Asia-Pacific region accounted for 25 per cent of all cyber attacks
Cyberattacks evolved in 2020 as threat actors sought to profit from the unprecedented socioeconomic, business, and political challenges brought on by the COVID-19 pandemic.
In the recently released report, IBM Security X-Force 2020 found attackers pivoting to businesses that global COVID-19 response efforts heavily relied, such as hospitals, medical and pharmaceutical manufacturers, as well as energy companies powering the COVID-19 supply chain.
According to the new report, cyberattacks on healthcare, manufacturing, and energy doubled from the year prior, with threat actors targeting organisations that could not afford downtime due to risks of disrupting medical efforts or critical supply chains.
In fact, manufacturing and energy were the most attacked industries in 2020, second only to the finance and insurance sector. Contributing to this was attackers taking advantage of the nearly 50 per cent increase in vulnerabilities in industrial control systems (ICS), which manufacturing and energy both strongly depend on.
The Asia-Pacific region accounted for 25 per cent of all attacks observed by IBM Security X-Force in 2020, up from 22 per cent as observed in the region in 2019.
Attack types:
- Data theft was the most common attack type in Asia in 2020, driven largely by a flurry of Emotet data theft attacks in the fall of 2020 and making up 22 per cent of all attacks in the region—surpassing even ransomware.
- Ransomware attacks made up 19 per cent of all attacks in Asia in 2020, and including strains such as PJX and Locky. Asia Pacific experienced more attacks involving RATs than any other geographic region in the world, with remote access trojans making up 9 per cent of all attacks in the region in 2020.
Asia also experienced 21 per cent of all attacks exploiting CVE-2019-19781 in 2020. BEC attacks were less common in Asia than others in 2020, potentially due to implementation of multifactor authentication.
Manufacturing and finance and insurance were the top two industries targeted in the Asia-Pacific area.
Countries under attack:
- Japan
- India
- Australia
The X-Force Threat Intelligence Index is based on insights and observations from monitoring over 150 billion security events per day in more than 130 countries. In addition, data is gathered and analyzed from multiple sources within IBM, including IBM Security X-Force Threat Intelligence and Incident Response, X-Force Red, IBM Managed Security Services, and data provided by Quad9 and Intezer, both of which contributed to the 2021 report.
Some of the report’s key highlights include:
- Cybercriminals Accelerate Use of Linux Malware – With a 40 per cent increase in Linux-related malware families in the past year, according to Intezer, and a 500 per cent increase in Go-written malware in the first six months of 2020, attackers are accelerating a migration to Linux malware, that can more easily run on various platforms, including cloud environments.
- Pandemic Drives Top Spoofed Brands – Amid a year of social distancing and remote work, brands offering collaboration tools such as Google, Dropbox and Microsoft, or online shopping brands such as Amazon and PayPal, made the top 10 spoofed brands in 2020. YouTube and Facebook, which consumers relied on more for news digestionlast year, also topped the list. Surprisingly, making an inaugural debut as the seventh most commonly impersonated brand in 2020 was Adidas, likely driven by demand for the Yeezy and Superstar sneaker lines.
Ransomware groups cash in on profitable business model
Ransomware was the cause of nearly one in four attacks that X-Force responded to in 2020, with attacks aggressively evolving to include double extortion tactics.
Using this model, X-Force assesses Sodinokibi – the most commonly observed ransomware group in 2020 – had a very profitable year. X-Force estimates that the group made a conservative estimate of over US$123 million in the past year, with approximately two-thirds of its victims paying a ransom, according to the report.
Investment in open-source malware threatens cloud environments
Amid the COVID-19 pandemic, many businesses sought to accelerate their cloud adoption. “In fact, a recent Gartner survey found that almost 70 per cent of organisations using cloud services today plan to increase their cloud spending in the wake of the disruption caused by COVID-19.” 1 But with Linux currently powering 90 per cent of cloud workloads and the X-Force report detailing a 500 per cent increase in Linux-related malware families in the past decade, cloud environments can become a prime attack vector for threat actors.
With the rise in open-source malware, IBM assesses that attackers may be looking for ways to improve their profit margins – possibly reducing costs, increasing effectiveness and creating opportunities to scale more profitable attacks. The report highlights various threat groups such as APT28, APT29 and Carbanak turning to open-source malware, indicating that this trend will be an accelerator for more cloud attacks in the coming year.
The report also suggests that attackers are exploiting the expandable processing power that cloud environments provide, passing along heavy cloud usage charges on victim organizations, as Intezer observed more than 13 per cent new, previously unobserved code in Linux cryptomining malware in 2020.
With attackers’ sights set on clouds, X-Force recommends that organizations should consider a zero-trust approach to their security strategy. Businesses should also make confidential computing a core component of their security infrastructure to help protect their most sensitive data – by encrypting data in use, organizations can help reduce the risk of exploitability from a malicious actor, even if they’re able to access their sensitive environments.
Cybercriminals disguised as celebrity brand
The 2021 report highlights that cybercriminals opted to disguise themselves most often as brands that consumers trust. Considered one of the most influential brands in the world, Adidas appeared attractive to cybercriminals attempting to exploit consumer demand to drive those looking for coveted sneakers to malicious websites designed to look like legitimate sites. Once a user visited these legitimate-looking domains, cybercriminals would either seek to carry out online payment scams, steal users’ financial information, harvest user credentials, or infect victims’ devices with malware.
The report indicates that the majority of Adidas spoofing is associated with the Yeezy and Superstar sneaker lines. The Yeezy line alone reportedly pulled in US$1.3 billion in 2019 and was one of the top selling sneakers for the sportswear manufacturing giant. It’s likely that, with the hype for the next sneaker release in early 2020, attackers leveraged the demand of the money-making brand to make their own profit.
Ransomware dominates 2020 as most Common attack
According to the report, in 2020 the world experienced more ransomware attacks compared to 2019, with nearly 60 per cent of ransomware attacks that X-Force responded to using a double extortion strategy whereby attackers encrypted, stole, and then threatened to leak data, if the ransom wasn’t paid.
In fact, in 2020, 36 per cent of the data breaches that X-Force tracked came from ransomware attacks that also involved alleged data theft, suggesting that data breaches and ransomware attacks are beginning to collide.
The most active ransomware group reported in 2020 was Sodinokibi (also known as REvil), accounting for 22 per cent of all ransomware incidents that X-Force observed. X-Force estimates that Sodinokibi stole approximately 21.6 terabytes of data from its victims, that nearly two-thirds of Sodinokibi victims paid ransom, and approximately 43 per cent had their data leaked – which X-Force estimates resulted in the group making over US$123 million in the past year.
Like Sodinokibi, the report found that the most successful ransomware groups in 2020 were focused on also stealing and leaking data, as well as creating ransomware-as-a-service cartels and outsourcing key aspects of their operations to cybercriminals that specialize in different aspects of an attack. In response to these more aggressive ransomware attacks, X-Force recommends that organisations limit access to sensitive data and protect highly privileged accounts with privileged access management (PAM) and identity and access management (IAM).
Additional key findings in the report include:
- Vulnerabilities Surpass Phishing as Most Common Infection Vector – The 2021 report reveals that the most successful way victim environments were accessed last year was scanning and exploiting for vulnerabilities (35 per cent), surpassing phishing (31 per cent) for the first time in years.
- Europe Felt the Brunt of 2020 Attacks – Accounting for 31 per cent of attacks X-Force responded to in 2020, per the report, Europe experienced more attacks than any other region, with ransomware rising as the top culprit. In addition, Europe saw more insider threat attacks than any other region, seeing twice as many such attacks as North America and Asia combined.
- The report features data IBM collected in 2020 to deliver insightful information about the global threat landscape and inform security professionals about the threats most relevant to their organizations. To download a copy of the X-Force Threat Intelligence Index 2021, please visit: https://www.ibm.biz/threatindex2021