aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • Research
  • Technology

29% Of Cyber Threats Previously Unknown, HP Research Finds

  • aster.cloud
  • March 17, 2021
  • 5 minute read

HP Inc. (NYSE: HPQ) released its new Quarterly Threat Insights Report, providing analysis of real-world attacks against customers worldwide. The report found that 29% of malware captured was previously unknown* – due to the widespread use of packers and obfuscation techniques by attackers seeking to evade detection. 88% of malware was delivered by email into users’ inboxes, in many cases having bypassed gateway filters. It took 8.8 days, on average, for threats to become known by hash to antivirus engines – giving hackers over a week’s ‘head-start’ to further their campaigns.

The report provides a unique glimpse into the behavior of malware in the wild, as – unlike other endpoint security tools, which aim to prevent or intervene in an attack – HP Sure Click lets malware run, tricking malware into executing, while capturing a full infection chain within isolated, micro-virtual machines. This hardware-enforced approach to security renders malware harmless and keeps customers safe.


Partner with aster.cloud
for your next big idea.
Let us know here.



From our partners:

CITI.IO :: Business. Institutions. Society. Global Political Economy.
CYBERPOGO.COM :: For the Arts, Sciences, and Technology.
DADAHACKS.COM :: Parenting For The Rest Of Us.
ZEDISTA.COM :: Entertainment. Sports. Culture. Escape.
TAKUMAKU.COM :: For The Hearth And Home.
ASTER.CLOUD :: From The Cloud And Beyond.
LIWAIWAI.COM :: Intelligence, Inside and Outside.
GLOBALCLOUDPLATFORMS.COM :: For The World's Computing Needs.
FIREGULAMAN.COM :: For The Fire In The Belly Of The Coder.
ASTERCASTER.COM :: Supra Astra. Beyond The Stars.
BARTDAY.COM :: Prosperity For Everyone.

“This report highlights the deficiencies in traditional defenses that rely on detection to block malware,” said Dr. Ian Pratt, Global Head of Security for Personal Systems at HP Inc. “Attackers have repeatedly found new ways to bypass traditional detection-based tools, making it more important than ever for organizations to build zero-trust design principles into their security architecture.”

Notable threats isolated by HP Sure Click included:

•   Web Browser exploits leading to FickerStealer: A malware campaign that relied on misspelled domains of popular instant messaging services. Visitors were redirected to RigEK landing pages that attempted to exploit web browser and plugin vulnerabilities to infect visitors’ PCs with information-stealing malware called FickerStealer.

•   Delivery-themed lures tempting users into letting the RATs in: A new Office malware builder called APOMacroSploit was used to target victims in delivery-themed spam campaigns, tricking them into opening weaponized XLS attachments, ultimately leading to the BitRAT remote access Trojan being deployed on their computers.

Read More  Training Deep Learning-Based Recommender Models Of 100 Trillion Parameters Over Google Cloud

•   The return of ZLoader: An increase in ZLoader banking Trojan activity, using a combination of techniques – including Word documents masquerading as pharmaceutical invoices that run malicious macros only after the document has been closed.

•   The art of misdirection through DOSfuscation: Emotet’s final burst of activity before its takedown in January 2021 saw its operators modify the downloader using DOSfuscation techniques to make its obfuscation more complex. The downloader also generated an error message when opened, helping to avoid suspicion from users when the malicious documents didn’t behave as expected.

•   Email thread hijacking of government targets: HP Sure Click stopped email thread hijacking attacks against government organizations in Central America, where stolen email data was used to craft convincing phishing lures to distribute Emotet.

“Opportunistic cybercrime does not show any signs of slowing,” comments Alex Holland, senior malware analyst at HP Inc. “Cybercriminals are exploiting low-cost malware-as-a-service kits, which are proliferating in underground forums. Kits like APOMacroSploit, which emerged in Q4 2020, can be bought for as little as $50 USD, illustrating just how low the barrier to entry is for opportunistic cybercrime. We have also seen threat actors continue to experiment with malware delivery techniques to improve their chances of establishing footholds into networks. The most effective execution techniques we saw in Q4 2020 involved old technologies like Excel 4.0 macros that often offer little visibility to detection tools.”

Other key findings in the report include:

•   Trojans made up 66% of malware samples analyzed, driven largely by malicious spam campaigns distributing Dridex malware, which a recent HP blog flagged as having increased in prevalence by 239%.

Read More  Dell Technologies Delivers Zero Trust, Cybersecurity Solutions To Protect Multicloud And Edge Environments

•   88% of malware detected was delivered via email – with the most common lures being fake invoice attachments – while web downloads were responsible for the remaining 12%.

•   The most common type of malicious attachments were: documents (31%), archive files (28%), spreadsheets (19%) and executable files (17%).

•   Malicious executables rose by 12%, with CVE-2017-11882 – a memory corruption flaw in Microsoft Office’s Equation Editor – accounting for nearly three-quarters of the exploits isolated by HP Sure Click.

•   A 12% growth in malware that exploits CVE-2017-0199, which is commonly used to run malicious scripts to deploy malware when a user opens an Office document.

“Q4 saw attackers shift from Word documents to executable files to deliver RATs. There was an uptick in malicious email campaigns targeting German users with Agent Tesla and Formbook RATs that were delivered as executables attached to emails,” continued Holland. “The largest rise was in Dridex campaigns, which are typically used by attackers to deploy ransomware. Ultimately, any attacker gaining a foothold on an endpoint is bad news – they can use this access to scrape credentials, move laterally between systems, exfiltrate data, or sell their access to other cybercriminals – so it creates huge risk for businesses.”

“For every new malware variant hackers create, they have a few days’ head start to capitalize on their campaigns, infecting machines before detection tools catch-up. With automation, this process is now easier than ever” continues Dr. Pratt.

“Trying to detect every threat is futile, as something will always slip through the net,” Pratt added. “The best cyber defense is being able to isolate risks on the endpoint through micro-virtualization. This kind of hardware-enforced isolation removes the opportunity for malware to cause harm to the host PC – even from novel malware – because it does not rely on a detect-to-protect security model. By having security built in at the hardware level, endpoint devices can help to defend users and recover from attacks automatically, improving business resiliency. This way, businesses can carry on doing what they do best, safe in the knowledge that their users and data are protected.”

About the data

Read More  UScellular, In Collaboration With Qualcomm And Inseego, Launches 5G mmWave High-Speed Internet Service In 10 Cities

This data was gathered within HP customer Sure Click virtual-machines from October-December 2020.

About HP

HP Inc. (NYSE: HPQ) creates technology that makes life better for everyone, everywhere. Through our product and service portfolio of personal systems, printers and 3D printing solutions, we engineer experiences that amaze. More information about HP Inc. is available at http://www.hp.com.

*Based on first-seen in the wild data from multiple antivirus engines.

Disclaimer

©Copyright 2021 HP Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the expresswarranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.


For enquiries, product placements, sponsorships, and collaborations, connect with us at [email protected]. We'd love to hear from you!

Our humans need coffee too! Your support is highly appreciated, thank you!

aster.cloud

Related Topics
  • Cyber Threats
  • Cybersecurity
  • FickerStealer
  • HP
  • HP Inc.
You May Also Like
View Post
  • Computing
  • Multi-Cloud
  • Technology

Pure Accelerate 2025: All the news and updates live from Las Vegas

  • June 18, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

‘This was a very purposeful strategy’: Pure Storage unveils Enterprise Data Cloud in bid to unify data storage, management

  • June 18, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

What is cloud bursting?

  • June 18, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

There’s a ‘cloud reset’ underway, and VMware Cloud Foundation 9.0 is a chance for Broadcom to pounce on it

  • June 17, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

What is confidential computing?

  • June 17, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

Oracle adds xAI Grok models to OCI

  • June 17, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

Fine-tune your storage-as-a-service approach

  • June 16, 2025
View Post
  • Technology

Advanced audio dialog and generation with Gemini 2.5

  • June 15, 2025

Stay Connected!
LATEST
  • 1
    Pure Accelerate 2025: All the news and updates live from Las Vegas
    • June 18, 2025
  • 2
    ‘This was a very purposeful strategy’: Pure Storage unveils Enterprise Data Cloud in bid to unify data storage, management
    • June 18, 2025
  • What is cloud bursting?
    • June 18, 2025
  • 4
    There’s a ‘cloud reset’ underway, and VMware Cloud Foundation 9.0 is a chance for Broadcom to pounce on it
    • June 17, 2025
  • What is confidential computing?
    • June 17, 2025
  • Oracle adds xAI Grok models to OCI
    • June 17, 2025
  • Fine-tune your storage-as-a-service approach
    • June 16, 2025
  • 8
    Advanced audio dialog and generation with Gemini 2.5
    • June 15, 2025
  • 9
    A Father’s Day Gift for Every Pop and Papa
    • June 13, 2025
  • 10
    Global cloud spending might be booming, but AWS is trailing Microsoft and Google
    • June 13, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • Google Cloud, Cloudflare struck by widespread outages
    • June 12, 2025
  • What is PC as a service (PCaaS)?
    • June 12, 2025
  • 3
    Crayon targets mid-market gains with expanded Google Cloud partnership
    • June 10, 2025
  • By the numbers: Use AI to fill the IT skills gap
    • June 11, 2025
  • 5
    Apple services deliver powerful features and intelligent updates to users this autumn
    • June 11, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.