The second half of 2024 has been a tumultuous period in the cybersecurity landscape. ESET’s latest Threat Report provides a comprehensive overview of the evolving threats and the innovative tactics employed by cybercriminals. This article delves into the key findings of the report, highlighting the most significant trends and offering practical advice for cybersecurity professionals.
The ESET Threat Report H2 2024 reveals a dynamic and ever-changing threat landscape. Cybercriminals have been relentless in their efforts to exploit vulnerabilities and develop new attack vectors. Here are some of the most notable trends observed in the report:
- Infostealers on the Rise
- Formbook has emerged as the leading infostealer, dethroning the long-dominant Agent Tesla. Formbook’s success can be attributed to its malware-as-a-service (MaaS) model, which makes it accessible to a wide range of cybercriminals1.
- Lumma Stealer, another MaaS offering, has seen a dramatic increase in detections, with a nearly 400% rise between reporting periods1.
- The notorious RedLine Stealer faced a significant setback after a takedown by international authorities in October 2024. However, its demise is likely to lead to the emergence of similar threats1.
- Cryptocurrency-Related Threats
- With cryptocurrencies reaching record values, cybercriminals have increasingly targeted cryptocurrency wallets. ESET’s telemetry shows a significant rise in cryptostealer detections, particularly on macOS, where detections more than doubled compared to H1 20241.
- Android financial threats, including those targeting banking apps and cryptocurrency wallets, grew by 20%1.
- Mobile Threats
- A novel attack vector leveraging Progressive Web App (PWA) and WebAPK technologies has been identified. These technologies allow cybercriminals to bypass traditional security measures, leading to the installation of malicious apps that steal banking credentials1.
- The lack of explicit permissions required for PWAs and WebAPKs poses a significant risk to mobile users1.
- Social Media Scams
- Accommodation Booking Scams
- Scammers have targeted users of popular accommodation booking platforms like Booking.com and Airbnb using a toolkit named Telekopye. This toolkit exploits compromised accounts to defraud users with fraudulent payment pages1.
- Ransomware Evolution
- The takedown of the former ransomware leader LockBit has reshaped the ransomware landscape. RansomHub, a ransomware-as-a-service (RaaS) first spotted in H1 2024, has quickly established itself as the new dominant player1.
- China-aligned, North Korea-aligned, and Iran-aligned APT groups have become more involved in ransomware attacks1.
10 Tips to Avoid Future Threats
- Regular Software Updates: Ensure all software, including operating systems and applications, are up to date to protect against known vulnerabilities.
- Use Strong, Unique Passwords: Implement strong, unique passwords for all accounts and consider using a password manager.
- Enable Multi-Factor Authentication (MFA): Add an extra layer of security by enabling MFA on all accounts.
- Educate Employees: Conduct regular cybersecurity training to keep employees informed about the latest threats and best practices.
- Implement Endpoint Protection: Use comprehensive endpoint protection solutions to detect and mitigate threats.
- Backup Data Regularly: Regularly back up critical data to ensure it can be restored in the event of a ransomware attack.
- Monitor Network Traffic: Continuously monitor network traffic for unusual activity that could indicate a breach.
- Secure Mobile Devices: Implement security measures for mobile devices, including encryption and remote wipe capabilities.
- Be Wary of Phishing Attempts: Educate users to recognize and avoid phishing emails and messages.
- Use Security Software: Deploy reputable security software to protect against malware, ransomware, and other threats.
Conclusion
The ESET Threat Report H2 2024 underscores the ever-evolving nature of the cybersecurity landscape. As cybercriminals continue to innovate, it is crucial for cybersecurity professionals to stay informed and proactive in their defense strategies. By understanding the latest threats and implementing robust security measures, organizations can better protect themselves against the growing tide of cybercrime.
Want to stay on top of cybersecurity news? Follow us on Facebook, X (Twitter), Instagram, and LinkedIn for the latest threats, insights, and updates!