Unique malware sample volumes seen surging

Reading Time: 3 minutes

valerybrozhinsky – stock.adobe.c

BlackBerry’s latest ‘Global threat intelligence’ report details a surge in unique malware samples as threat actors ramp up the pace of targeted attacks

By

Alex Scroxton,
Security Editor

Published: 24 Sep 2024 15:21

BlackBerry has claimed its cyber security solutions detected and stopped an average of 11,500 unique malware samples every day during the second calendar quarter of 2024, up 53% on the January to March period and one of the highest three-monthly increases ever recorded in the organisation’s network telemetry.

The data, contained in the latest edition of BlackBerry’s regular Global threat intelligence report provides a clear indication that underground malware developers are quicker to update and adapt their code, making it more potent, resilient and harder to analyse. Some of the increase may also be driven by tailored attacks hitting multiple people at the same organisation.

“As new threat groups emerge and are established, legacy threat groups survive takedown attempts and they focus on developing new malware. This signals that these groups are allocating their resources to prioritise the impact of their attacks rather than sheer volume,” said Ismael Valenzuela, vice-president of threat research and intelligence at BlackBerry.

“Additionally, minor altering of a piece of malware might not seem very sophisticated but contributes to an overwhelming increase in the success and severity of attacks,” added Valenzuela.

The increasing volume of malware observed by BlackBerry ran alongside an 18% increase in the number of cyber attacks stopped every day, which hit an average of 43,500 for a total of 3.7 million during the quarter.

Critical infrastructure operators were the primary targets, with more than 800,000 attacks, roughly 400,000 of them focusing on the financial services sector. This may have something to do with the higher volumes of unique malware samples – BlackBerry suggested that threat actors may be prioritising unique malwares in attacks on critical national infrastructure (CNI) due to the higher likelihood of carrying out a successful, targeted cyber attack.

BlackBerry also observed a 21% uptick in attacks on commercial enterprises, likely as a result of a skyrocketing number of devices in the various sectors – such as manufacturing, commercial and professional services, and retail – that fall under this umbrella.

Weaponisation of chaos

Over the past few years, a succession of global crises, from the Covid-19 pandemic, to the migrant crisis, to wars in Gaza, Lebanon and Ukraine, have gifted threat actors with opportunities, said BlackBerry, which referred to the weaponisation of chaos.

It said that any form of disruption to daily life was now fertile ground for threat actors to incorporate into cyber attacks, and they are becoming increasingly adept at doing so with a variety of phishing campaigns, misleading social media posts and malicious software, among other things.

The BlackBerry research team said that in the near-term, threat actors will continue to take extensive measures to target their victims with increasingly sophisticated methodology, and the rise in new infostealers and malwares suggests that private data will continue to be highly sought after.

Read more on Hackers and cybercrime prevention

Volume of unique malware samples threatens to overwhelm defenders

By: Alex Scroxton

SEO poisoning (search poisoning)

By: Robert Sheldon

What is SEO Poisoning, How Can Healthcare Defend Against It?

By: Jill McKeon

Infostealing Malware Remains Top Threat to Healthcare

By: Jill McKeon

Article Source




Information contained on this page is provided by an independent third-party content provider. This website makes no warranties or representations in connection therewith. If you are affiliated with this page and would like it removed please contact editor @pleasantgrove.business

Warning! This link is a trap for bad bots! Do not follow this link or you're IP adress will be banned from the site! Skip to content