Global Threat Intelligence Report Q3 2023 - v1.0
Global Threat Intelligence Report Q3 2023 - v1.0
Global Threat Intelligence Report Q3 2023 - v1.0
Threat
Intelligence
Report
July-September 2023
Q3
INTRODUCTION
Organizations large and small are increasingly
looking to leverage good threat intelligence to
update their cybersecurity infrastructures in
real time and maximize protection of their
businesses’ communications, people, and data.
SURGE,
critical security weaknesses in the
emerged during the third
quarter of 2023, and threat open-source graphics libraries libvpx1
and libwebp2, which are likely to be
CLOUDS
actors added to their growing
focus on cloud platforms and incorporated into attacker tools going
applications. We also saw forward. The vulnerabilities in the two
1
While Cl0p is an opportunistic criminal
Security professionals continued to face group, state-sponsored and state-linked
widespread breaches caused by a critical actors continued to take part in the
vulnerability in the MOVEit managed file- cyber component of Russia’s invasion of
transfer platform that began in Q2, at the Ukraine. Russia-affiliated groups, such as
end of May. Anonymous Sudan and Killnet, targeted
government agencies and companies
Then, the ransomware group Cl0p used affiliated with Ukraine’s allies, while Chinese
the previously undisclosed vulnerability hackers successfully stole a consumer
to compromise at least 200 — and signing key from Microsoft in July.
more likely, 400 or more — businesses.
Breach disclosures continued to trickle Both criminal and nation-backed groups
out during the third quarter. Many of continued the trend of targeting cloud
the victims provided services to client services, following the many businesses
organizations, which expanded the impact that have shifted IT operations and other
of data breaches to more than 2,300 services to the cloud.
organizations.
Looking ahead, security professionals’ concern over email-based attacks remains high, with 76% expecting
that a serious email-based compromise will impact their company this year and 72% anticipating a
similar attack through their collaboration tools. Publicly traded companies may find themselves targeted
more often as ransomware groups consider whether the new Securities and Exchange Commission rules
for disclosure of breaches will make companies more likely to pay ransoms.
QUARTER THREE 2023
2
IN CHARTS
Uptick in threats Impersonation PDFs still dominate, Top targeted Attachment
for medium-sized increased Excel becomes more industries vulnerabilities
firms common
01 02 03 04 05
Small- and medium- Impersonation Attackers’ use of PDF Human resource firms, Most attackers relied
sized companies face attacks become and Microsoft Excel information technology on exploiting two
a greater number of more sophisticated formats is growing. software and services, vulnerabilities using
threats than their as opportunistic Our data shows and financial services malicious attachments:
larger counterparts. cybercriminal groups attackers’ use of (especially banking) a flaw in the equation
used it to gain initial malicious PDF files saw the most threats editor for Microsoft
access to targeted increased by 158% in per user. Consistently Office (CVE-2018-
organizations. Q3 2023 from the high levels of threat 0802) and a bypass
prior quarter, while activity were also of Microsoft Office’s
the use of various detected against security features
Excel formats the manufacturing, (CVE-2016-7262).
increased by 86%. transportation, storage
and delivery, and
retail and wholesale
industries.
01 Encounter rates: uptick in FIGURE 1 - Users at medium-sized companies saw more threats
threats for medium-sized firms Small (blue line) and medium-sized (red line) companies see more threats on
average each quarter, but in the third quarter, users at medium-sized companies
saw a significant uptick in threats.
Users at small- and medium-sized companies
face a greater number of threats than their larger
counterparts3 because opportunistic attackers tend to
see smaller companies as easier targets for phishing and
ransomware campaigns. In addition, because of their
45
smaller size, email threats targeted at specific internal
groups — such as accountants or developers — will have
an outsized impact on smaller companies.
3. As Attacks Rise, SMBs Need a Cybersecurity Playbook, Mimecast Cyber Resilience Insights Blog
02 Encounter rates:
impersonation on
the rise
On average, users saw more
non-spam, non-malware
spam
threats in Q3 2023 compared
to Q2 2023. While the
+7%
number of spam messages
encountered by the average
user increased 7% in the third
quarter from the previous
quarter, both the number
impersonation
of impersonation attempts
and malicious links sent
+12%
to each user increased by
double digits — 12% and 22%
respectively. Overall, URLs
continue to be a less frequent malicious
threat than impersonation,
which rivals spam for the links +22%
most encountered type of
email attack.
Impersonation attacks are a key tactic of state-linked
groups seeking to establish initial access into targeted FIGURE 2 - Attacks using impersonation and malicious links increase
networks, and the cyber component of Russia’s Users saw more threats using spam, impersonation, and malicious links in Q3 2023.
invasion of Ukraine likely contributed to the increase
in impersonation attacks. Traditionally, Russian tactics
target a specific adversary or region; but because other
countries are aiding in Ukraine’s defense, the attacks
20
now appear to be embracing broader targets. In fact,
attacks targeting organizations outside of Ukraine
outnumber those against Ukrainian targets. The result
is a spilling over of malicious email attacks to other 15
Mimecast technology filters dangerous emails as they Q2 2022 Q3 2022 Q4 2022 Q1 2023 Q2 2023 Q3 2023
2
2.04
Mimecast has seen consistently high levels of Average TPU
1.34
malware activity sustained at volume since the 1.22 1.22 2023 Q3
CVE-2012-1856
and servers.
SECURITY
have come to rely on the native security provided by
Google Workspace and Microsoft 365; but because the
two services account for 95% of all cloud email adoption,
4500
Mimecast blocks thousands of malicious email
messages targeting Microsoft 365 accounts every day 3000
Attack Count
utilizing their own services, such as Microsoft Dynamics 1500
4
Threat actors continue to focus on expanding the ways they
can gain initial access into companies, including adopting
collaboration software — such as Microsoft Teams — and
expanding their Living off the Land (LotL) techniques to
include a greater variety of programs. The underground
economy continues to produce more advanced tools —
the third quarter saw the rising popularity of a customized
phishing platform used by at least 500 threat actors.
BlackCat Advertising
3 JUL
Emotet
13 JUL
TeamTNT Phishes
MAJOR EVENTS
Campaign Hibernates? for Credentials
2023 Q3
Analysis finds BlackCat Emotet operation TeamTNT targets cloud
ransomware gang using appears to enter dormant credentials and kicks off
“malvertising” to gain
period again, according to cryptocurrency mining
initial access to business
several sources. However, campaign.
networks.
Mimecast has detected Read article
Read article
ongoing operations by
the group.
Read article
Qakbot Threat Group Targeting BEC Phishing Kit More Phishing Through
Takedown Okta Super Admins Uncovered Microsoft Teams
Two vulnerabilities in the WebP Worried that too many “affiliates” The phishing tactic of embedded zero-
open-source image library used by are discounting ransoms, the LockBit font-sized text has undergone some
browsers, email clients, and other ransomware group discusses the refinements and now attempts to make
applications are found to have imposition of a minimum ransom emails look more reputable by using
already been exploited by nation- set at 3% of the victim company’s zero-font text at the beginning of the
state actors, attacks that presage annual revenue. message — text which often shows
potential compromises for months, Read article up in the message list of popular
if not years, as consumers patch. email clients.
Read article Read article
Top 6 JULY [NCSC] Active Cyber Defense (ACD) – The Sixth Year Report
The number of malicious sites taken down by the UK government fell in 2022 to 1.8 million campaigns and 2.4 million
Advisories URLs, from 2.7 million campaigns and 3.1 million URLs in 2021. While the frequency of attacks has remained stable, the
servers behind extortion emails and cryptocurrency investment scams have short uptimes (1 hour to 1 day, on average),
Government sources issued resulting in the attacks ending before they could be taken down.
many advisories focused Reference
on email security during
12 JULY [CISA] Enhanced Monitoring to Detect APT Activity Targeting Outlook Online
the quarter, including
warnings of an increase in The US Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) warned
attacks on Outlook Online critical infrastructure agencies that advanced persistent threat (APT) groups had begun targeting Outlook Online with
attacks using a Microsoft account (MSA) consumer key to forge tokens.
and descriptions of fast-
Reference
turnaround extortion and
cryptocurrency scams.
30 AUG [CISA, FBI] Identification and Disruption of QakBot Infrastructure
CISA and the FBI released a joint advisory following the August 25 takedown of the Qakbot botnet. The advisory
In addition, government
included a description of the takedown, which severed the connections between command-and-control servers and
researchers noted that
victims’ machines, as well as indicators of compromise. The FBI worked with industry partners to share information,
many ransomware attacks including indicators of compromise, to help defenders detect Qakbot infections and remediate compromises.
continue to rely on well- Reference
understood techniques
to monetize any initial 11 SEP [NCSC, NCA] Ransomware, extortion and the cybercrime ecosystem
compromise of an
Ransomware and wiper malware have caused massive disruptions to business operations in the past five years. Show-
organization’s network.
ing their adaptability, however, today’s cybercriminals are focused more on monetizing opportunistic data breaches
using well-understood attack techniques.
Reference
12 SEP [NIST] WebP Vulnerabilities (Chrome: CVE-2023-5217 and CVE-2023-4863; Apple: CVE-2023-41064)
Both Google and Apple fixed zero-day vulnerabilities in the libwebp library that were being exploited by nation-state
actors. The library is not just used by browsers; it’s also used by other applications, including those on mobile devices,
which may not be updated as quickly as other consumer software.
Reference
5
HOW TO
TAKE
ACTION
Cybercriminals are tailoring
threats to take advantage
of current events using all
available attack vectors
but particularly those that
can be mass delivered
such as phishing, spam,
and impersonation emails.
Organizations should seek
to maintain adequate
standards of cyber hygiene
through the appropriate use
of hardening techniques for
organizational assets.
Threat-specific countermeasures
Mandate more security from third parties Scan external network for open ports
Attacks against organizations in the Organizations should regularly scan
manufacturing, transportation, storage and their external network to ensure any
delivery, and retail and wholesale sectors publicly accessible server ports are closed
represent significant third-party risk of or adequately secured and protected.
supply-chain compromise. Organizations Mimecast has noted continuing increases
should review their service-level in attacks against remote desktop protocol
agreements to set minimum levels of data (RDP) ports that have accounted for 80%
security and cybersecurity and find ways of effective ransomware compromises.
to monitor their suppliers more closely, Attackers will continue to look for open
such as external rating services, as well as RDP ports as a way to compromise
subject acquisitions to extra scrutiny. organizations.
Resources
Here is a list of resources (webinars, papers, advisories) that security groups can visit to better understand the threats and defenses.