Modern Australian
Men's Weekly

.

Cyber Threat Surge: Trend Micro Blocks 160 billion Incidents in 2023

Ransomware detections fall 14% as alternative attack strategies evolve

HONG KONG SAR - Media OutReach Newswire - 12 March 2024 - Trend Micro Incorporated (TYO: 4704; TSE: 4704) a global cybersecurity leader, today revealed a 10% annual increase in total threats blocked in 2023 and warned that attackers are using more advanced methods to target fewer victims with the potential for higher financial gains.

To read a copy of the report, Calibrating Expansion: Annual Cybersecurity Threat Report, please visit: https://www.trendmicro.com/vinfo/hk/security/research-and-analysis/threat-reports/roundup/calibrating-expansion-2023-annual-cybersecurity-threat-report

Jon Clay, VP of threat intelligence at Trend: "We're blocking more threats than ever before for our customers. But understand that adversaries showed a variety and sophistication of TTPs in their attacks, especially in defense evasion. As our report demonstrates, network defenders must continue to proactively manage risk across the entire attack surface today. Understanding the strategies favored by our adversaries is the foundation of effective defense."

Trend Micro blocked 161 billion threats overall in 2023, compared to 82 billion threats five years ago. In 2023, threats blocked by email and web reputation dropped annually by 47% and 2%, respectively. Threats blocked by Trend's Mobile Application Reputation Service (-2%), Smart Home Network (-12%), and Internet of Things Reputation Service (-64%) also declined. However, there was a 35% annual increase in threats blocked under Trend's File Reputation Service (FRS).

This could indicate that threat actors are choosing their targets more carefully. Instead of launching attacks on a wider range of users and relying on victims clicking on malicious links in websites and emails, they're targeting a smaller number of higher-profile victims with more sophisticated attacks. This might enable them to bypass early detection layers like network and email filters—which could explain the surge in malicious file detections at endpoints.

Some other trends observed in the report include:

  • APT actors showed a variety and sophistication of their attacks against victims, especially around defense evasion tactics.
  • Email malware detection surged by 349% year-on-year (YoY), while malicious and phishing URL detections declined by 27% YoY – again highlighting the trend for more using malicious attachments in their attacks.
  • Business email compromise (BEC) detections increased 16% YoY.
  • Ransomware detections dropped 14% YoY. However, once again, the increase in FRS detections may indicate that threat actors are getting better at evading primary detection via techniques such as Living-Off-The-Land Binaries and Scripts (LOLBINs/LOLBAs), Bring Your Own Vulnerable Driver (BYOVD), zero-day exploits, and AV termination.
  • Linux and MacOS ransomware attacks were 8% of the overall ransomware detections.
  • There was an increase in remote encryption, intermittent encryption, EDR bypass using unmonitored virtual machines (VMs), and multi-ransomware attacks where victims were hit more than once. Adversaries have recognized EDR as a formidable defense but are now utilizing bypass tactics to get around this technology.
  • Thailand and the US were the top two ransomware victim countries, with banking as the most affected sector.
  • The top MITRE ATT&CK detections were defense evasion, command & control, initial access, persistence, and impact
  • Risky cloud app access was the top risk event detected by Trend's attack surface risk management (ASRM), recorded almost 83 billion times.
  • Trend's Zero Day Initiative discovered and responsibly disclosed 1914 zero-days, up 12% YoY. These included 111 Adobe Acrobat and Reader bugs. Adobe was the number one vendor for vulnerability reporting, and PDFs were the number one spam attachment type.
  • Windows applications were the top 3 vulnerabilities exploited through detections from our virtual patches.
  • Mimikatz (used in data harvesting) and Cobalt Strike (used in Command & Control) continued to be the preferred legitimate tools to abuse to aid criminal activity.

In light of these findings, Trend advises network defenders to:

  • Work with trusted security vendors with a cybersecurity platform approach to ensure resources are not only secured but also continuously monitored for new vulnerabilities.
  • Prioritize SOC efficiency by monitoring cloud applications carefully as they become more closely integrated into day-to-day operations.
  • Ensure all the latest patches/upgrades are applied to operating systems and applications.
  • Utilize comprehensive security protocols to safeguard against vulnerabilities, tighten configuration settings, control application access, and enhance account and device security. Look to detect ransomware attacks earlier in the attack lifecycle by shifting left in defenses during initial access, lateral movement, or data exfiltration stages.
Hashtag: #trendmicro #cyberthreat #cybersecurity





The issuer is solely responsible for the content of this announcement.

Trend Micro

Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, Trend Micro's cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, the platform delivers a powerful range of advanced threat defense techniques optimized for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response. With 7,000 employees across 65 countries, Trend Micro enables organizations to simplify and secure their connected world.

Understanding the Benefits of Split System Installation for Your Home

Climate control is essential to maintaining comfort in your home, especially during the extreme temperatures that many regions face. Whether you’r...

Best Aluminium Window Sliding Designs for Natural Light and Airflow

Bringing natural light and airflow into a space is one of the most efficient ways to create a healthy and comfortable home. In Sydney and across Aus...

Maximising Operational Efficiency: Electric Winch Hire Australia and Hydraulic Power Pack Hire Solutions

Image by jcomp on Freepik From urban construction sites and remote mining operations to coastal maritime facilities, specialised equipment solutio...

Navigating the Digital Frontier: Managed IT Support and Cyber Security Services in Brisbane

As Brisbane develops its technology scene, the need for adequate IT infrastructure and security becomes apparent. This is how digital transformati...

Navigating the System: Your Guide to Support Finding Work with a Disability Around Melbourne

Image by freepik Finding the right job can be a challenge for anyone, but it can feel particularly daunting when you're also navigating life with a ...

Say Goodbye to Draughts and Hello to Savings: Your Guide to Perth Window Replacement

Image by prostooleh on Freepik Are your windows looking worse for wear? Are you paying a hefty power bill due to sneaky draughts and poor insulation...

How to Choose the Right Horse Trailer for Your Riding Needs

Many horse owners travel long distances for riding lessons, competitions, or to move horses between properties. Having a safe and reliable trailer i...

Sydney Turf Installer for Instant Green Lawns and Long-Term Performance

Having a green lawn at home makes everything look better. Whether it’s the front yard, backyard, or a small patch beside the driveway, people in S...

Designing Better Living Spaces: Why New Kitchens in the Blue Mountains Are in High Demand

The Blue Mountains region is seeing a steady rise in home upgrades. According to recent housing data, kitchen renovations remain one of the most req...

The Role of Packaging Manufacturers in Reducing Supply Chain Costs

In today’s fast-paced logistics and distribution landscape, businesses are under constant pressure to optimise operations and reduce expenses. One...

Customising Roller Shutters for Warehouses, Factories, and Logistics Hubs

In today’s fast-paced industrial and commercial environments, security, functionality, and efficiency are paramount. Whether you manage a busy log...

Top Fire Hazards in Commercial Buildings and How to Avoid Them

When it comes to protecting lives, assets, and business continuity, fire safety should be at the forefront of every commercial property owner’s ri...

Refillable Bottles and the Role of Reusable Caps in a Sustainable Packaging Future

As industries across the globe strive to reduce environmental impact, refillable bottles and reusable caps are emerging as champions of sustainable ...

The Comprehensive Guide to Physiotherapy: Benefits & Techniques

It employs hands-on care, movement and advice to aid recovery and prevent further issues. Individuals of all stages of life utilize physiotherapy for ...

What Can Be Funded by the NDIS? A Guide to Approved Supports

The National Disability Insurance Scheme (NDIS) is designed to empower Australians with disability by providing funding for supports that improve in...

10 Desserts That Aren’t Complete Without a Dollop of Whipped Cream

There’s something undeniably luxurious about a generous dollop of freshly whipped cream. Light, fluffy, and subtly sweet, it has the power to tran...

Why Personalised Ornaments Make the Perfect Christmas Gift

In a season brimming with sentiment and tradition, gift-giving is one of the most cherished ways to show we care. And while store-bought items can b...

What Causes Depression? Biological, Psychological, and Social Triggers Explained

Depression is a complex mental health condition that can impact every aspect of a person’s life—from sleep and energy levels to relationships an...