Archive for Trend Micro

Healthcare, Research & E-commerce To Face Heightened Security Risk In 2021: Trend Micro

Posted in Commentary with tags on December 8, 2020 by itnerd

The latest 2021 predictions report from Trend Micro found, a new wave of threats will emerge, and organizations will face new challenges brought on by shifts to both remote work and priorities of organizations and governments. The widespread reliance on the cloud to conduct business will also create new vectors for breaches and attacks by criminals, leaving security teams scrambling with decreased economic resources.

Some of the other predictions from Trend Micro include:

  1. Threat actors will turn home offices into their new criminal hubs
  2. The Covid-19 pandemic will upend cybersecurity priorities as it proves to be fertile ground for malicious campaigns
  3. Teleworking setups will force organizations to confront hybrid environments and unsustainable security architectures
  4. Governments will face a tug-of-war between upholding data privacy and ensuring public health
  5. Attackers will quickly weaponize newly disclosed vulnerabilities, leaving users with a narrow window for patching
  6. Exposed APIs will be the next favoured attack vector for enterprise breaches
  7. Enterprise software and cloud applications used for remote work will be hounded with critical class bugs

All of that is going make 2021 a very “interesting” year for those in charge of defending companies against these sorts of things.

Trend Micro Blocked 8.8 Million COVID-19 Threats in the First Half of 2020

Posted in Commentary with tags on August 26, 2020 by itnerd

Trend Micro Incorporated (TYO: 4704; TSE: 4704), the leader in cloud security, today released its annual mid-year roundup report, which reveals COVID-19 related threats as the single largest type of threat in the first half of the year. In just six months, Trend Micro blocked 8.8 million COVID-19 related threats, nearly 92% of which were email-based.

Cybercriminals shifted their focus from January through June to take advantage of global interest in the pandemic. The risk to businesses was compounded by security gaps created by a completely remote workforce.

In total, Trend Micro blocked 27.8 billion cyber threats in the first half of 2020, 93% of which were email-borne.

Business Email Compromise (BEC) detections increased by 19% from the second half of 2019, in part due to scammers trying to capitalize on home workers being more exposed to social engineering.

Among all the threats in the first half of the year, ransomware was a constant factor. Although the number of detected ransomware threats decreased, Trend Micro saw a 45% increase in new ransomware families compared to the same time last year. 

Global organizations have also been burdened by a significant spike in newly disclosed vulnerabilities. Trend Micro’s Zero Day Initiative (ZDI) published a total of 786 advisories, representing a 74% increase from the second half of 2019. Some of these came as part of Microsoft Patch Tuesday updates, which have fixed an average of 103 CVEs per month so far in 2020 — including the largest number of patches ever issued in a single month (129) in June.

Trend Micro also observed a 16% increase in vulnerabilities disclosed in industrial control systems (ICS), compared to the first half of 2019, which could create major challenges for smart factory owners and other organizations running IIoT environments.

To effectively protect dispersed corporate networks, Gartner recommends businesses “refine security monitoring capabilities to reflect an operating environment where network traffic patterns, data and system access vectors have changed due to increased remote and mobile operations.[1]” Trend Micro XDR helps customers do exactly that by correlating security events across the entire IT environment, which is critical for holistic protection in the second half of 2020.

To learn more about the threat landscape in the first half of 2020 and how businesses can stay secure moving forward, read the full report here: https://www.trendmicro.com/vinfo/us/security/research-and-analysis/threat-reports/roundup/securing-the-pandemic-disrupted-workplace-trend-micro-2020-midyear-cybersecurity-report.

Trend Micro & Snyk Expand Partnership With Technology Collaboration To Solve Open Source Development Risks

Posted in Commentary with tags on August 25, 2020 by itnerd

Trend Micro today announced plans for a new, co-developed solution with Snyk, the leader in developer-first open source security. The joint solution will help security teams manage the risk of open source vulnerabilities from the moment open source code is introduced without interrupting the software delivery process. This marks the expansion of a strategic partnership that has already helped countless organizations enhance DevOps security without impacting product roadmaps.

The latest capabilities, delivered by combining the strengths of both companies, enables teams to find vulnerabilities in open source code automatically and immediately. It offers significant benefits for security and development teams, including helping to support compliance with ISO 27001, SOC 2 and other key frameworks and standards.

The joint solution will help create fundamental mind shifts in collaboration, driving closer alignment between security and developer teams. It will be available as part of the Trend Micro Cloud One platform, for additional details visit: www.trendmicro.com/cloudonehave. For an overview of the partnership visit: www.trendmicro.com/snyk.

Trend Micro Research Reveals Dangerous Design Flaws and Vulnerabilities In Legacy Programming Languages

Posted in Commentary with tags on August 6, 2020 by itnerd

Trend Micro Incorporated today announced new research highlighting design flaws in legacy languages and released new secure coding guidelines to help Industry 4.0 developers greatly reduce the software attack surface. And with this decrease business disruption in operational technology (OT) environments.

Conducted jointly with Politecnico di Milano, the research details how design flaws in legacy programming languages could lead to vulnerable automation programs. These insecurities could enable attackers to hijack industrial robots and automation machines to disrupt production lines or steal intellectual property. According to the research, the industrial automation world may be unprepared to detect and prevent the exploitation of the issues found. Therefore, it is imperative that the industry start embracing and establishing network-security best practices and secure-coding practices, which have been updated with industry leaders as a result of this research.

Legacy proprietary programming languages such as RAPID, KRL, AS, PDL2, and PacScript were designed without an active attacker model in mind. Developed decades ago, they are now essential to critical automation tasks on the factory floor, but can’t themselves be fixed easily.

Not only are vulnerabilities a concern in the automation programs written using these proprietary languages, but researchers demonstrate how a new kind of self-propagating malware could be created using one of the legacy programming languages as an example. 

Trend Micro Research has worked closely with The Robotic Operating System Industrial Consortium to establish recommendations to reduce the exploitability of the identified issues[1].

As these new guidelines demonstrate, the task programs that rely on these languages and govern the automatic movements of industrial robots can be written in a more secure manner to mitigate Industry 4.0 risk. The essential checklist for writing secure task programs includes the following:

  • Treat industrial machines as computers and task programs as powerful code
  • Authenticate every communication
  • Implement access control policies
  • Always perform input validation
  • Always perform output sanitization
  • Implement proper error handling without exposing details
  • Put proper configuration and deployment procedures in places

In addition, Trend Micro Research and Politecnico di Milano have also developed a patent-pending tool to detect vulnerable or malicious code in task programs, thus preventing damage at runtime.

As a result of this research, security-sensitive features were identified in the eight most popular industrial robotic programming platforms, and a total of 40 instances of vulnerable open source code have been found. One vendor has removed the automation program affected by a vulnerability from its application store for industrial software, and two more have been acknowledged by the maintainer, leading to fruitful discussion. Details of the vulnerability disclosures have also been shared by ICS-CERT in an alert to their community.

The results of this research will be presented at Black Hat USA on August 5, and at the ACM AsiaCCS conference in October in Taipei. 

To find out more, please find the complete research report here: https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/unveiling-the-hidden-risks-of-industrial-automation-programming.

2/3 of Canadians More Aware Of Cybersecurity Policies Since Lockdown: Trend Micro

Posted in Commentary with tags on July 3, 2020 by itnerd

Trend Micro Incorporated today released survey results that show how remote workers address cybersecurity. Nearly three quarters (72%) of remote workers say they are more conscious of their organisation’s cybersecurity policies since lockdown began, but many are breaking the rules anyway due to limited understanding or resource constraints.

Trend Micro’s Head in the Clouds study is distilled from interviews with 13,200 remote workers across 27 countries on their attitudes towards corporate cybersecurity and IT policies. It reveals that there has never been a better time for companies to take advantage of heightened employee cybersecurity awareness. The survey reveals that the approach businesses take to training is critical to ensure secure practices are being followed.

The results indicate a high level of security awareness, with 85% of respondents claiming they take instructions from their IT team seriously, and 81% agree that cybersecurity within their organisation is partly their responsibility. Additionally, 64% acknowledge that using non-work applications on a corporate device is a security risk.

However, just because most people understand the risks does not mean they stick to the rules.

For example:

  • 56% of employees admit to using a non-work application on a corporate device, and 66% of them have actually uploaded corporate data to that application.
  • 80% of respondents confess to using their work laptop for personal browsing, and only 36% of them fully restrict the sites they visit.
  • 39% of respondents say they often or always access corporate data from a personal device – almost certainly breaking corporate security policy.
  • 8% of respondents admit to watching / accessing porn on their work laptop, and 7% access the dark web.

Productivity still wins out over protection for many users. A third of respondents (34%) agree that they do not give much thought to whether the apps they use are sanctioned by IT or not, as they just want the job done. Additionally, 29% think they can get away with using a non-work application, as the solutions provided by their company are ‘nonsense.’

The Head in the Clouds study looks into the psychology of people’s behaviour in terms of cybersecurity, including their attitudes towards risk. It presents several common information security “personas” with the aim of helping organizations tailor their cybersecurity strategy in the right way for the right employee.

Trend Micro Research Identifies Critical Industry 4.0 Attack Methods

Posted in Commentary with tags on May 11, 2020 by itnerd

Trend Micro today released research describing how advanced hackers could leverage unconventional, new attack vectors to sabotage smart manufacturing environments. 

For this report, Trend Micro Research worked with Politecnico di Milano in its Industry 4.0 lab, which houses real manufacturing equipment from industry leaders, to demonstrate how malicious threat actors can exploit existing features and security flaws in Industrial IoT (IIoT) environments for espionage of financial gain.

Critical smart manufacturing equipment relies primarily on proprietary systems, however these machines have the computing power of traditional IT systems. They are capable of much more than the purpose for which they are deployed, and attackers are able to exploit this power. The computers primarily use proprietary languages to communicate, but just like with IT threats, the languages can be used to input malicious code, traverse through the network, or steal confidential information without being detected.

Though smart manufacturing systems are designed and deployed to be isolated, this seclusion is eroding as IT and OT converge. Due to the intended separation, there is a significant amount of trust built into the systems and therefore very few integrity checks to keep malicious activity out.

The systems and machines that could be taken advantage of include the manufacturing execution system (MES), human machine interfaces (HMIs), and customizable IIoT devices. These are potential weak links in the security chain and could be exploited in such a way to damage produced goods, cause malfunctions, or alter workflows to manufacture defective products.

The report offers a detailed set of defense and mitigation measures, including:

  • Deep packet inspection that supports OT protocols to identify anomalous payloads at the network level
  • Integrity checks run regularly on endpoints to identify any altered software components
  • Code-signing on IIoT devices to include dependencies such as third-party libraries
  • Risk analysis to extend beyond physical safety to automation software
  • Full chain of trust for data and software in smart manufacturing environments
  • Detection tools to recognize vulnerable/malicious logic for complex manufacturing machines
  • Sandboxing and privilege separation for software on industrial machines

To find out more and read the full report, please visit: https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/threats-and-consequences-a-security-analysis-of-smart-manufacturing-systems

Trend Micro Offers Tips To Secure Devices While You Work From Home

Posted in Commentary with tags on March 18, 2020 by itnerd

Across industries and geographies, companies are implementing work from home policies to prevent the spread of COVID-19, resulting in a spike in the number of teleworkers. At such times, it’s imperative for devices to be secure.

Below are best practices from Trend Micro that organizations can undertake, in order to mitigate potential risks of a cyberbreach:

  • Enable the firewall for added security in devices, or use a virtual network especially when remotely accessing assets.
  • Update the firmware of wi-fi enabled devices, routers, and other hardware as soon as updates are available.
  • Change default wi-fi network names and passwords to complex credentials to deter unauthorized access.

Also, in an effort to help reduce the security risks of computers connecting to corporate networks, Trend Micro is also offering businesses a 6-month free trial of their Maximum Security product to be installed on home computers so employees can work securely during this unfortunate crisis.

Trend Micro Blocked 13 Million High-Risk Email Threats in 2019

Posted in Commentary with tags on March 12, 2020 by itnerd

Trend Micro Incorporated has released its 2019 Cloud App Security Roundup report. The report highlights changes in messaging-specific threats detected last year, the use of more sophisticated malware, and the potential abuse of emerging technologies in artificial intelligence to inform future business protection strategies.

In 2019, Trend Micro blocked 12.7 million high-risk email threats for customers leveraging cloud-based email services from Microsoft and Google. This second layer of defense caught threats beyond those detected by the cloud email services’ built-in security.

More than 11 million of the high-risk emails blocked in 2019 were phishing related, making up 89% of all blocked emails. Of these, Trend Micro detected 35% more credential phishing attempts than in 2018. Additionally, the number of unknown phishing links in such attacks jumped from just 9% of the total to more than 44% in 2019. This may demonstrate that scammers are registering new sites to avoid detection.

The report also shows that criminals are getting better at tricking the first layer of defense against Business Email Compromise (BEC) attacks, which typically look at attacker behaviors and intention analysis of the email content. The percentage of BEC attacks caught by AI-powered authorship analysis increased from 7% in 2018 to 21% in 2019.

Emerging phishing techniques outlined in the report include the increasing use of HTTPS and targeting Office 365 administrator accounts. This enables malicious hackers to hijack all connected accounts on the targeted domain and use them to send malware, launch convincing BEC attacks and more. To this end, Trend Micro blocked nearly 400,000 attempted BEC attacks, which is 271% more than in 2018.

In the face of such threats, Trend Micro recommends the organizations take the following mitigation steps:

  • Move away from a single gateway to a multi-layered cloud app security solution
  • Consider sandbox malware analysis, document exploit detection, and file, email, and web reputation technologies to detect malware hidden in Office 365 and PDF documents
  • Enforce consistent data loss prevention (DLP) policies across cloud email and collaboration apps
  • Choose a security partner that can offer seamless integration into their cloud platforms, preserving user and admin functions
  • Develop comprehensive end user awareness and training programs

The report’s findings were based on data generated by Trend Micro Cloud App Security™, an API-based solution that protects a range of cloud-based applications and services, including Microsoft® Office 365™ Exchange™ Online, OneDrive® for Business, SharePoint® Online, Gmail, and Google Drive.

To find out more, please read the complete report here:https://www.trendmicro.com/vinfo/us/security/research-and-analysis/threat-reports/roundup/trend-micro-cloud-app-security-report-2019

 

Latest Trend Micro Report Helps Protect Industrial Environments By Trapping Malicious Attackers

Posted in Commentary with tags on January 21, 2020 by itnerd

Trend Micro today announced the results of a six-month honeypot imitating an industrial factory. The highly sophisticated Operational Technology (OT) honeypot attracted fraud and financially motivated exploits.

The six-month investigation revealed that unsecured industrial environments are primarily victims of common threats. The honeypot was compromised for cryptocurrency mining, targeted by two separate ransomware attacks, and used for consumer fraud.

To better understand the attacks targeting ICS environments, Trend Micro Research created a highly realistic, industrial prototyping company. The honeypot consisted of real ICS hardware and a mix of physical hosts and virtual machines to run the factory, which included several programmable logic controllers (PLCs), human machine interfaces (HMIs), separate robotic and engineering workstations and a file server.

Trend Micro urges smart factory owners to minimize the number of ports they leave open and to tighten access control policies, among other cybersecurity best practices. In addition, implementing cybersecurity solutions designed for factories, like those offered by Trend Micro, can help further mitigate the risk of attack.

To read more about the research, including the design and deployment of the honeypot itself, please visit: https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/fake-company-real-threats-logs-from-a-smart-factory-honeypot.

In Depth: Trend Micro’s Threat Research Centre In Toronto

Posted in Commentary with tags on December 13, 2019 by itnerd

Recently I had the chance to tour Trend Micro’s Threat Research Centre in Toronto which  has been around for about a year in the Liberty Village district in Toronto.

TrendMicro_interiors_191120_SF4358

Fun fact: The location that Trend Micro occupies used to be a pool hall where I used to spend a lot time in when I turned 19 back when dinosaurs roamed the earth.

Trend Micro has occupied this 22,000 square-foot space for one purpose: To get ahead of the next wave of cyber threats and to work with others to protect everyone from what’s out there today. The latter is important because Trend Micro is willing to work with governments, law enforcement, and others to keep you safe.

This slideshow requires JavaScript.

In addition to research, this facility serves as a centralized space for the company’s partners and customers. It is a nice open space that allows people to work with each other with ease. And if you look at the pictures above, you’ll note that there a couple of pinball machines. This is in memory of Trend Micro’s chief technology officer and pinball fan Raimund Genes who suddenly passed away last year.

They day that I was there, I got the opportunity to meet Myla Pilao, Director and Research Centre Lead who talked about the threat landscape and toured me through the facility. We talked about a number of things, but the main thing that I walked away from was this:

Assume that the bad guys are in.

If you assume that, you can build your defenses around that.

As for the discussion with Ms. Pilao, she notes that ransomware continues to be a popular avenue for attackers to earn money, but cryptojacking is rapidly rising in popularity. That’s got to make your blood run cold. IoT is also a very popular attack vector which is a big deal seeing that IoT is growing thing in businesses and homes. But not only is Trend Micro working to stop those threats. Via this research center they are looking at other ways to protect you from threats. For example I spent 15 minutes with a threat researcher who was looking into recent Windows “Patch Tuesday” updates and what they fixed. That way they can reverse engineer what the vulnerabilities were and provide countermeasures for those who have not yet installed those updates. That’s forward thinking.

Trend Micro is serious about protecting their users from emerging threats and this research centre is proof of that. You can expect good things to come out of this place that will benefit computer users everywhere. Thanks very much to Trend Micro for having the opportunity to tour this place and see the good work that is being done here.