2022 Security Report 01-24-22
2022 Security Report 01-24-22
DESERVE
THE BEST
SECURITY
01
INTRODUCTION
TO THE CHECK POINT
2022 SECURITY REPORT
M AYA HOROW IT Z
VP Research, Check Point
The past twelve months represents one of the most turbulent and disruptive periods
on record, at least as far as security is concerned. As governments and businesses
around the world continued to navigate the uncharted waters of a global pandemic,
the so-called “new normal” still felt a long way off. Digital transformation efforts
were dramatically accelerated as businesses embraced hybrid and remote working
arrangements, but the same questions around security maturity that plagued many
businesses in 2020 persisted through 2021. While some of those questions remain
up in the air, threat actors have wasted no time whatsoever in turning the situation
to their advantage. Cyberattacks are up by an average of 50% since we issued our
last annual report, with the education and research sector suffering the biggest
blow, averaging 1,605 attacks every single week throughout the year. As predicted,
the infamous SolarWinds breach appears to have kickstarted a trend of supply chain
attacks that have persisted throughout the year, showing no signs of slowing down.
In this 2022 Security Report, we will reveal the key attack vectors and techniques
that our researchers here at Check Point Software have observed over the past year.
From a new generation of highly sophisticated supply chain attack methods, right
through to the Log4j vulnerability exploit that rendered hundreds of thousands of
businesses open to a potential breach.
We’ll start with a month-by-month rundown of the year’s major cyber events, before
doing a deep dive into some of the emerging trends that will undoubtedly shape the
year to come. We’ll discuss cloud services, developments in the mobile landscape
and IoT, cracks in the ransomware ecosystem, the return of Emotet, and, of course,
the Log4J zero-day vulnerability that punctuated an already busy year.
02
TIMELINE
OF 2021'S MAJOR
CYBER EVENTS
01
accessed in order to steal sensitive data. The department has more than 100,000
employees across a series of law enforcement agencies, including the FBI, the Drug
Enforcement Agency, and the US Marshals Service. The Department of Justice was a
buyer of SolarWinds Orion, a tool that was used by hackers to execute this attack, leading
to as many as 18,000 SolarWinds customers experiencing a breach. The Department
of Justice said it learned it was a victim on Christmas Eve, revealing that a small
percentage of its Microsoft Office 365 email accounts had been compromised.
FEB
02
In February, popular music streaming platform, Spotify, was hit by a credential-stuffing
attack, only three months after experiencing a similar incident. The attack used stolen
credentials from 100,000 user accounts and leveraged a malicious Spotify login database.
The attack was reported to Spotify, which prompted the company to issue a password
reset to affected users that rendered the stolen credentials invalid. The company said
in a statement that it also worked to have the fraudulent database taken down by its
internet service provider, and noted that the attack was not linked to a breach in Spotify's
own security. Cybercriminals carrying out credential-stuffing exploit people who reuse
the same passwords across multiple online accounts and platforms. Attackers simply
build automated scripts that systematically try stolen IDs and passwords against various
types of accounts.
MAR
03
On March 2nd, 2021, Volexity reported the in-the-wild exploitation of the Microsoft
Exchange Server vulnerabilities, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858,
and CVE-2021-27065. Further investigation uncovered that an attacker was exploiting
a zero-day used in the wild. The attacker was using the vulnerability to steal the full
contents of several user mailboxes. This vulnerability is remotely exploitable and does
not require authentication, special knowledge or access to a specific environment. It was
estimated that 250,000 servers fell victim to the attacks, including servers belonging
to around 30,000 organizations in the United States and 7,000 servers in the United
Kingdom. The European Banking Authority, the Norwegian Parliament, and Chile's
Commission for the Financial Market (CMF) were also impacted.
04
joint advisory warning that a Russia-linked APT group, APT29, was exploiting five
vulnerabilities in an ongoing attack against US targets. According to the advisory,
Russian Foreign Intelligence Service (SVR) actors (also known as APT29, Cozy Bear,
and The Dukes) frequently used publicly known vulnerabilities to conduct widespread
scanning and exploitation against vulnerable systems in an effort to obtain authentication
credentials to allow further access. Recent Russian SVR activities include compromising
SolarWinds Orion software updates, targeting COVID-19 research facilities through
deploying WellMess malware, and leveraging a VMware vulnerability that was a zero-day
at the time.
MAY
05
In May, a ransomware attack shut down the routine operations of Colonial Pipeline,
which carries 45% of the fuel consumed in the US East Coast, including diesel, petrol
and jet fuel. The alleged Russian DarkSide ransomware criminal group, was behind the
attack. Colonial Pipeline is the largest refined products pipeline in the US, a 5,500 mile
(8,851 km) system involved in transporting over 100 million gallons from the Texas city
of Houston to New York Harbor. DarkSide uses Ransomware-as-a-Service (RaaS) model,
where it relies on affiliate program to execute its cyber attacks. Colonial Pipeline paid a
ransom demand of close to US$ 5 million in return for a decryption key. Later on, the FBI
declared it had retrieved the private key of the ransom account and recovered 63.7 of the
bitcoins paid.
JUN
06
JBS, the US-based meat processing giant, was hit by a ransomware attack in June
affecting its North American and Australian operations. The FBI attributed the attack to
the REvil ransomware group. The attack forced JBS to temporarily shut down all of its
beef plants in the United States. One of its Canadian plants was also affected, and the
company paused beef and lamb kills in Australia until the plants were back online. On
June 9, JBL’s Chief Executive in the US revealed the company had paid US$ 11 million to
hackers in a “very painful but necessary decision”, despite the fact that the company was
able to restore most of its systems from its own backups.
07
implanted a malicious software update for IT Company Kaseya’s VSA patch management
and client monitoring tool, which included the malware installer. An estimated 1,000
companies were impacted by the attack. The massive supply chain attack carried out by
REvil over the 4th of July weekend impacted numerous Kaseya customers with millions
of USD demanded in ransom. Kaseya issued a security advisory on their site, warning
all customers to immediately shut down their VSA server to prevent the spread of the
attack while they investigated. In order to breach on-premise Kaseya VSA servers, REvil
used a zero-day vulnerability that was in the process of being fixed. The vulnerability had
been previously disclosed to Kaseya by security researchers from the Dutch Institute
for Vulnerability Disclosure (DIVD), and Kaseya was validating the patch before rolling
it out to customers. However, the REvil ransomware gang was one step ahead of Kaseya
and used the vulnerability to carry out their attack, with ransoms ranging from US$ 45K
to US$ 5 million. With the attack on Kaseya VSA servers, REvil’s affiliate was initially
targeting Kaseya’s MSSP’s, with a clear intent to propagate to the MSSP customers. The
attack amplified exponentially from the MSSP to the actual customers.
AUG
08
The largest ever distributed denial of service (DDoS) attack was detected in August,
with 17.2 million requests-per-second. The attack was facilitated by the Mirai botnet,
targeting an organization in the financial industry. In this specific incident, the traffic
originated from more than 20,000 bots in 125 countries worldwide, with almost 15% of
the attack originating from Indonesia, followed by India, Brazil, Vietnam, and Ukraine.
Mirai was first observed in 2016 targeting Internet of Things (IoT) devices, such as CCTV
cameras and routers. Numerous variants of the botnet have emerged since, expanding
the list of targeted devices to include Linux routers and servers, Android devices, and more.
SEP
09
Check Point Research saw a global surge in the black market for fake COVID-19
vaccine certificates on Telegram, following US President Biden’s vaccine mandate
announcements. The black market expanded to serve 28 countries, including Austria,
UAE, Brazil, UK, Singapore and more. The price for fake vaccine certificates also jumped
globally, including in the US, where it doubled from US$ 100 to US$ 200.
10
second time in three months, bringing their operation to a halt. This comes after REvil’s
leaks website “Happy Blog” was previously shut down in July (along with the suspicious
disappearance of one of REvil gang leaders “UNKN”), and after it was brought back up
again during September, by one of its remaining gang leaders. REvil ransomware became
notorious during 2021 with a series devastating attacks, especially after their successful
ransom of the JBS food company, for US$ 11 million, and their later compromise of
Kaseya - a US software management company, in July. These increasingly devastating
attacks were matched by an increased pressure from authorities, and the launch of an
offensive attack against REvil’s infrastructure and its members.
NOV
11
On November 14, Emotet, one of the most infamous botnets in history, rose from the
dead after it was taken down ten months earlier, by a joint international law enforcement
operation. Emotet used the Trickbot botnet to jump-start its operation, when machines
already infected with the Trickbot Trojan, started to download and execute the latest
version of Emotet. Emotet itself came back even stronger than before, with some new
additions to its toolbox, such as an updated encryption scheme, control-flow obfuscations
and new delivery methods.
DEC
12
On December 9th, an acute remote code execution (RCE) vulnerability was reported in
the Apache logging package Log4j 2 versions 2.14.1 and below (CVE-2021-44228). Apache
Log4j is the most popular java logging library with over 400,000 downloads from its
GitHub project. It is used by a vast number of companies worldwide, enabling logging
in a wide set of popular applications. Exploiting this vulnerability is simple. The Log4j
library is embedded in almost every internet service or application we are familiar with,
including Twitter, Amazon, Microsoft, Minecraft and more. Since the outbreak, Check
Point Research witnessed what looks like an evolutionary repression, with new variations
of the original exploit being introduced rapidly - over 60 in less than 24 hours. This was
clearly one of the most serious vulnerabilities on the internet in recent years.
03
2021’S
CYBER SECURITY TRENDS
LOTEM FINKELSTEEN moment for the security community, not just because
Director,
of the scale of the attack, but because the technique
Threat Intelligence that was used revealed new levels of sophistication
& Research
that increased the threat of supply chain attacks more
generally. The SolarWinds breach set a new tone and, as
predicted, we’ve seen the number of software supply-
chain incidents grow in its wake. This past year, we’ve
seen the number of incidents increase six-fold, and there
are yet again signs that businesses aren’t prepared to
deal with the threat.”
As detailed in our previous report, beyond Naturally, prominent APT groups are an integral
its unprecedented scale, SolarWinds’ main part of the trend. The North Korean Lazarus
innovation lies in its technique. In order to gain group recently began targeting IT service
access to an organization’s sensitive Microsoft providers to launch supply chain attacks,
365 resources, the attackers first used a forged and a new backdoor called BLINDINGCAN
token to compromise the local and on-premise has already been used to target a Latvian IT
networks, before moving laterally to the cloud vendor and a South Korean software company.
environment. Today, we can clearly state that Additional incidents include an attack against
the SolarWinds attack laid the foundations for a a CCTV vendor carried out by an affiliate of the
rapid surge in supply chain attacks. DarkSide ransomware gang, in which the actors
compromised the vendor’s website to infect its
Throughout 2021, software supply chain attacks
clients with ransomware.
grew in both frequency and scale. Researchers
concluded that software supply-chain attacks One of the most significant supply chain
increased by no less than 650% throughout attacks of 2021, also featuring ransomware
the year. A study issued by the European Union delivery, targeted Kaseya, a global provider of
Agency for Cybersecurity (ENISA) reviewed IT management software for managed service
two dozen incidents and found that 66% of providers (MSPs) and IT teams. The attack
supply chain attacks were committed by was carried out by a member of the affiliates
exploiting an unknown vulnerability, while only program of the REvil ransomware group.
16% leveraged known software flaws. Most According to the Kaseya CEO, less than 0.1% of
attacks actually targeted software code. This the company’s customers were accessed, but as
year, it seems that organizations were once some of Kaseya’s clients are MSPs themselves,
again caught largely unprepared, as a survey as many as 1,500 companies were affected
concluded that 82% of companies designate the by the attack. The threat actors cleverly
third party vendors that make up their software exploited a vulnerability affecting Kaseya’s
supply chain with highly privileged roles. 76% internet-facing VSA servers. VSA is a remote-
provide roles that could allow account takeover, monitoring tool commonly used by MSPs for the
and, worst of all, over 90% of designated security management of network and endpoint devices.
teams were not aware that such permissions When the attack was discovered by Kaseya, the
were even granted. company urged its customers to shut down their
VSA servers.
In late October, the popular NPM package ‘ua- This year, the group behind the SolarWinds
parser-js’, with millions of weekly downloads, attack itself resumed activity, utilizing the
was compromised by attackers. For a period approach developed for the first attack and
of four hours, the actors managed to take over focusing yet again on companies that are part
the developer’s NPM account and inserted of the global IT supply chain. However, this
malicious code into three versions of the NPM time, a different part of the chain is being
library. The library, which is used to parse targeted, namely cloud resellers and tech
user agent strings and identify its browser, service providers. These companies customize,
operating system, CPU and more, is used in implement, and manage cloud services for their
thousands of projects, including ones owned customers. The threat group clearly relies on
by Facebook, Microsoft, Amazon, Google and these companies’ direct access to their clients’
Slack. Therefore, the supply chain attack, in environments to obtain access to their full
which compromised packages of the library client lists in a single strike, impersonating a
were distributed instead of the legitimate one, trusted partner. The operation has been taking
enabled threat actors to install malware on a place since May 2021 and has already impacted
large number of infected devices. In this case, more than 140 resellers and providers,
Linux and Windows devices were infected with compromising 14 of them. Throughout the
crypto-miners and password-stealers. second half of the year, the ‘Nobelium’ threat
group has been highly active, but with a lower
Another prominent incident took place in
success rate due to growing awareness. The
November, when multiple Greek shipping
group utilizes multiple tactics, including the
companies were hit by ransomware. This was
use of stolen credentials obtained via an
after a common IT service provider, Danaos
info-stealer campaign by a third-party actor,
Management Consultants, was compromised in
leveraging application impersonation privileges
a supply chain attack. The incident crippled the
to collect protected mail data, and abuse multi-
shipping companies’ communication channels,
factor authentication (MFA). The recent attack
interrupting contact with other ships, suppliers,
wave may signal a growth in the resources
and agents, and also led to data loss.
invested by the Russian state-sponsored group
in the field of supply chain operations, as a
means to establish persistent access to targets
of interest to the Russian government.
Just when we thought we had finished Due to the scale of the distribution of the
summarizing the Supply Chain landscape for library, Log4Shell is referred to as the most
2021, the Log4j zero-day vulnerability was critical vulnerability of 2021, with the full scope
exposed. The Apache logging package Log4j is of the damage yet to be determined. The Apache
the most popular Java logging library with over Foundation released a patch for the RCE
400,000 daily downloads, and is incorporated vulnerability, but nevertheless, mass scanning
into millions of Java-based applications of vulnerable servers has been observed by
worldwide. Companies using Log4j as a logging multiple security vendors. The exploit rate of
package include Cisco, Twitter, Cloudflare, the Log4j flaw has been unusually high since
Tesla, Amazon, Apple and more. The Log4j shortly after its exposure. Check Point
package logs error messages; according to the Research detected approximately 40,000 attack
Apache Foundation advisory, an attacker who attempts 2 hours after the Log4j vulnerability
can control log messages or their parameters was revealed and 830,000 attack attempts 72
could execute arbitrary code from an external hours into the event.
server via multiple protocols when message
lookup substitution is enabled. Only a single The vulnerability could potentially allow
string of text is needed to exploit the flaw. threat actors to access any system using the
library, including systems that are used to
Since its discovery on December 9, the manage client networks and resources. The
‘Log4Shell’ flaw, has been actively exploited in potential damage that could be caused by this
the wild. The vulnerability, assigned CVE-2021- one vulnerability in an open source library
44228, could allow an unauthenticated attacker demonstrates the immense risk posed by
to execute malicious code or take over any software supply chains, especially in cases
system that uses the vulnerable version of an where an underfunded project, run by several
open-source library. Unsurprisingly, it scored a part-time volunteers, is a key component that
perfect 10 out of 10 in the CVSS rating system. thousands of multi-million computer systems
rely on worldwide.
Group Manager,
actors take advantage of changing circumstances
Data Research and hurried digital transformation efforts. As of this
report, Cyberattacks are up by an average of 50% when
compared with last year's data, but the education and
research sectors appear to have suffered the greatest
blow, weathering an average of 1,605 attacks
on a weekly basis.”
One of this year’s most significant attacks, the FBI to investigate. In Australia, some
which perfectly demonstrates the above, is a abattoirs were completely shut down, forcing
ransomware incident that took place in May. The the company to furlough 7,000 employees.
operation targeted the Colonial Pipeline fuel Eventually, with the fear of price inflation
company which delivers fuel to the Southeast combined with massive unemployment, the CEO
coast of the United States. The incident forced of JBS USA, a subsidiary of JBS S.A., announced
the company to shut down their operations, that the company paid the cybercriminals a
increasing gasoline prices and causing a major ransom equivalent to US$ 11 million in BTC.
supply shortage on the East Coast. This chain
The education sector was also heavily impacted.
of events eventually triggered a rush of panic
In 2021, it was the most targeted sector
buying as many gas stations completely ran
globally, with a 75% increase compared to 2020
out of fuel. Government officials pleaded with
and an average of almost 1,605 attack weekly
the public not to rush to gas stations, as people
attempts per organization. The disruption
were actually attempting to fill plastic bags with
suffered by educational institutions impacted
gasoline to avoid running out. A single day after
students, professors and other staff members.
the attack took place, Colonial Pipeline had no
Howard University in Washington D.C fell victim
choice but to pay the US$ 5 million ransom to
to a ransomware attack in September and
the DarkSide ransomware gang who led the
was forced to suspend classes to conduct a
attack in order to unlock their systems.
thorough investigation of their network together
In the same month, JBS S.A, the world’s largest with an audit of the student and staff devices.
meat processing company, fell victim to an Similarly, The Lewis and Clark Community
attack by the REvil ransomware group. The College in Illinois was hit by a ransomware
Brazilian company distributes meat products attack in November that affected their online
made in 150 industrial plants in 15 countries, learning platform as well as other critical
and has approximately 150,000 employees systems. They had to close all their campuses,
worldwide. The attack that hit the company and cancel extra-curricular activities including
network impacted slaughterhouses and meat sporting events taking place in their facilities.
supplies in the US, Canada and Australia and The FBI released an alert against the PYSA
caused more than 3000 workers’ shifts to be ransomware that targets higher education
canceled. All of its US beef plants and meat institutions in the US and the UK.
packing facilities, responsible for almost a
quarter of American meat supplies, ceased
production while The White House assigned
Finally, in mid-2021, the Grief ransomware Israel, with a custom ransomware. The attack
attacked several school districts in the US, incapacitated computers and some of the
among them a school district in Mississippi. hospital infrastructure, making discharging
The ransomware stole 10GB of data including and processing patients impossible due to the
personal and professional information, and inability to retrieve patient files and register
has threatened to publish the data unless it is new ones. In December, the Behavioral Health
paid. Institutions of higher learning such as Group (BHG), which maintains over 80 Opioid
universities and colleges make good targets for treatment clinics throughout the US, suffered
cyber-criminals because their systems, which a cyber-attack that disrupted its network for a
allow students and faculty to connect their week. In some centers, patients were prevented
personal devices to the institution’s network, from getting their prescribed take-home
aren’t fully protected. dosage of medicine to treat narcotic addiction
as the computers were not available to print
The healthcare sector has also been heavily
prescription labels, potentially harming their
targeted by cybercriminals since the start of
sensitive anti-addiction treatment.
the pandemic, as hospitals, research facilities
involved in the development of vaccines, Ideologically driven hackers also managed to
and pharmaceutical companies all prove cause public disruption, particularly in Iran.
tempting targets due to the time-sensitive First, the Iranian railways infrastructure faced
nature of their work. In October, a devastating a cyberattack back in July in which hackers
ransomware attack took place against the displayed messages about train delays or
healthcare system of Newfoundland and cancellations on information boards at stations
Labrador, Canada. As a result, employee and across the country, urging passengers to
patient data was stolen and key systems were call a number (which belonged to the Iranian
taken down for more than a week, leading Supreme Leader Ayatollah Khamenei’s office)
to a delay in thousands of appointments, for more information. The attack severely
including chemotherapy, as almost all non- disrupted train operations the same day
emergency services and procedures were and spread fear and confusion among the
canceled within the province. That same month, public. Check Point Research investigated
we witnessed one of the first ransomware and attributed the attack to the Indra group
attacks against a hospital in the Middle East, which opposes the regime and has been active
as the Chinese group DeepBlueMagic targeted since at least 2019, known for its use of wiper
the Hillel Yaffe Medical Center in Hadera, malware.
In October, a massive cyber-attack disrupted All of the attacks described above had a
4,300 Iranian gas stations, targeting the substantial impact on a particular target sector
electronic cards system which allows people and region. They also gained a lot of media
to buy gas with government subsidies. On the attention, which naturally plays right into the
screen, consumers who tried to fill their tank hands of cybercriminals in their attempts to
found the notice “cyberattack 64411”, Iran’s plant fear and gain leverage over their victims.
Supreme Leader’s phone number (the same one Unfortunately, as 2021 has demonstrated,
exposed in the train attack). The incident caused cyberattacks often have a much wider effect on
a great deal of disorder with long lines of people the general population than the attackers may
at gas stations fearing shortages and sudden have originally intended.
price increases.
Naturally, organizations are becoming The trend is led by the infamous OMIGOD flaw
increasingly dependent on cloud vendors to attacks. In September, researchers found four
securely manage their databases, proprietary critical vulnerabilities in OMI (Open Management
code, and organizational resources. These Infrastructure), one of Microsoft Azure’s
organizations are now gradually filling in the software agents that allows users to manage
platform and role management knowledge configurations across remote and local
gaps formed during the rapid shift to cloud- environments. OMI is deployed on Azure Linux
based environments during 2020, leading VMs embedded into multiple Azure services and
to better security and more comprehensive is deployed automatically when some services
administration. IAM (Identity and Access are enabled – which makes these flaws highly
Management) Role Assumption attacks, likely to be exploited. An estimated 65% of all
aimed at elevating privileges after obtaining Azure customers are vulnerable, which
unauthorized access, however, continue to be a translates to thousands of organizations and
significant concern. millions of end-point devices. OMIGOD flaws are
easy to exploit, as only a single request with the
As usual, threat actors continue to race
authentication header removed, is needed.
against the security research community,
Together, the vulnerabilities could enable actors
looking for new vulnerabilities and exploits.
to execute remote arbitrary code within a
Since late 2021, we have witnessed a wave
vulnerable network and escalate to root privileges.
of attacks leveraging flaws in the services
of industry-leading cloud service providers Microsoft already issued a patch to address the
to gain control over an organization’s cloud flaws as part of their September 2021 release.
infrastructure, or, potentially, the organization’s However, some researchers warned that the
entire database which stores proprietary, company’s automatic fix was ineffective for
customer and financial information. The flaws several days, until it was repaired. Attacks
under discussion are not trust logic flaws – leveraging these flaws, in particular the
permission-based flaws that derive from the 9.8-rated RCE flaw, assigned CVE-2021-38647,
organization’s role policy that are used by have already been observed as of the time of
threat actors to gradually escalate privileges exposure and have increased rapidly ever since.
within the environment. Instead, we’re dealing Servers scanning for vulnerable devices spiked
with critical vulnerabilities in the cloud from around 10 to more than 100 during the
infrastructure itself, which can allow full takeover first weekend alone. The notorious Mirai IoT
of accounts or arbitrary code execution. (Internet-of-Things) botnet was one of the first
to target vulnerable devices, and the malware other clients’ Kubernetes clusters. Exploitation
attempted to close port 5896 (the OMI SSL port) of the flaw consists of three stages, beginning
to keep other actors from taking advantage with container escape, which is a privilege
of the attack. Attacks aiming to deploy crypto escalation technique for container environments.
miners onto unpatched Linux devices were also Azurescape enables an attacker to gain
observed. administrative privileges over an entire cluster
of containers. Thankfully, a patch was swiftly
Another alarming flaw in Microsoft Azure
released when the flaw was first exposed, but
was exposed a month earlier, in August. This
further action by ACI users is also required. As
time, the vulnerability, dubbed ‘ChaosDB’,
of late 2021, no exploits were detected. The flaw,
was found in Azure Cosmos DB, a multi-
however, has raised awareness to the dangers
model NoSQL database used by some of the
posed by multi-tenant cloud environments,
top global businesses out there, such as
common large-scale infrastructures that host
Coca Cola, Skype, and Symantec, to manage
multiple organizations on a single platform.
large-scale databases including financial
transaction information. The flaw enables an Microsoft Azure is not the only service in
actor to retrieve several internal keys used to which security flaws were discovered in the
obtain root privileges that eventually enable past year. In June, researchers uncovered a
it to manage the organization’s databases and vulnerability in Google’s Compute Engine (GCE),
accounts. Simply put, by exploiting this flaw, an infrastructure-as-a-service (IaaS) component
attackers can gain complete and unrestricted of Google Cloud Platform which is used to create
control of the entire cloud resources of all and launch virtual machines on demand. The
Azure Cosmos DB clients. flaw enables an attacker to take over virtual
machines due to a combination of factors,
Yet another breach in Microsoft Azure was
including the use of weak random numbers by
discovered towards the end of the year. The
the ISC DHCP software. Exploitation of the flaw,
flaw, called ‘Azurescape’, affects Azure’s
achieved by impersonating the Metadata server
Container-as-a-Service (CaaS) platform and
from the targeted VM’s point of view, could allow
relies on a two-year-old vulnerability assigned
actors to eventually login as the root user of the
CVE-2019-5736 in RunC, a container runtime.
VM. Google issued a patch for the flaw almost a
Uniquely, Azurescape is a cross-account
year after it was first disclosed.
vulnerability: it allows an attacker to break out
of the breached environment and execute code
on environments belonging to other users in the
same public cloud service. This means that a
malicious user of the Azure Container Instances
(ACI) could potentially run arbitrary code on
FPO
CHECK POINT SOFT WARE | SECURITY REPORT 2022 24
CHAPTER 3
We must first address the developments business executives worldwide. A list containing
around NSO’s Pegasus, one of the most around 50,000 potential Pegasus victims was
notorious mobile malware families. Pegasus leaked and made headlines, possibly shedding
is a mobile spyware capable of infecting both light on NSO’s customers. The media attention
iOS and Android devices, and was developed led to extensive research in an effort to uncover
and marketed by the Israel-based NSO Group. Pegasus’ infection methods and help users
The spyware can gain full control of a mobile detect Pegasus on their devices. Eventually,
device and harvest a multitude of data types in September, Apple issued patches for two
such as messages, photos, calendars, emails zero-day vulnerabilities in iMessage leveraged
and more. Additionally, the malware is capable by Pegasus, assigned CVE-2021-30860 and
of activating the camera, collecting images, as CVE-2021-30858. These flaws exploit iPhones
well as recording surrounding conversations. and Macs by allowing malicious documents
Pegasus’ infection is based on an elaborated to execute commands. In November, Apple
zero-click exploit. Though the malware was filed a suit against NSO for using their hacking
first discovered in 2016, in 2019 it was revealed software on Apple devices and stealing
that the spyware leveraged the WhatsApp private data. Naturally, the threat actors
service to infect over 1,400 users, the targets of quickly tailored an extortion scam based on
multiple NSO customers. the scandal. A recent campaign leverages the
public fear of Pegasus iOS spyware, seeking to
In July 2021, a vast collection of news outlets
intimidate potential victims by spreading emails
reported that the tool had been used to gain
containing ransom demands and claiming to
access to mobile devices of government
have private videos of the victims, allegedly
officials, journalists, human rights activists and
taken by the Pegasus malware.
Pegasus stands out due to its seamless, zero- devices that installs the “Triada” Trojan. In
click infection process, controversial victim list October, researchers found a photo editing
and sophisticated data exfiltration features. It is application offered on the Google Play Store
therefore not surprising that it is no longer the which contained a malicious code that collected
only one of its kind. Toward the end of the year, users’ Facebook credentials and used them to
researchers exposed an additional threat actor run ad campaigns with the victim’s payment
in the private sector mobile spyware arena. information. The app was downloaded by
Cytrox, a company based in North Macedonia, thousands of users. Finally, in November, a new
markets a spyware called Predator for iPhone Android malware called ‘MasterFred’ rose to
devices, which infects the customer’s targets prominence due to its use of fake login overlays
via single-click links sent over WhatsApp. As to steal credit card information from Netflix,
more and more information about the malware Instagram and Twitter users.
capabilities is exposed, the greater the chance
Another significant attack vector that was
that these will be adopted by common threat
prominent in 2021 relies on SMS messages
actors and groups. In addition, the wide
for malware distribution. SMiShing, short for
distribution of mobile spyware and the attention
SMS phishing, is a phishing technique that
this field has attracted in 2021 are yet further
relies on mobile devices for social engineering
indications of the crucial role mobile devices
distribution, and uses SMS messages as the
play in the cyber threat landscape.
attack vector. The FluBot Android botnet, which
Throughout the year, we observed threat actors relies on this technique, resumed its activities
investing substantial efforts in hacking top in April 2021 despite designated arrests by the
social media accounts such as Facebook and Spanish police. In September, the botnet added
Telegram. These efforts included the execution to its arsenal a new method to compromise
of large-scale attack campaigns aimed at Android devices, and began spreading a fake
obtaining access to mobile devices. In August, security update message, warning of a FluBot
a new Android Trojan called ‘FlyTrap’ was infection. The infection is triggered once the
found to have compromised at least 10,000 victim clicks on the ‘install security update’
Facebook accounts across 144 counties since button. FluBot appeared again in November
March 2021, predominantly through malicious in a campaign targeting Finnish users. After
applications available on the Google Play Store. the attack vector demonstrated its efficiency
The applications were uploaded and quickly in FluBot’s campaigns, SMiShing has been
removed from the platform but were later gradually adopted by low-skilled actors. For
available on third-party app stores. Attackers example, a recent investigation conducted by
also leveraged WhatsApp to distribute a Check Point Research indicated that SMiShing
modified version of the app for Android attacks are very effective in Iran, despite the
general low quality of the actors’ toolsets. Finally, systematic changes caused by the
These campaigns utilize SMiShing while also global pandemic are also affecting the mobile
impersonating key entities such as the Iranian banking malware arena. The expanding
government, the judiciary system, shopping digitization of the banking sector in 2021 led to
portals and more. Many warnings about this the surfacing of various applications designed
now thriving attack method appeared in news to limit offline interactions, which in turn
outlets. The scale of the recent attack wave is have led to the distribution of new threats. In
unprecedented, which comes as no surprise if September, Check Point Research uncovered a
you inspect the flourishing botnet-as-a-service new attack method against Android users that
market taking place in underground forums and abuses the device’s accessibility services. The
Telegram channels. Phishing kits are available attack targeted users of PIX, a year-old, yet
for prices ranging from USD$ 50-US$ 100. We extremely popular, instant payment solution
estimate that similar campaigns, also inspired created and managed by the Brazilian Central
by FluBot’s successful use of SMiShing, might Bank. The campaign featured two variants of
soon appear in other countries as well. banking malware distributed by two malicious
applications on the Google Play Store. The more
Another extensive scam that took place in 2021
unique one, called PixStealer, abused Android’s
revolving around SMS messages is ‘UltimaSMS’,
Accessibility Services (A AS) to steal money
a massive campaign that utilizes around 150
from a specific bank through PIX transactions.
Android applications. With more than 10 million
This minimalistic yet innovative combination of
downloads from the Google Play Store, its trick
functions allows the malware to collect funds
is to lure victims into subscribing to premium
without interacting with a C&C, helping it to
SMS services without their knowledge.
remain undetected. Due to its simplicity and
efficiency, we can expect other threat actors to
follow this lead.
The ransomware operators are the backbone This was a turbulent year for several
of the whole operation, offering not just the ransomware groups, not the least because
ransomware itself, but also money laundering governments and law enforcement agencies
services and negotiation specialists. The changed their stance against organized threat
different ransomware programs compete for actors. They turned from preemptive and
affiliates, so ransomware groups are constantly reactive measures to proactive offensive
developing more attractive tools and services operations targeting the ransomware
for their affiliate programs in order to help operators themselves, as well as their funds
them stand out in a competitive underground and supporting infrastructure. The major
community. Reputation is a key motivating shift happened following the Colonial Pipeline
factor, as that can influence a group’s incident in May, where a DarkSide ransomware
chances of earning big returns or even lead to attack resulted in a major fuel shortage
apprehension by the authorities. It’s therefore throughout the East Coast in the US, thus
not surprising that cybercriminals mediate their causing the Biden administration to realize they
internal disputes on tribunal forums, where had to step up efforts to combat the threat.
losing a case can cost a group their reputation
and profits.
Later that month, the DarkSide issued its “Ransomware Action Plan”, which
gang announced they were shutting down includes the formation of a new special task force
operations after their servers were seized and harsher punishments for ransomware actors.
and their cryptocurrency funds, which were
In November, an international joint operation
used to pay affiliates of the Ransomware-
led by Interpol named “Operation Cyclone”,
as-a-Service program, were stolen. In
led to infrastructure seizure and arrests of
June, the US Department of Justice (DOJ)
money laundering affiliates for Cl0p, the group
upgraded ransomware to a national security
responsible for the Accellion breach, which
threat, placing it at the same priority level as
was the source of numerous double and triple
terrorism. The next major incident surrounded
extortions. In addition, the US DOJ and other
the Kaseya MSP platform breach in July,
federal agencies pursued further actions
after which REvil perpetrators mysteriously
against REvil. These actions included members’
disappeared, taking their leaks website “Happy
arrests, the seizure of US$ 6 million worth of
Blog” offline and apparently shutting down their
ransom money, confiscation of devices and a
customer support. However, this shutdown
bounty program worth US$ 10 million.
was short-lived and the group resurfaced in
September. Then, they disappeared again in
The reaction to these developments varied
October after a suspected law enforcement
widely within the ransomware ecosystem. Some
operation successfully hijacked their
groups showed hostility and applied even more
infrastructure and “Happy Blog”.
pressure on their victims to keep authorities
away from their business. For example,
In September, the Biden administration took
Grief Ransomware threatened to completely
their war against ransomware a step further
delete their victims’ decryption keys should
and announced they would begin sanctioning
they hire professional negotiators. Similarly,
crypto exchanges, wallets and traders that
RagnarLocker posted online all of the content
ransomware threat actors use to convert
stolen from victims that contacted the FBI or
ransom payments into tangible funds. The
other law enforcement agencies.
Russian-based SUEX exchange was the first to
be added to the sanctions list for their part in
Other groups appear to have concentrated on
ransom transactions. The next month, the
adapting and rebranding themselves to avoid
European Union and an additional 31 countries
being too closely associated with a prominent
announced they would join the effort to disrupt
attack. Darkside, for example, temporarily
additional cryptocurrency channels, in an
exited the ransomware arena and at least
attempt to cripple the money laundering
some of its members rebranded themselves
process. In addition, the Australian Government
as BlackMatter in July. They carried out
attacks against the marketing service provider Finally, this past year, we also saw signs of
Marketron, the Japanese tech company the ransomware community cracking under
Olympus, and critical infrastructure such as pressure or even closing shop altogether,
the New Cooperative farmers organization in with some operators completely abandoning
Iowa. However this rebranded operation was their businesses. For instance, the Avaddon
short lived, when in November, BlackMatter cybercrime gang first appeared in June
announced they were shutting down due to 2020, but only a year later was compelled
pressure from the authorities. They even said to shut down and release decryption keys,
that their team members were “no longer undoubtedly due to the increased scrutiny by
available after the latest news”, yet experts law enforcement. In another instance, Conti
believe that this exit was a result of trust issues ransomware targeted British Graff Jewelry,
with their affiliates due to flawed encryption, but later issued an apology after realizing
allowing a security company to decrypt victims’ that some of the stolen data belonged to the
files. In a final testament to underground Saudi, UAE & Qatar Royal Families. Fearing
cooperation, BlackMatter has partnered with retaliation, they promised to delete the data
LockBit ransomware and transferred their without review. Major cybercrime forums
victims to the LockBit platform to facilitate a banned any ransomware advertising from their
seamless extortion, just before vanishing. platform to avoid drawing attention. This made
it more difficult for operators to effectively
Unfortunately, not all ransomware groups
communicate with affiliates, adding to the risk
exhibited this harmonious cooperation. The
of being caught.
fear of being apprehended by the authorities
was compounded by marked distrust promoted Proactive measures and offensive operations
by constant competition. For example, REvil by governments worldwide have managed
operators were caught cheating their affiliates to put a noticeable dent in the ransomware
by hijacking the ransom negotiation process, ecosystem, disrupting ransomware operations
using double chats and backdoors to cut them and causing havoc in the underground scene.
out of their shares. The Conti group experienced Despite this, millions of dollars in potential
an internal crisis after one disgruntled affiliate revenue mean that we will likely see more
leaked Conti’s playbook, complaining of low ransomware “projects” coming up in 2022,
compensations. with successful ones serving as a model for
upcoming and improved attacks. One takeaway
the ransomware operators may have from
the events of 2021 is that the type of targets
ransomware operators choose might be the
difference between a long term operation or a
very short one.
04
MALWARE SPOTLIGHT:
EMOTET’S RETURN
ALEX ANDRA GOFMAN realization that even an international task force, could
Team Leader,
only slow Emotet down, and not eradicate it altogether.
Check Point Research
At least some of its group members were able to elude
justice and have taken their time to reorganize, regroup,
and to use their old underground connections to launch
a new and improved global malspam campaign.
Emotet, one of the most dangerous and infamous botnets in history, is back, despite the
long and synchronized efforts of the international community and law enforcement agencies
worldwide that resulted in its take down in January 2021. Emotet, the banking Trojan turned
modular botnet, is known for its massive reach of over 1.5 million infected computers
worldwide, across thousands of compromised corporate networks. Emotet was used as a
distribution platform to deliver other notorious malware families such as TrickBot, Qbot
and Dridex, often resulting in network-wide ransomware attacks that crippled entire
organizations. Inflicted damages were estimated at around US$ 2.5 billion, before it was
forcibly shut down.
On November 14th, Emotet officially rose from the dead, as live samples were observed
for the first time since its takedown. Emotet’s resurrection came from a surprising
source: TrickBot’s botnet was used to drop Emotet’s samples on machines infected with
the TrickBot malware. The very next day, Emotet returned to its signature method of
distribution, with massive spam campaigns delivering the Trojan via malicious document
attachments. To rebuild their network, Emotet operators chose to drop their spam bot on
successfully infected machines, a method that enabled them to distribute the malware to
even more potential targets.
TrickBot’s service as a dropper was a natural choice for Emotet’s revival, thanks to their
rich history of collaboration. In fact, this might suggest that at least some of its old
malware partners are also involved in its resurrection. TrickBot itself was briefly taken
down in 2020, and yet it persisted and was featured in the Top Malware families rankings
of May, June and September 2021. During the last year, Check Point Research spotted
over 140,000 TrickBot victims worldwide, involving over 200 campaigns and thousands of
compromised networks. This huge installation base makes TrickBot the perfect platform to
re-launch Emotet’s new botnet.
Emotet itself came back even stronger with some new additions to its toolbox. The
upgraded variant uses Elliptic curve cryptography as opposed to RSA cryptography,
improved its control-flow flattening techniques, and added to its initial delivery methods
the use of malicious Windows App installer packages that impersonate legitimate software.
In addition, researchers found that Emotet is now dropping Cobalt Strike beacons directly
for the first time, instead of intermediate malware families which in turn would drop
Cobalt Strike beacons after some time. Cobalt Strike has been the cornerstone of targeted
ransomware attacks in previous years, and this unfortunate development means that the
duration from initial Emotet infection to a full blown ransomware attack just got even
shorter, leaving the defenders with far less time to respond to an ongoing attack.
Since its return, Check Point Research observed that the volume of Emotet’s activity was at
least 50% of the level we saw in January 2021, right before the takedown. This rising trend
continued throughout December with several end-of-the-year campaigns, and is expected
to continue well into 2022, at least until the next takedown attempt.
05
GLOBAL STATISTICS
GLOBAL
BOTNET
31%
INFOSTEALER
21%
CRYPTOMINERS
19%
BANKING
19%
MOBILE
14%
RANSOMWARE
8%
AMERICAS
BOTNET
25%
INFOSTEALER
18%
CRYPTOMINERS
15%
BANKING
15%
MOBILE
14%
RANSOMWARE
6%
Figure 2: Percentage of corporate networks attacked by each malware type in the Americas.
EMEA
BOTNET
30%
INFOSTEALER
23%
CRYPTOMINERS
19%
BANKING
19%
MOBILE
14%
RANSOMWARE
8%
APAC
BOTNET
43%
INFOSTEALER
30%
CRYPTOMINERS
25%
BANKING
25%
MOBILE
13%
RANSOMWARE
10%
The map displays the cyber threat risk index globally, demonstrating the
main risk areas around the world.*
Figure 6: Average weekly attacks per organization by Industry 2021, compared to 2020.
During 2021, global cyber attacks against corporate networks has increased by
50%, in comparison to 2020. The “Education/Research” category leads as the most
targeted sector, with an average of 1,605 attacks per organization every week
(75% increase), while the “Software Vendor” category shows the largest year-
on-year growth, with an increase of 146%. The rise in attacks against software
vendors goes hand-in-hand with the ever-growing trend of software supply chain
attacks observed during 2021.
52%
20%
10%
5%
3% 3% 2% 2% 1% 1% 1%
e
sx
cx
r
pd
ba
ja
he
do
xl
ex
ps
ap
do
xl
ot
Figure 7: Web – Top malicious file types.
34%
16%
9%
7% 7%
6% 6% 6%
5%
2%
3%
f
sm
cx
sb
r
e
xs
pd
rt
pp
he
do
xl
ex
do
xl
xl
xl
ot
36%
64%
83% 84%
EMAIL WEB
Figure 9: Distribution protocols – email vs web attack vectors during 2019, 2020 & 2021.
The charts above indicate that the email attack One of the reasons for this rise in email-based
vector has steadily established itself as a attacks is the massive number of high-profile
favorite, compared to slowly diminishing use of campaigns sponsored and run by large crime
websites to distribute malware payloads since groups, who distribute the most prominent
the beginning of 2020. malware families today, such as TrickBot,
Dridex, Qbot, IcedID, or Emotet.
Whether used in a targeted attack, or as part
of an opportunistic campaign by a novice Once these gangs realized the effectiveness
attacker, email-based attacks allow for the of spam campaigns with malicious Office
easy distribution of malware to a wide array of document attachments, they used it almost
targets and corporations. exclusively as their main infection vector into
new networks.
For each of the regions below, we present the most prevalent malware.
GLOBAL
11.0%
ot
ok
et
la
ex
ba
g
de
co
Ri
es
ot
kb
Qb
pi
bo
te
XM
m
ri
Em
tT
or
up
ic
rm
Re
en
Tr
Ph
Gl
Fo
Ag
AMERICAS
9.7%
ok
ex
et
ot
ba
n
de
co
Ri
oo
ot
kb
Qb
pi
bo
te
XM
m
ri
cc
Em
or
up
ic
rm
D
Re
Ra
Tr
Ph
Gl
Fo
10.8%
7.8%
5.9%
5.4%
5.0% 4.7%
4.2%
3.6% 3.6% 3.3%
ot
ot
et
ok
la
ex
ba
de
co
Ri
es
ot
kb
Qb
pi
bo
te
XM
m
ri
Em
tT
or
up
ic
rm
D
Re
en
Tr
Ph
Gl
Fo
Ag
14.5%
ok
ba
la
ex
et
f
ni
ni
de
Ri
es
ot
kb
pi
bo
te
rs
m
XM
ri
Em
tT
or
up
ic
Ra
U
rm
D
en
Tr
Ph
Gl
Fo
Ag
TrickBot rose to the top of the chart in February, replacing Emotet, and kept this
ranking for the rest of 2021. TrickBot is a modular Botnet and Banking Trojan
that targets the Windows operating system. It is credited with Emotet’s revival
in November 2021 as it was found distributing its fellow malware. TrickBot is
constantly being updated with enhanced capabilities, features and distribution
vectors, making it a flexible and customizable malware that can be distributed
as part of multi-purpose campaigns. It served as a popular means for initial
access in targeted attacks followed by malware such as Ryuk, Conti or Bazar.
Despite TrickBot’s brief takedown in October 2020, it remained prominent in our
top malware charts throughout 2021, and was involved in one of the most serious
ransomware attacks of the year, a Conti ransomware attack on Ireland’s Health
Service Executive.
Phorpiex is a botnet which at its peak controlled more than a million infected
hosts. It is known for distributing other malware families via spam campaigns as
well as fueling large-scale spam, sextortion campaigns or ransomware spread.
Phorpiex, which hit its low mid-year, ended up with a higher ranking by the end of
2021 than it had a year ago. In December, Check Point Research spotted Phorpiex’s
resurgence with a brand-new variant called “Twizt”, which enabled it to operate
in peer-to-peer mode without active C&C servers. In one year, Phorpiex bots
successfully hijacked 969 transactions and stole 3.64 Bitcoin, 55.87 Ether, and US$
55,000 in ERC20 tokens accounting for almost half a million US dollars.
TOP BOTNETS
GLOBAL AMERICAS
Figure 14: Most prevalent botnets globally Figure 15: Most prevalent botnets in the Americas
9% 9%
8% 9% 8% 23% 23%
9% 27% 27% 27% 27%
TrickBot8% TrickBot 23% 23%
9%8%
TrickBot 27% TrickBot
9% 27% 27% 27%
Qbot Qbot Glupteba Glupteba
TrickBot TrickBot TrickBot 6%
TrickBot 6%
Emotet 9%
Emotet 9% Phorpiex Phorpiex
Qbot Qbot Glupteba Glupteba
Dridex 13%
Dridex 13% Emotet 6%
Emotet 9% 6%
9% 13% 13%
Emotet Emotet Phorpiex Phorpiex
Phorpiex Phorpiex 19% 19% Dridex Dridex
Dridex 13%
Dridex 13% Emotet Emotet9%
11% 13%
11% 9% 11%
Glupteba Glupteba 15% 15%
19%
MyloBot MyloBot 11% 13%
Phorpiex
Other
Phorpiex
Other
19% Dridex
Other
Dridex
Other
Glupteba Glupteba 15% 15% MyloBot MyloBot 11% 11%
11% 11%
Other Other Other Other
Figure 16: Most prevalent botnets in EMEA Figure 17: Most prevalent botnets in APAC
Emotet, one of the most infamous malware groups, has been operating in intervals
since 2014, first as a banking trojan and then later as a botnet. It now appears in
the number three spot on the top botnet chart. Emotet was wide-spread before its
takedown in January 2021, affecting more than 1.5 million machines globally with
damages estimated at around US$ 2.5 billion. It is notorious for spreading other
malware families including TrickBot, Qbot and more.
The Botnet marketplace this year was drastically affected by Emotet’s downfall.
Emotet is one of the largest PC botnet operations and its absence left a vacuum
filled by TrickBot, IcedID, and more recently Phorpiex. On November 15, just
10 months after its takedown, machines infected with TrickBot started to drop
Emotet samples. Computers were increasingly compromised by a large malspam
campaign which leveraged malicious documents containing the Emotet payload.
We note that both our H1 2021 and global 2021 charts showed Emotet in the top
three places, despite nine months of no activity — a tribute to its unequaled power.
GLOBAL AMERICAS
Figure 18: Top infostealer malware globally Figure 19: Top infostealer malware in the Americas
Figure 20: Top infostealer malware in EMEA Figure 21: Top infostealer malware in APAC
Another malware-as-a-service that entered our top malware statistics for the
first time is Raccoon. This infostealer, sold on the Dark Web for at least two years,
offers a well-maintained platform for its affiliates that features rapid bug fixes
and automated updates to its payload, as well as malware installed on victim
machines.
Raccoon’s recent updates include the ability to steal cryptocurrency, drop further
malware, and spread via Google SEO instead of phishing emails. The current
campaign attempts to lure its victims by offering cracked software licenses.
GLOBAL AMERICAS
27% 27%
33% 33%
27% 27%
XMRig 33%
XMRig 33% 43% 43% XMRig XMRig 50% 50%
LemonDuck LemonDuck 2%
RubyMiner RubyMiner 2%
XMRig XMRig 43% 43% XMRig XMRig2% 2% 50% 50%
RubyMiner RubyMiner LemonDuck LemonDuck
4%
LemonDuck LemonDuck 4% 2%7%
RubyMiner RubyMiner 7%
2%
WannaMine WannaMine DarkGate DarkGate
2% 2%
6%
RubyMiner RubyMiner 6% LemonDuck LemonDuck
4%
NRSMiner NRSMiner 6%4% 8% 6% 8% Kinsing Kinsing7% 12%7% 12%
WannaMine WannaMine DarkGate DarkGate
Other Other 6% 6% Other Other
NRSMiner NRSMiner 6% 8% 6% 8% Kinsing Kinsing 12% 12%
Other Other Other Other
Figure 22: Top cryptomining malware globally Figure 23: Top cryptomining malware in the Americas
15% 15%
6% 15% 6% 15%
42% 42% 41% 41% 6% 6% 43% 43%
XMRig XMRig XMRig 8%
XMRig 8%
LemonDuck LemonDuck
42% 42% 41% 41% LemonDuck LemonDuck
43%
XMRig XMRig XMRig 8%
XMRig 8% 43%
RubyMiner RubyMiner WannaMine WannaMine
LemonDuck LemonDuck 13%
LemonDuck LemonDuck 13%
DarkGate DarkGate NRSMiner NRSMiner
RubyMiner RubyMiner WannaMine WannaMine
Kinsing Kinsing 5%
3%4% 5%3% 5% 13%
RubyMiner RubyMiner 13%
15% 15%
DarkGate DarkGate 4% 5% NRSMiner NRSMiner
Other Other Other Other
Kinsing Kinsing 5%
3%4% 5%3% 5% RubyMiner RubyMiner
15% 15%
4% 5%
Other Other Other Other
Figure 24: Top cryptomining malware in EMEA Figure 25: Top cryptomining malware in APAC
LemonDuck, which showed an over 50% growth in attack rate compared to the
mid-year statistics, is a self-propagating cryptomining botnet that features
credential theft, detection evasion and lateral movement capabilities. LemonDuck
also functions as a malware downloader, and is often observed dropping the
Ramnit Trojan.
GLOBAL AMERICAS
Figure 28: Most prevalent banking Trojans in EMEA Figure 29: Most prevalent banking Trojans in APAC
Dridex, yet another banking malware that now features infostealer and botnet
capabilities, showed a significant decrease this year. However, in September
researchers detected a new Dridex variant, with extended information collection
capabilities, spreading in a phishing campaign that features specially crafted Excel
documents. In addition, in December, Dridex was among the first malware to be
distributed in a campaign that exploits the Log4j vulnerability for infection.
GLOBAL AMERICAS
20% 20%
29% 29%
34% 34% 20% 20%
29% 2% 2% 44%
29% 44%
34% 34%
Hiddad Hiddad 2%
Hiddad 2% 44%
Hiddad 16% 16% 44%
xHelper xHelper xHelper xHelper
Hiddad Hiddad
AlienBot Hiddad
AlienBot7% 7% 17% 17% AlienBot 16%
Hiddad
AlienBot 16%
xHelper xHelper xHelper xHelper
FluBot FluBot 13% 13% FluBot FluBot 18% 18%
AlienBot 7%
AlienBot 7% 17% 17% AlienBot
Other AlienBot
Other Other Other
FluBot FluBot 13% 13%
FluBot FluBot 18% 18%
Other Other Other Other
Figure 30: Top mobile malware globally Figure 31: Top mobile malware in the Americas
26% 26%
30% 30%
39% 39% 26% 26% 40% 40% 30% 30%
Hiddad 39%
Hiddad 39% xHelper 40%
xHelper 40%
xHelper xHelper 14% 14% Hiddad Hiddad
Hiddad Hiddad xHelper xHelper
AlienBot AlienBot AlienBot AlienBot 16% 16%
xHelper xHelper 10% 14% 14% Hiddad Hiddad 3% 3%
FluBot FluBot 10% 11%
11% FluBot FluBot
11% 11%
AlienBot
Other AlienBot AlienBot
Other AlienBot
Other
16% 16%
Other
FluBot 10% 11% FluBot 3% 3%
FluBot 10% 11% FluBot 11% 11%
Other Other Other Other
Figure 32: Top mobile malware in EMEA Figure 33: Top mobile malware in APAC
06
HIGH PROFILE
GLOBAL
VULNERABILITIES
The following list of top vulnerabilities is based on data collected by the Check
Point Intrusion Prevention System (IPS) sensor net and details some of the most
popular and interesting attack techniques and exploits observed by Check Point
researchers in 2021.
2021 2%
2020 11%
2019 5%
2018 12%
2017 17%
2016 7%
2015 8%
2014 10%
2013 6%
2012 8%
2011 3%
Earlier 11%
0 5 10 15
Figure 34: Percentage of attacks leveraging vulnerabilities by Disclosure Year in 2021.
20
90%
2021
80%
2020
70%
2019
2018
60% 2017
2016
50%
2015
40% 2014
2013
30%
2012
20% 2011
Older
10%
0%
21 21 21 21 21 21 21 21 21 21 21 21
N B AR R AY N L G P
OC
T V C
JA FE M AP M JU JU AU SE NO DE
Figure 35: Percentage of attacks leveraging vulnerabilities by Disclosure Year per Month.
hackers from the middle of the year, corresponding with a slight decrease in the use
of CVEs from 2017.
07
PREVENTING THE
NEXT CYBER PANDEMIC—
A STRATEGY FOR
ACHIEVING BETTER
SECURITY
BY JONY FISCHBEIN
CISO for Check Point Software
Email, web browsing, servers and storage are only the beginning. Mobile apps,
cloud and external storage are all essential, so is the compliance of connected
mobile and endpoint devices, and your growing IoT device estate. Workloads,
containers, and serverless applications on multi- and hybrid-cloud environments
should also be a part of the checklist at all times. With the rapid shift to cloud
and hybrid working, it’s become even more important to have a robust breach
prevention strategy.
∙ Review: Security products’ policies must numerous more. Each of these technologies
be carefully reviewed, and incident logs and can be highly effective in specific scenarios,
alerts should be continuously monitored. covering specific file types or attack vectors.
Strong solutions integrate a wide range of
∙ Audit: Routine audits and penetration testing
technologies and innovations in order to
should be conducted across all systems.
effectively combat modern attacks in IT
environments. In addition to traditional,
∙ Principle of Least Privilege: User and
signature-based protections like antivirus
software privileges should be kept to a
and IPS, organizations need to incorporate
minimum – is there really a need for all users
additional layers to prevent against new,
to have local admin rights on their devices?
unknown malware that has no known
∙ Implementing the most advanced security signature. Two key components to consider
technologies: There is no single silver- are threat extraction (file sanitization) and
bullet technology that can protect from all threat emulation (advanced sandboxing). Each
threats and all threat vectors. However, element provides distinct protection that,
there are many great technologies and ideas when used together, offer a comprehensive
available – machine learning, sandboxing, solution for protection against unknown
anomaly detection, content disarmament, and malware at the network level and directly on
endpoint devices.
But it’s not all doom and gloom. We also saw cracks in the ransomware ecosystem
widen in 2021, as governments and law enforcement agencies around the world
resolved to take a tougher stance on ransomware groups in particular. Instead of
relying on reactive and remedial action, some shocking events woke governments
up to the fact that they needed to take a more pre-emptive, proactive approach
to dealing with cyber risk. That same philosophy extends to businesses too, who
can no longer afford to take a disjointed, siloed, reactionary approach to dealing
with threats. They need 360-degree visibility, real-time threat intelligence, and a
security infrastructure that can be mobilized in an effective, joined-up manner.
AlienBot
AlienBot is a banking Trojan for Android, sold underground as Malware-as-a-Service
(MaaS). It supports keylogging, dynamic overlays for credentials theft, as well as
SMS harvesting for 2FA bypass. Additional remote control capabilities are provided
using a TeamViewer module.
Bazar
Discovered in 2020, Bazar Loader and Bazar Backdoor are used in the initial stages
of infection by the WizardSpider cybercrime gang. The loader is responsible for
fetching the next stages, and the backdoor is meant for persistence. The infections
are usually followed by a full-scale ransomware deployment, using Conti or Ryuk.
CryptoBot
CryptoBot is an advanced cryptominer that collects the victim’s wallet and account
information upon infection. In December 2021 CryptoBot was observed in a
campaign that targeted users with a pirated copy of the Windows operating system.
Cl0p
Cl0p is a ransomware that was first discovered in early 2019 and mostly targets
large firms and corporations. During 2020, Cl0p operators began exercising a
double-extortion strategy, where in addition to encrypting the victim's data, the
attackers also threaten to publish stolen information unless ransom demands are
met. In 2021 Cl0p ransomware was used in numerous attacks where the initial
access was gained by utilizing zero-day vulnerabilities in the Accellion File Transfer
Appliance.
DarkGate
DarkGate is a multifunction malware active since December 2017 which combines
ransomware, credential stealing, and RAT and cryptomining abilities. Targeting
mostly the Windows OS, DarkGate employs a variety of evasion techniques.
Dridex
Dridex is a Banking Trojan turned botnet, that targets the Windows platform. It is
delivered by spam campaigns and Exploit Kits, and relies on WebInjects to intercept
and redirect banking credentials to an attacker-controlled server. Dridex contacts a
remote server, sends information about the infected system, and can also download
and execute additional modules for remote control.
Emotet
Emotet is an advanced, self-propagating and modular Trojan. Emotet was once used
to employ as a banking Trojan, and now is used as a distributer for other malware
or malicious campaigns. It uses multiple methods for maintaining persistence and
evasion techniques to avoid detection. In addition, Emotet can also be spread through
phishing spam emails containing malicious attachments or links.
FluBot
FluBot is an Android malware distributed via phishing SMS messages (SMiShing),
most often impersonating logistics delivery brands. Once the user clicks the link
inside the message, they are redirected to the download of a fake application
containing FluBot. Once installed the malware has various capabilities to harvest
credentials and support the Smishing operation itself, including uploading of the
contacts list, as well as sending SMS messages to other phone numbers.
FormBook
FormBook is an Infostealer targeting the Windows OS and was first detected in 2016.
It is marketed as Malware-as-a-service (MaaS) in underground hacking forums
for its strong evasion techniques and relatively low price. FormBook harvests
credentials from various web browsers, collects screenshots, monitors and logs
keystrokes, and can download and execute files according to orders from its C&C.
Glupteba
Known since 2011, Glupteba is a Windows backdoor which gradually matured into a
botnet. By 2019 it included a C&C address update mechanism through public BitCoin
lists, an integral browser stealer capability and a router exploiter.
Hiddad
Android malware which repackages legitimate apps and then releases them to a
third-party store. Its main function is displaying ads, but it also can gain access to
key security details built into the OS.
IcedID
IcedID is a banking Trojan which first emerged in September 2017. It spreads by mail
spam campaigns and often uses other malwares like Emotet to help it proliferate.
IcedID uses evasive techniques like process injection and steganography, and steals
user financial data via both redirection attacks (installs a local proxy to redirect
users to fake-cloned sites) and web injection attacks.
Kinsing
Discovered in 2020, Kinsing is a Golang cryptominer with a rootkit component.
Originally designed to exploit Linux systems, Kinsing was installed on compromised
servers by abusing vulnerabilities on internet facing services. Later in 2021 a
Windows variant of the malware was developed as well, allowing the attackers to
increase their attack surface.
LokiBot
LokiBot is commodity infostealer for Windows. It harvests credentials from a variety
of applications, web browsers, email clients, IT administration tools such as PuTTY,
and more. LokiBot has been sold on hacking forums and believed to have had its
source code leaked, thus allowing for a range of variants to appear. It was first
identified in February 2016.
Mirai
Mirai is an infamous Internet-of-Things (IoT) malware that tracks vulnerable IoT
devices, such as web cameras, modems and routers, and turns them into bots. The
botnet is used by its operators to conduct massive distributed denial-of-service
(DDoS) attacks. The Mirai botnet first surfaced in September 2016 and quickly made
headlines due to some large-scale attacks including a massive DDoS attack used to
knock the entire country of Liberia offline, and a DDoS attack against the Internet
infrastructure firm Dyn, which provides a significant portion of the United States
internet's infrastructure.
MyloBot
Mylobot is a sophisticated botnet that first emerged in June 2018 and is equipped
with complex evasion techniques including anti-VM, anti-sandbox, and anti-
debugging techniques. The botnet allows an attacker to take complete control of the
user's system, downloading any additional payload from its C&C.
NanoCore
NanoCore is a Remote Access Trojan that targets Windows operating system users
and was first observed in the wild in 2013. All versions of the RAT contain basic
plugins and functionalities such as screen capture, cryptocurrency mining, remote
control of the desktop and webcam session theft.
Pegasus
Pegasus is a highly sophisticated spyware which targets Android and iOS mobile
devices, developed by the Israeli NSO group. The malware is offered for sale,
mostly to government-related organizations and corporates. Pegasus can leverage
vulnerabilities which allow it to silently jailbreak the device and install the malware.
The malware infects its targets via several means: Spear phishing SMS messages
which contains a malicious link or URL redirect, without any action required from
the user (“Zero Click”), and more. The app features multiple spying modules such as
screenshot taking, call recording, access to messaging applications, keylogging and
browser history exfiltration.
Phorpiex
Phorpiex (aka Trik) is a botnet (aka Trik) that has been active since 2010 and at its
peak controlled more than a million infected hosts. It is known for distributing other
malware families via spam campaigns as well as fueling large-scale spam and
sextortion campaigns.
Qbot
Qbot AKA QakBot is a banking Trojan that first appeared in 2008. It was designed to
steal a user’s banking credentials and keystrokes. Often distributed via spam email,
Qbot employs several anti-VM, anti-debugging, and anti-sandbox techniques to
hinder analysis and evade detection.
Raccoon
Raccoon infostealer was first observed in April 2019. This infostealer targets
Windows systems and is sold as a MaaS (Malware-as-a-Service) in underground
forums. It is a simple infostealer capable of collecting browser cookies, history,
login credentials, cryptocurrency wallets and credit card information.
Ragnar Locker
Ragnar Locker is a ransomware first discovered in Dec. 2019. It deploys
sophisticated evasion techniques including deployment as a virtual machine on
targeted systems to hide its activity. Ragnar was used in an attack against Portugal’s
national electric company in a double-extortion act where the attackers published
sensitive data stolen from the victim.
RedLine Stealer
RedLine Stealer is a trending Infostealer and was first observed in March 2020.
Sold as a MaaS (Malware-as-a-Service), and often distributed via malicious email
attachments, it has all the capabilities of modern infostealer - web browser
information collection (credit card details, session cookies and autocomplete data),
harvesting of cryptocurrency wallets, ability to download additional payloads,
and more.
Remcos
Remcos is a RAT that first appeared in the wild in 2016. Remcos distributes itself
through malicious Microsoft Office documents, which are attached to SPAM emails,
and is designed to bypass Microsoft Windowss UAC security and execute malware
with high-level privileges.
RigEK
The oldest and best known of the currently operating Exploit Kits, RigEK has been
around since mid-2014. Its services are offered for sale on hacking forums and the
TOR Network. Some “entrepreneurs” even re-sell low-volume infections for those
malware developers not yet big enough to afford the full-fledged service. RigEK has
evolved over the years to deliver anything from AZORult and Dridex to little-known
ransomware and cryptominers.
RubyMiner
RubyMiner was first seen in the wild in January 2018 and targets both Windows and
Linux servers. RubyMiner seeks vulnerable web servers (such as PHP, Microsoft
IIS, and Ruby on Rails) to use for cryptomining, using the open source Monero miner
XMRig.
Snake Keylogger
Snake Keylogger is a modular .NET keylogger/infostealer. Surfaced around late
2020, it grew fast in popularity among cyber criminals. Snake is capable of recording
keystrokes, taking screenshots, harvesting credentials and clipboard content. It
supports exfiltration of the stolen data by both HTTP and SMTP protocols.
REvil
REvil (aka Sodinokibi) is a Ransomware-as-a-service which operates an “affiliates”
program and was first spotted in the wild in 2019. REvil encrypts data in the user’s
directory and deletes shadow copy backups to make data recovery more difficult. In
addition, REvil affiliates use various tactics to spread it, including through spam and
server exploits, as well as hacking into managed service providers (MSP) backends,
and through malvertising campaigns that redirect to the RIG Exploit Kit.
SparrowDoor
SparrowDoor is an advanced backdoor used by the FamousSparrow APT group to spy
on hotels, governments and more. It was spotted exploiting the Microsoft Exchange
ProxyLogon vulnerability around March 2021. The backdoor is loaded using DLL
Hijacking combined with a legitimate binary, to help bypass AV products.
SunBurst
SunBurst is the backdoor that was planted within SolarWinds’s Orion IT management
software during 2020, as part of the infamous supply chain attack, hitting thousands
of organizations worldwide. It is a persistent backdoor that provided attackers with
an initial foothold within the organizations. If the infected machines passed all the
requirements, and did not contain various blacklisted services or AV software,
Sunburst would later deploy additional memory implants (like TearDrop) for
command execution and lateral movement capabilities.
TrickBot
TrickBot is a modular banking Trojan, attributed to the WizardSpider cybercrime
gang. Mostly delivered via spam campaigns or other malware families such as
Emotet and BazarLoader. TrickBot sends information about the infected system
and can also download and execute arbitrary modules from a large array of
available modules, including a VNC module for remote control and an SMB module
for spreading within a compromised network. Once a machine is infected, the
threat actors behind this malware, utilize this wide array of modules not only to
steal banking credentials from the target PC, but also for lateral movement and
reconnaissance on the targeted organization itself, prior to delivering a company-
wide targeted ransomware attack.
Ursnif
Ursnif is a variant of the Gozi banking Trojan for Windows, whose source code
has been leaked online. It has man-in-the-browser capabilities to steal banking
information and credentials for popular online services. In addition, it can steal
information from local email clients, browsers and cryptocurrency wallets. Finally,
it can download and execute additional files on the infected system.
Vidar
Vidar is an infostealer that targets Windows operating systems. First detected at the
end of 2018, it is designed to steal passwords, credit card data and other sensitive
information from various web browsers and digital wallets. Vidar is sold on various
online forums and used as a malware dropper to download GandCrab ransomware
as its secondary payload.
WannaMine
WannaMine is a sophisticated Monero cryptomining worm that spreads the
EternalBlue exploit. WannaMine implements a spreading mechanism and
persistence techniques by leveraging the Windows Management Instrumentation
(WMI) permanent event subscriptions.
XMRig
XMRig is open-source CPU mining software used to mine the Monero
cryptocurrency. Threat actors often abuse this open-source software by integrating
it into their malware to conduct illegal mining on victims’ devices.
ZLoader
ZLoader is a banking malware which uses webinjects to steal credentials and private
information, and can extract passwords and cookies from the victim’s web browser.
It downloads VNC that allows the threat actors to connect to the victim’s system and
perform financial transactions from the user’s device. First seen in 2016, the Trojan
is based on leaked code of the Zeus malware from 2011. In 2020, the malware is very
popular among threat actors and includes many new variants.
z0Miner
Z0Miner, first observed in November 2020 is a cryptominer which was found on
thousands of servers exploited by Oracle’s WebLogic Server Remote Code Execution
flaw. The group behind Z0miner has since been taking advantage of the Atlassian
Confluence RCE vulnerability (CVE-2021-26084), to infect additional servers.
U.S. HEADQUARTERS
959 Skyway Road, Suite 300, San Carlos, CA 94070
Tel: 800-429-4391 | 650-628-2000 | Fax: 650-654-4233
UNDER ATTACK?
Contact our Incident Response Team:
emergency-response@checkpoint.com
W W W. C H E C K P O I N T. C O M