Ransomware Attacks Drop
March 7, 2018
has recorded 9.32 billion malware attacks in 2017 and saw more
than 12,500 new Common Vulnerabilities and Exposures (CVE)
reported for the year.
•Cyber attacks are becoming the No. 1 risk to business, brands, operations and financials
•9.32 billion total malware attacks in 2017, an 18.4 percent year-over-year increase from 2016
•Ransomware attacks dropped from 638 million to 184 million between 2016 and 2017
•Ransomware variants, however, increased 101.2 percent
•Traffic encrypted by SSL/TLS standards increased 24 percent, representing 68 percent of total traffic
•Without SSL decryption capabilities in place, the average organization will see almost 900 attacks per year hidden by SSL/TLS encryption
•SonicWall identifies almost 500 new previously unknown
malicious files each day
Even with WannaCry, Petya, NotPetya and Bad Rabbit ransomware attacks stealing the headlines, the expectations of more ransomware attacks simply did not materialize as anticipated in 2017. Full-year data shows that ransomware attacks dropped from 638 million to 184 million between 2016 and 2017.
•Volume marked a 71.2 percent drop from the 638 million ransomware attack events SonicWall recorded in 2016
•Regionally, the Americas were victimized the most, receiving 46 percent of all ransomware attack attempts in 2017
•Europe saw 37 percent of ransomware attacks in 2017
•SonicWall Capture Advanced Threat Protection (ATP), a
cloud-based, multi-engine sandbox, identified one new malware
variant for every 250 unknown hits
Web traffic encrypted by SSL/TLS standards made yet another significant jump in 2017. This shift has already given more opportunity for cybercriminals and threat actors to hide malicious payloads in encrypted traffic.
•Encrypted SSL/TLS traffic increased 24 percent
•SSL/TLS traffic made up 68 percent of total traffic in 2017
•Organizations are beginning to implement security controls,
such as deep packet inspection (DPI) of SSL/TLS traffic, to
responsibly inspect, detect and mitigate attacks in encrypted
With most browsers dropping support of Adobe Flash, no critical flash vulnerabilities were discovered in 2017. That, however, hasn’t deterred threat actors from attempting new strategies.
•SonicWall provided protection against Microsoft Edge attacks, which we observed grew 13 percent in 2017 over 2016
•SonicWall also protects the most popular Adobe products — Acrobat, Acrobat DC, Reader DC and Reader — and we observed attacks against these applications were down across the board
•New targeted applications (e.g., Apple TV, Microsoft Office)
cracked SonicWall’s top 10 for the first time
Key arrests of cybercriminals continued to help disrupt malware supply chains and impact the rise of new would-be hackers and authors.
•Law enforcement agencies are making an impact by arresting and convicting malware authors and disruptors
•Cybercriminals are being more careful with how they conduct business, including dynamic cryptocurrency wallets and using different transaction currencies
•Cooperation between national and international law enforcement
agencies is strengthening the disruption of global cyber threats
While the total volume of ransomware attacks was down significantly year over year, the number of ransomware variants created continues an upward trend since 2015. The variant increase, coupled with the associated volume of 184 million attacks, leaves ransomware a prevelant threat.
•Ransomware variants increased 101.2 percent in 2017
•SonicWall Capture Labs threat researchers created 2,855 new unique ransomware signatures in 2017, up from the 1,419 published in 2016
•Ransomware against IoT and mobile devices is expected to
increase in 2018
Hackers and cybercriminals continued to encrypt their malware payloads to circumvent traditional security controls. For the first time ever, SonicWall has real-world data that unmasks the volume of malware and other exploits hidden in encrypted traffic.
•Encryption was leveraged more than previous years, for both legitimate traffic and malicious payload delivery
•SonicWall Capture Labs found, on average, 60 file-based malware propagation attempts per SonicWall firewall each day
•Without SSL decryption capabilities in place, the average
organization will see almost 900 file-based attacks per year
hidden by TLS/SSL encryption
While no single exploit in 2017 rose to the level of darknet hacker tools Angler or Neutrino in 2016, there were plenty of malware writers leveraging one another’s code and mixing them to form new malware, thus putting a strain on signature-only security controls. SonicWall Capture Labs uses machine-learning technology to examine individual malware artifacts and categorizes each as unique or as a malware that already exists.
•Total volume of unique malware samples in 2017 was 51.4 percent
higher than 2014
Cybercriminals are pushing new attack techniques into advanced technology spaces, notably chip processors.
•Memory regions are the next key battleground that organizations will battle over with cybercriminals
•Modern malware writers implement advanced techniques, including custom encryption, obfuscation and packing, as well as acting benign within sandbox environments, to allow malicious behavior to remain hidden in memory
•Organizations will soon need to implement advanced techniques
that can detect and block malware that does not exhibit any
malicious behavior and hides its weaponry via custom encryption