SonicWall Cyber Threat Report – Fileless Malware Spikes in Q3

Fileless malware is a type of malicious software that exists exclusively as a memory based artifact (i.e., RAM). Fileless malware does not write any part of its activity to the computer’s hard drive, making it very resistant to existing computer forensic strategies that incorporate file-based whitelisting, signature detection, hardware verification, pattern-analysis, time-stamping, etc.

Read more

SonicWall Cyber Threat Report – Ransomware Targets Pt. 2

In Australia, the head of the local intelligence agency was recruited to inform universities about cyber threats and ways of prevention. This was one of the initiatives put in place after an extremely sophisticated threat actor compromised the Australian National University (ANU) and persisted within the university’s network for months at a time.

Read more

SonicWall Cyber Threat Report – Ransomware Targets

In 2019, there was an increase in ransomware used in targeted attacks toward state, provincial and local governments, as well as large corporations. Attacks have ranged from hospitals, police stations and educational institutions to aluminum factories (Norsk Hydro, Norway) and power grids (City Power, Johannesburg). “In a modern, citizen-centric environment, successful ransomware attacks are highly […]

Read more

SonicWall Cyber Threat Report – Cryptojacking Crumbles

The shuttering of the Coinhive mining operation in March 2019 dealt a devasting blow to the nefarious cryptojacking racket that abused the service. Coinhive was not inherently malicious; it was an alternative method for websites to earn revenue instead of showing advertisements.

Read more

SonicWall Cyber Threat Report – Advancements in Deep Memory Inspection

PDFs, Microsoft Office files among top new file types In 2019, SonicWall observed that most new threats are based on malicious PDFs or Office files, followed by Archives. PDF files are popular because they are searchable, can be viewed on any device, are easy to create and may be encrypted for security, password-protected and/or digitally […]

Read more

Sonicwall Cyber Threat Report – Top 10 Exploited CVES

In many cases, zero-day vulnerabilities are patched, fixed or otherwise mitigated before attacks can cause serious damage. Unfortunately, the inverse is also true. In 2019, SonicWall recorded and analyzed the top 10 CVEs that were exploited “in the wild.

Read more