Nuspire released its Q4 and full-year 2021 threat report findings, which indicated a decrease in activity across malware, botnets and exploits. In Nuspire’s webinar reviewing its findings, Josh Smith, Cyber Threat Analyst for Nuspire, and Justin Heard, Threat Intel & Rapid Response for Nuspire, highlighted the key data and trends they uncovered and offered practical tips to combat current cybersecurity threats.
Download the Q4 and Full-Year 2021 Threat Report
Josh and Justin outlined a five-step process they use to compile the report. They include:
While malware saw a 4% decrease in activity in Q4 when compared to Q3, it continues to plague individuals and businesses alike.
“Phishing is still a big issue, where you have some type of lure attached to an email, text or other type of communication to enable macros and infect your network,” Josh said.
Some of the biggest malware variants are VBA agents, which typically launch their campaigns around a specific event, such as the holiday season, to create a theme. Because Nuspire witnessed a continued decrease of VBA agent activity from Q3 into Q4, the team suspects attackers are spending the time retooling to prepare for another campaign in Q2 2022.
“Some great news we’ve learned is that Microsoft announced they’re going to disable VBA agents by default by Q2 2022,” said Josh. “Since 25% of all ransomware is launched by VBA agents, this is a welcome change.”
In Q4, ransomware was the only type of threat activity that saw an increase – 54%. However, Josh indicated that throughout 2021, he witnessed ransomware operators facing intense law enforcement collaboration at a level he hadn’t seen before.
“Because of the heightened scrutiny and action from law enforcement, we saw several ransomware families announce they were shutting down,” Josh said. “We anticipate ransomware operators will pivot to focus less on the ‘big game’ targets that create headlines to more of the small-to-medium organizations that will still net them a payout.”
When reviewing 2021 malware stats, Nuspire saw a 9.25% decrease in activity over 2020.
“The peak of malware activity happened in May 2021, and as with Q4, the top malware variants were VBA agents,” Josh said.
Malware Mitigation and Response
To combat malware, Nuspire recommends three mitigation measures, including:
“All three of these are important to safeguard your organization against malware threats, however cybersecurity awareness training will get you the most bang for your buck,” Justin said.
Nuspire saw a large drop in botnet activity compared to Q3 2021: 57.92%.
“This was a particularly quiet quarter when it came to botnet activity, however, we did see the resurgence of the Emotet botnet,” said Josh. “Emotet was shut down by law enforcement earlier this year, but came back in Q4 – though thankfully, we didn’t see the same amount of activity from Emotet as we did when it was in its prime.”
Justin added, “Botnets are one of the easier things to detect through our threat intelligence. However, it’s important to keep in mind that something that’s easy for us to detect is also typically easier for attackers to change, so it’s important to stay vigilant.”
Nuspire’s data show a 24% decrease in botnet activity in 2021 when compared to 2020.
“2020 was a really busy year for botnet activity,” said Josh. “Because Emotet was shut down at beginning of 2021, that had a significant impact on botnet activity for the year.”
To protect against botnets, Nuspire suggests these three steps:
For exploits, Nuspire witnessed a decrease of 45.97% in Q4 2021, with SMB brute forcing continuing to dominate.
“In Q4, SMB brute forcing was behind 52% of the exploits we saw,” said Josh. “Organizations need to understand their digital footprint and ensure their systems are patched.”
Josh also cautioned to stay up to date on patches for older exploits because ultimately, threat actors will scan for vulnerabilities on any service that’s exposed to the internet, and will use whatever tools are at their disposal to do it.
2021 saw a 13% decrease in exploit activity. Josh surmised that in 2021, security practitioners and admins were able to focus more on security once the dust settled from the rush to facilitate remote work in 2020.
Justin cautioned that threat actors are motivated by low-hanging fruit and opportunities that require the littlest amount of effort. He emphasized the need for organizations to disable any unneeded or unnecessary services and secure external ones behind a VPN.
Josh and Justin offered four measures organizations can employ to combat against exploits:
To access all the data and recommendations from the Q4 and Full-Year 2021 Threat Report, you can download it here.
You can also view the webinar to hear Josh and Justin break down the data.