VMware Report Warns of Deepfake Attacks and Cyber Extortion
Date : August 8, 2022Burned out security teams fight back against geopolitically motivated attacks and lateral movement inside networks
“Cybercriminals are now incorporating deepfakes into their attack methods to evade security controls,” said
Additional key findings from the report include:
- Cyber pro burnout remains a critical issue. Forty-seven percent of incident responders said they experienced burnout or extreme stress in the past 12 months, down slightly from 51% last year. Of this group, 69% (versus 65% in 2021) of respondents have considered leaving their job as a result. Organizations are working to combat this, however, with more than two-thirds of respondents stating their workplaces have implemented wellness programs to address burnout.
- Ransomware actors incorporate cyber extortion strategies. The predominance of ransomware attacks, often buttressed by e-crime groups’ collaborations on the dark web, has yet to let up. Fifty-seven percent of respondents have encountered such attacks in the past 12 months, and two-thirds (66%) have encountered affiliate programs and/or partnerships between ransomware groups as prominent cyber cartels continue to extort organizations through double extortion techniques, data auctions, and blackmail.
- APIs are the new endpoint, representing the next frontier for attackers. As workloads and applications proliferate, 23% of attacks now compromise API security. The top types of API attacks include data exposure (encountered by 42% of respondents in the past year), SQL and API injection attacks (37% and 34%, respectively), and distributed Denial-of-Service attacks (33%).
-
Lateral movement is the new battleground. Lateral movement was seen in 25% of all attacks, with cybercriminals leveraging everything from script hosts (49%) and file storage (46%) to PowerShell (45%), business communications platforms (41%), and .NET (39%) to rummage around inside networks. An analysis of the telemetry within VMware Contexa, a full-fidelity threat intelligence cloud that’s built into
VMware security products, discovered that in April and May of 2022 alone, nearly half of intrusions contained a lateral movement event.
“In order to defend against the broadening attack surface, security teams need an adequate level of visibility across workloads, devices, users and networks to detect, protect, and respond to cyber threats,” said
Despite the turbulent threat landscape and rising threats detailed in the report, incident responders are fighting back with 87% saying that they are able to disrupt a cybercriminal’s activities sometimes (50%) or very often (37%). They’re also using new techniques to do so. Three-quarters of respondents (75%) say they are now deploying virtual patching as an emergency mechanism. In every case, the more visibility defenders have across today’s widening attack surface, the better equipped they’ll be to weather the storm.
For more information on the evolving threat landscape as well as actionable guidance and recommendations for incident responders and security teams, download the full report here.
Methodology
Why Workloads Are More Secure on VMware Clouds
Exposing Malware in a Linux-based Multi-Cloud Environment
On-demand
Black Hat Interview with
Black Hat Article by
VMware Explore
In addition to VMware’s presence at
About
View source version on businesswire.com: https://www.businesswire.com/news/home/20220808005186/en/
ktuttle@vmware.com
(470) 247-1987
Inkhouse
jbettencourt@inkhouse.com
(774) 451-5142
Source: