Top 50 Cybersecurity Threats
Top 50 Cybersecurity Threats
Top 50 Cybersecurity
Threats
Cybersecurity
Threats
DDOS
DDOS
DDOS
www.wkiped
S
L
H
7
INVOICE
124!5
124!5 124!5
124!5
DDOS
DDOS
DDOS
Table of
Contents
Account Takeover.................................................................6 • DNS Hijacking..............................................................46 Ransomware-as-a-Service..........................................88
Advanced Persistent Threat..........................................8 • DNS Tunneling ............................................................48 Router and Infrastructure Security........................90
Cloud Cryptomining..........................................................22 Malicious PowerShell .....................................................62 Suspicious Cloud Authentication Activities.. 104
#
H Command and Control....................................................24 Man-in-the-Middle Attack............................................64 Suspicious Cloud Storage Activities..................106
Credential Dumping..........................................................28 Meltdown and Spectre Attack..................................68 Suspicious Zoom Child Processes...................... 110
Credential Reuse Attack...............................................30 Network Sniffing ................................................................70 System Misconfiguration .......................................... 112
Yet in the wake of mass migrations to the cloud and digital transformation, many organizations still haven’t reached the peak of their security operations
because of a few key challenges: An always-evolving threat landscape that pits us against creative and well-funded bad actors; the increasing complexity
of hybrid and multi-cloud environments; security teams are bogged down by an endless list of monotonous tasks and time-consuming manual processes;
and data silos caused by the proliferation of tools used inside our organizations, which create inefficiencies and blind spots.
These four challenges add up to a single reality: Security is a data problem. This is why a data-centric approach to security is paramount — arming us with
the right information at the right time, and connecting tools and teams through all the noise and complexity. An analytics-driven solution, drawing upon
end-to-end visibility and powered by machine learning (ML), is key to any organization’s success. These advanced capabilities not only give a complete
picture of your environment, but also move operations away from human intervention and basic diagnostics, towards
an automated and strengthened security defense.
How? By stitching together and contextualizing swathes of highly complex datasets, addressing threats faster
with automated alert triage, investigation and response, and honing in on anomalous behavior thanks to
out-of-the-box ML models and algorithms. All of this helps organizations improve their cyber resilience — the
ability to anticipate and adapt to compromises or attacks on cyber resources — so they can more effectively
automate security operations and safeguard the business, all the while accelerating growth and innovation.
At Splunk, we’re excited by the possibilities that data brings for a better — and more secure — future. But to
get there, we must be prepared. We need to know what we’re up against, including the threats that loom
large. That’s why we’ve put together this book of cybersecurity threats — so you can better identify
the different types of attacks out there, mitigate risk and make your business even stronger.
Gary Steele
Splunk President & CEO
This means threats that take advantage of It’s important to stay vigilant for activities that
vulnerabilities created by misconfigurations may be as simple as suspicious behavior inside
and deployment errors have become a of an AWS environment. Other activities to look
bigger problem as companies have out for are S3 access from unfamiliar locations
adopted cloud technologies rapidly and the and by unfamiliar users.
organization using AWS is responsible for
It’s also important to monitor and control
securing their environment. The problem is
who has access to an organization’s AWS
there are more threats that AWS customers
infrastructure. Detecting suspicious logins to
have to worry about.
AWS infrastructure provides a good starting
point for investigations. Actions, such as
abusive behaviors caused by compromised
credentials, can lead to direct monetary costs
because users are billed for any EC2 instances
created by the attacker.
Top 50 Cybersecurity Threats | Splunk 11
Application
Access
Token
Pawn Storm, an active and aggressive espionage group, uses different strategies to gain information from their targets.
One method in particular was to abuse Open Authentication (OAuth) in advanced social engineering schemes, targeting
high profile users of free webmail.
The group also set up aggressive credential phishing attacks against the Democratic National Convention (DNC), the
Christian Democratic Union of Germany (CDU), the parliament and government of Turkey, the parliament of Montenegro,
the World Anti-Doping Agency (WADA), Al Jazeera and many other organizations.
They continue to use several malicious applications that abuse OAuth access tokens to gain access to target email
accounts, including Gmail and Yahoo Mail.
124!5 124!5
124!5
Credential Stuffing
DDOS
DDoS
DDOS
Attack
To date one of the biggest — if not the most significant — distributed denial-of-service (DDoS) attacks happened in 2018
against popular online code management system GitHub. GitHub was hit by an onslaught of traffic, which at its peak came
in at a rate of 1.3 terabytes per second, sending packets at a rate of 126.9 million per second. The attack wasn’t just massive,
it was record-breaking. In this attack, the botmasters flooded memcached servers with spoofed requests, which gave them
the ability to amplify their attack by 50,000x. The good news? GitHub wasn’t caught entirely unprepared. Administrators were
alerted to the attack and it was shut down within 20 minutes.
DDOS
DDOS
DDOS
What How Where
you need the attack the attack
to know: happens: comes from:
A DDoS attack is an attempt by hackers, The malicious actors behind DDoS attacks As their name implies, DDoS attacks are
hacktivists or cyber spies to take down aim to wreak havoc on their targets, sabotage distributed, meaning that the incoming
websites, slow down and crash the target web properties, damage brand reputation and flood of traffic targeting the victim’s network
servers and make online service unavailable prompt financial losses by preventing users originates from numerous sources. Thus, the
by flooding them with traffic from multiple from accessing a website or network resource. hackers behind these attacks can literally
sources. As their name suggests, DDoS attacks DDoS leverages hundreds or thousands of be from anywhere in the world. What’s
are widely distributed brute-force attempts infected “bot” computers located all over more, their distributed nature makes it
to wreak havoc and cause destruction. the world. Known as botnets, these armies impossible to stop these attacks simply
These attacks often tend to target popular of compromised computers will execute the by securing or blocking a single source.
or high-profile sites, such as banks, news attack at the same time for full effectiveness.
and government websites, to thwart or deter
The hacker or group of hackers that control
target organizations from publishing important
these infected computers then become
information or to weaken them financially.
botmasters, who infect vulnerable systems
with malware, often Trojan viruses. When
enough devices are infected, the botmaster
gives them the command to attack and the
target servers and networks are bombarded
with requests for service, which in turn
effectively chokes them and shuts them down.
DNS
Amplification
In February 2022, hackers launched massive, amplified distributed denial-of-service (DDoS) attacks through Mitel, a global
business communications company. The attack pummeled financial institutions, broadband ISPs, logistics and gaming
companies, and other organizations. Able to sustain DDoS attacks for up to 14 hours, with a record-breaking amplification
factor of almost 4.3 billion to one, attacks like this are capable of shutting down voice communications and other services for
entire organizations with a single malicious network packet.
DNS
Hijacking
On a Thursday morning in 2017, WikiLeaks readers woke up
expecting to find the latest state secret released on the
whistleblowing website, only to discover a message from a hacker
collective called OurMine announcing that they were in control of the domain.
Wikileaks founder Julian Assange quickly took to Twitter to clarify that the takedown was not a traditional hack, but instead
a domain name system (DNS) attack.
DNS
Tunneling
A hacker group known as OilRig has made regular attacks on
various governments and businesses in the Middle East using a
variety of tools and methods over the past several years.
An essential element of its efforts to disrupt daily
operations and exfiltrate data is maintaining a connection
between its command-and-control server and the
system it’s attacking using DNS tunneling.
Phishing
Payloads
One of the biggest cybercrimes ever — with the highest number of defendants charged for the same crime — was what the
FBI called Operation Phish Phry. The attack sparked a multinational phishing investigation after targeting hundreds of bank
and credit card customers, all of whom received emails with links to fake, but authentic-looking, financial websites. On the
site, targets were asked to enter their account numbers and passwords into fraudulent forms.
Spear
Phishing
These days spear phishers are not only targeting bigger fish, they’re taking a page from the book of romance
scams, luring victims with attractive fake profiles to get them to download malware onto their computers. In 2021, researchers
identified a years-long social engineering and targeted malware attack sourced to the renowned Iranian-state aligned threat
actor TA456. Using a fake social media profile “Marcella Flores,” TA456 built a romantic relationship with an employee of a small
aerospace defense contractor subsidiary. The attacker cashed in a few months later by sending out a large malware file via an
ongoing corporate email communication chain with the aim of conducting reconnaissance. Once the malware, dubbed LEMPO,
infiltrated the machine, it exfiltrated data and sent highly sensitive information back to the attacker, while obfuscating its
whereabouts to evade detection.
Whale
Phishing
(Whaling)
Why go after little phish when you can phish a whale? In 2020,
Australian hedge fund Levitas Capital found that out the hard way
when attackers launched a stealthy whaling attack aimed directly at one of the founders. The bad actors gained entry to the
hedge fund’s network after sending the executive a fake Zoom link that installed malware once it was clicked. The malicious
code allowed the attackers to infiltrate the targeted email account and subsequently create bogus invoices to the fund’s
trustee and third party administrator, which initiated and approved cash transfer requests resulting in $8.7 million in theft.
The bogus invoices also included a request for a $1.2 million payment to suspicious private equity firm Unique Star Trading.
The losses were so damaging and extensive that the firm was eventually forced to permanently close.
Typosquatting
Noblox.js is a wrapper for the Roblox API, a function widely used by many gamers to automate interactions with the
popular Roblox gaming platform. The software also appears to be attracting a new crowd. In 2021, hackers launched
typosquatting attacks via the noblox.js package by uploading confusingly similar packages laden with ransomware to a
registry for open source JavaScript libraries, and then distributing the infected files via a chat service. However, since
September of 2021, gamer Josh Muir along with several others have actively been cracking down on the attackers,
attempting to prevent the proliferation of ransomware through the noblox.js package and other code libraries, and
thwart further attacks on the gaming community.
Typosquatting
Splunk, Splunk> and Turn Data Into Doing are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All
other brand names, product names or trademarks belong to their respective owners. © 2022 Splunk Inc. All rights reserved.