In the second quarter of 2018 IIS, Drupal, and Oracle WebLogic are highly targeted by attackers. IIS based attacks alone increased from two thousand to 1.7 million, since Q1
2018.
According to eSentire, the attacks based on following web technologies increased in Q2 2018. IIS (30 percent), WebLogic (24 percent) and Apache (less than one percent).
“Biotechnology, Accounting, Real Estate, Marketing, and Construction were the top verticals that experienced the highest amount of traffic due to outdated vulnerabilities.”
Most of the IIS attacks are combined Oracle Fusion Middleware vulnerability CVE-2017-10271 and the code execution vulnerability with (CVE-2017-7269) IIS version 6.0.
The attackers don’t target a particular industry reads the eSentire report. With Biotechnology the IIS 6.0 and WebLogic exploit were dominant, Real Estate, marketing firm targeted with D-Link exploit and Finally, Construction experienced Drupalgeddon2 attacks.
eSentire also had a collection of operating systems among the attacking infrastructure involved – over 400 of the attacking IPs had Shodan records indicating they were Windows machines (including XP, 7, 8, 2008, and 2012). Additionally, nearly 350 FTP servers and more than 100 mail servers were reported.
According to Shodan report, more than 3.5 million IIS web servers exposed. In the second quarter of 2018, many hacking groups attack IPs with a unique set of exploits and some IPs with multiple exploits.
The four-year-old banking trojan Emotet emerges again and the attackers distribute the malware through pdf and doc files.
The Emotet is one of the rapidly spreading banking trojans that could cost around $1 Million to recovered the affected networks and the malware authors are continuously improving the malware to maintain the persistence.
Forty-nine percent of Emotet samples included “invoice,” “payment” or “account”
in their filename. The filenames of unspecified documents often consisted only of random strings of numbers and letters. Emotet and Hancitor were observed in large portions with the second quarter.
Hancitor also called as Chanitor is typically sent as a macro-enabled empowered Office document in phishing messages with “critical” messages, for example, phone messages, faxes or invoices.
Observations of malicious PowerShell in Q2 2018 showed a slight decrease in unique PowerShell commands (48 in Q1 vs. 44 in Q2) and a corresponding two percent decrease in obfuscation techniques.
How To Respond Cyber Incident In your Organization
Most Important Steps to Prevent Your Organization From Identity Theft -Detailed Explanation
MITRE has unveiled the Offensive Cyber Capability Unified LLM Testing (OCCULT) framework, a groundbreaking methodology…
A significant cybersecurity breach at Genea, one of Australia’s largest in vitro fertilization (IVF) providers,…
A critical set of 20 security vulnerabilities in GRUB2, the widely used bootloader for Linux…
Telecommunications provider Orange Communication faces a potential data breach after a threat actor using the pseudonym “Rey” claimed…
A series of critical security vulnerabilities in the widely-used Rsync file synchronization tool have been…
A critical security vulnerability in the Essential Addons for Elementor plugin, installed on over 2 million WordPress…