and blend in with the abundance of HTTP and HTTPS traffic already on the network. 

Additionally, to evade DNS-based security controls, some malware samples sidestep DNS lookups, instead reaching out directly to remote hosts using their IP addresses. In Q1 2023, most malware samples that initiated external communications did so using a combination of IP addresses and hostnames, with 61% communicating directly with at least one IP address and 91% communicating with at least one host via a DNS lookup.

“Job number one for attackers is finding new ways to cover their tracks as enterprises put more resources into threat detection, but these findings indicate just how easy it still is for attackers to do so in plain sight,” said Ray Canzanese, Threat Research Director, Netskope Threat Labs. “As attackers gravitate towards cloud services that are widely used in the enterprise and leverage popular channels to communicate, cross-functional risk mitigation is more necessary than ever.” 

Extended Look into Global Cloud and Web Malware Trends

Other notable findings uncovered by Netskope’s research team include: 

  • 55% of HTTP/HTTPS malware downloads came from cloud apps, up from 35% for the same period one year earlier. The primary driver of the increase is an increase in malware downloads from the most popular enterprise cloud applications, with Microsoft OneDrive tracked as the most popular enterprise app by a wide margin.
  • The number of applications with malware downloads also continued to increase, reaching a high of 261 distinct apps in Q1 2023. 
  • Only a small fraction of total web malware downloads were delivered over web categories traditionally considered risky. Instead, downloads are spread out among a wide variety of sites, with content servers (CDNs) responsible for the largest slice, at 7.7%.

As enterprises work to defend against the onslaught of malware, cross-functional collaboration across multiple teams is required, including network, security operations, incident response, leadership, and even individual contributors. Some of the additional steps organizations can take to reduce risks include:  

  • Inspect all HTTP and HTTPS downloads, including all web and cloud traffic, to prevent malware from infiltrating your network
  • Ensure that security controls recursively inspect the content of popular archive files and that high-risk file types are thoroughly inspected 
  • Configure policies to block downloads from apps that are not used in your organization to reduce risk surface.
- Advertisement -

Most Popular Articles

Mitul Shah Joins Google To Lead Pixel Expansion

0
Eyeing Pixel's growth and manufacturing in India, there was a new appointment at Google recently. Mitul Shah, ex-Apple India sales leader joined to lead...
US Chip Manufacturing

US Commerce Department To Grant $60Mn Awards To BAE Systems And Rocket Labs

0
Secretary Gina Raimondo stated that under Biden's CHIPS Act, they would like to finalize as many awards as possible before President Trump begins his...
Chip Design in India

Kaynes Semicon, 7 Rays Semiconductors Inks Pact To Enhance Chip Design And Packaging

0
The partnership will deliver cutting-edge custom system-on-chip design solutions tailored to emerging technologies in various sectors. Kaynes Semicon and 7 Rays Semiconductors are thrilled to...

Hesai To Cut Lidar Prices By Half, Expects Broad Electric Car Adoption

0
David Li, the Chief Executive, stated in an interview that the industry is advancing to a phase where millions of cars sold each year...

Sateliot, Eseye Join Forces For Global IoT Connectivity Solutions

0
Partnering to ensure seamless coverage in even the most remote locations utilising 3GPP Rel.17 standard, Eseye and Sateliot are set to revolutionise global IoT...
Andy C Mackie, Principal Engineer - Advanced Materials, Indium Corporation

“Our Multi-Alloy System Enables Solder Joints To Form At Lower Processing Temperatures Without Sacrificing...

0
Liquid metal-based thermal solutions offer efficient cooling but face challenges like spillage and thermal resistance in ultra-thin layers. Akanksha Sondhi Gaur and Nijhum Rudra...
S.K. Yadav of RIGOL Technologies

“Our India Business Is $2 Million, With A Goal To Reach $6 Million” –...

0
In a chat with EFY’s Nitisha, S.K. Yadav of RIGOL Technologies highlights the company’s journey in India, shedding light on its growth prospects and...
Bejoy George, Managing Director- Chipmax Designs Private Limited,

“We Are Advancing R&D Projects To Develop Modular Assembly Lines With Adaptive Robotics” –...

0
How do you envision technological progressions influencing the future of manufacturing operations? Get informed from Electronics for You’s Akanksha while in dialogue with Bejoy...
Srinivas Parikshith, Co-founder of Auckam Technologies

“We Anticipate Turnover Reaching 40 Million Rupees Next Year With The New Product Line”...

0
Discussing the electronics manufacturing sector, Srinivas Parikshith, Co-founder of Auckam Technologies, talked to EFY’s Nitisha Dubey about their expansion plans to set up a...

“We Bring Intelligence Early On Into The Design Cycle” – Michel Van Cotthem VP...

0
With a solution embedding intelligence early in the design-to-source lifecycle, Supplyframe aims to leverage India’s electronics manufacturing boom. At IEW 2024, Michel Van Cotthem...

HKTDC Electronics Fair Sparks Innovation, 60,000+ Participants!

0
Showcasing cutting-edge tech, global innovation, and booming markets for the future of electronics, HKTDC’s Hong Kong Electronics Fair and electronicAsia drew 60,000+ professionals. Last month,...
Applied Materials Representational Image

Applied Materials Selects Six Startups For Deep-Tech Accelerator Programme

0
The selected deep-tech startups will be evaluated for investment by Applied Ventures and potential collaboration opportunities with Applied Materials. In collaboration with the company's India...

Space tech Startup Akash Secures $68M CHIPS Funding

0
Eyeing to power into AI, EVs, and more high-tech industries, Akash Systems lands $68 million CHIPS grant to boost its cooling tech facility, generating...

Wireless Light-Based Communication With Velmenni’s Technology

0
Velmenni is at the forefront of wireless communication innovation with its pioneering light-based technologies, Li-Fi and LC Link. Founded by Deepak Solanki in October 2014...

Harnessing AI Technology For Efficient Pest Management

0
AI-Genix, an agri-tech startup, is transforming pest management for farmers through advanced AI-enabled systems that precisely target harmful pests. In an industry where pesticides and...

Industry's Buzz

Learn From Leaders

Startups