Fortinet announced the latest semiannual Global Threat Landscape Report from FortiGuard Labs.In the first half of 2023, FortiGuard Labs observed a decline in organizations detecting ransomware, significant activity among advanced persistent threat (APT) groups,a shift in MITRE ATT&CK techniques used by attackers, and much more.In addition to the highlights below, readers can find the full analysis by reading the 1H 2023 Global Threat Landscape Report.
While organizations continue to find themselves in a reactive position due to the growingsophistication of malicious actors and the escalation of targeted attacks, ongoing analysis of the threat landscape in the 1H 2023 Global Threat Landscape Reporthelpsprovide valuable intelligence that can serve as an early warning system of potential threat activity and help security leaders prioritize their security strategy and patching efforts.Highlights of the report follow:
Organizations Detecting Ransomware Are on the Decline: FortiGuard Labs has documented substantial spikesin ransomware variant growth in recent years, largely fueled bytheadoption ofRansomware-as-a-Service (RaaS). However,FortiGuard Labs found that fewer organizations detected ransomware in the first half of 2023 (13%) compared to this timefive years ago (22%). Despite the overall decline, organizations must keep their guard up. This supports thetrend thatFortiGuard Labs has seen over the last couple of years, that ransomware and other attacks are becoming increasingly more targetedthanks to the growing sophistication of attackers and the desire to increase the return on investment (ROI)per attack.Research also found that the volume of ransomwaredetections continues tobe volatile, closing 1H 2023 13x higher than the end of 2022but still on a downward trend overall when comparing year-over-year.
Malicious ActorsAre 327x More Likely to AttackTop EPSS Vulnerabilities within Seven DaysCompared to All Other CVEs: Since its inception, Fortinet has been a core contributor of exploitation activity data in support of the Exploit Prediction Scoring System (EPSS). This project aims to leverage a myriad of data sources to predict the likelihood and when a vulnerability will be exploited in the wild. FortiGuard Labs analyzed six years of data spanning more than 11,000 published vulnerabilities thatdetected exploitation and found that theCommon Vulnerabilities and Exposures(CVEs) categorized with a high EPSS score (top 1% severity) are 327x more likely to be exploited within seven days thanany other vulnerability.This first-of-its-kind analysis can serve as the canary in the coal mine, giving CISOs and security teams an early indication oftargeted attacks against their organizations.Like the Red Zone, introduced in the last Threat Landscape Report, this intelligence can help security teams systematically prioritize patching efforts to minimize their organizations’ risk.
The Red Zone Continues to Help CISOs PrioritizePatchingEfforts: The analysis by FortiGuard Labs around EPSS exploitation in the wild expands upon the efforts to define the Red Zone, which helps quantify the proportion of available vulnerabilities on endpoints thatare being actively attacked.In the second half of 2022, the Red Zone was around 8.9%, meaning that about 1,500 CVEs of the more than 16,500 known CVEs were observed under attack. In the first half of 2023, that number dropped slightly to 8.3%. The delta between the 2H 2022 and 1H 2023 is minimal and would seem to be the sweet spot for malicious actors targeting vulnerabilities on endpoints. Still, it is important to note that the number of vulnerabilities discovered, present, and exploited constantly fluctuates. These variables and the effectiveness of an organization’s patch management strategy could dramatically decrease its Red Zonesurface.Like the EPSS analysis above, FortiGuard Labs continues to invest in more effective ways to help organizations prioritize and more quickly close vulnerabilities.
Nearly One-Third of APT Groups Were Active in 1H2023: For the first time in the history of the Global Threat Landscape Report, FortiGuard Labs tracked the number of threat actors behind the trends. Research revealedthat 41 (30%) of the 138 cyberthreat groups MITRE tracks were activein the 1H 2023. Of those, Turla, StrongPity, Winnti, OceanLotus, and WildNeutron were the most active based on malware detections.Given the targeted nature and relatively short-lived campaigns of APTand nation-state cyber groups compared to the long life and drawn-out campaigns of cybercriminals, the evolution and volume of activity in this area will be something to look forwardto in future reports.
Five-Year Comparison Reveals Explosion in Unique Exploits, Malware Variants and Botnet Persistence:
- Unique Exploits on the Rise:In 1H 2023,FortiGuard Labs detected more than 10,000 unique exploits,up 68% from five years ago. The spike in unique exploit detections highlights the sheer volume of malicious attacks security teams must be aware of and howattacks have multiplied and diversified in a relatively short amount of time. The report also shows over a 75% drop in exploitation attempts per organization over a five-year window and a 10% dip in severe exploits, suggesting that while malicious actor exploit toolkits have grown, the attacks are much more targeted than five years ago.
- Malware Families and Variants Exploded,Up 135% and 175% Respectively:In addition to the significant uptick in malware families and variants, another surprising finding is that the number of malware families that propagate to at least 10% of global organizations (a notable prevalence threshold) has doubled over the last five years. This escalation in malware volume and prevalence can be attributed to more cybercriminal and APT groups expanding operations and diversifying their attacks in recent years.A significant focus of the last Global Threat Landscape report was the surge in wiper malwarelargely tied to the Russian-Ukraine conflict. That increase persisted throughout 2022 but slowed over the first half of 2023.FortiGuard Labs continues to observe wipers being used by nation-state actors, although the adoption of this type of malware by cybercriminalscontinues to grow as they target organizations in technology, manufacturing, government, telecommunications, and healthcare sectors.
- Botnets Lingering in Networks Longer Than Ever:While the report finds more active botnets (+27%) and a higher incidence rate among organizations over the last half-decade (+126%), one of the more shocking findings is the exponential increase in the total number of “active days”, which FortiGuard Labs defines as the amount of time that transpires between the first hit of a given botnet attempt on a sensor and the last. Over the first six months of 2023, the average time botnets lingered before command and control (C2) communications ceased was 83 days, representing over a 1,000xincrease from five years ago. This is another example where reducing the response time is critical because the longer organizations allow botnets to linger, the greater the damage and risk to their business.
Disrupting CybercrimeRequires an All-in Approach
FortiGuard Labs’ contributionsto the threat intelligence community over the last decadehavemade significant impacts around the globe, helping to improve protections for customers, partners, and governments in their fight against cybercrime. Breaking down silos and increasing the quality of actionable threat intelligence helpsorganizations reduce risk and enhances the overall effectiveness of the cybersecurity industry. Cyber defenders today currently possess access to the tools, knowledge, and support to begin altering the economics of malicious actors. Still, it’s an industrywide commitment to collaboration and intelligence sharing that will ultimately create a larger ecosystem of disruption and allow the industry to gain the upper handagainst cyber adversaries.
As a leader in enterprise-class cybersecurity and networking innovation, Fortinet helps secure over half a million organizations worldwide, including global enterprises, service providers, and government organizations. Of note, Fortinet’s ongoing development of artificial intelligence (AI) applied to cybersecurity uses cases, in both our FortiGuard Labs and product portfolio,is speeding the prevention, detection, and response to known and unknown threats.
Specifically, FortiGuard AI-Powered Security Servicesare utilized by security controls deployed across endpoints and applications through both network and cloud infrastructure. Purpose-built detection and response technologiesthat leverage AI engines and cloud analytics (including EDR, NDR, and others)can alsobe deployed as integrated extensions of such controls. Fortinet also offers centralized response tools, such as XDR, SIEM, SOAR, DRPS, and more,that leverage different AI, automation, and orchestration to speed remediation. These can allsignificantly disrupt cybercrime across the entire attack surface and along the cyberattack kill chain.