Netskope Threat Labs publishes a monthly summary blog post of the top threats we are tracking on the Netskope platform. The purpose of this post is to provide strategic, actionable intelligence on active threats against enterprise users worldwide.
Summary
- After four months, PE files (EXE/DLL) reclaimed the top spot as the most popular file format for malware downloads, narrowly beating out PDF files, which continue to remain popular but are coming down from their peak in August.
- Attackers continue to attempt to fly under the radar by using cloud apps to deliver malware, with 51% of all malware downloads in October originating from 184 cloud apps, the highest number of apps in the past six months.
- The famous LockBit ransomware and the well-known AgentTesla infostealer were among the top malware families detected on the Netskope platform in October.
Cloud Malware Delivery
Attackers attempt to fly under the radar by delivering malicious content via popular cloud apps. Abusing cloud apps for malware delivery enables attackers to evade security controls that rely primarily on domain block lists and URL filtering, or that don’t inspect cloud traffic. In October 2023, 51% of all HTTP/HTTPS malware downloads originated from popular cloud apps.
The total number of cloud apps from which malware downloads originated is the highest of the past months, with 184 distinct cloud apps used for malware download. Usually the closer we get to the end of the year, more infections can be observed when compared to the other months, and that reflects on the number of cloud apps used by malware.
Attackers achieve the most success reaching enterprise users when they abuse cloud apps that are already popular in the enterprise. Microsoft OneDrive, the most popular enterprise cloud app, has again held the top spot for the most cloud malware downloads, which it has for more than six months.
Compared to last month, when a DarkGate malware campaign was spotted abusing SharePoint, October showed a slight decrease in SharePoint app usage, though it remains in second place and still demonstrates a preference for malicious usage. The top ten apps remained largely unchanged and included free software hosting sites (GitHub), cloud storage apps (Google Drive, Box, Azure Blob Storage), free web hosting services (Weebly), and also email services like Microsoft Live Outlook, which had a considerable increase in its usage in August due to a phishing campaign abusing the app.
In total, the top ten accounted for nearly three-quarters of all cloud malware downloads, with the remaining one-quarter spread over 174 other cloud apps. The top ten list is a reflection of attacker tactics, user behavior, and company policy.
Top Malware File Types
After two months in second place, malicious EXE files returned to the top of the list of malware file types. Although PDF files aren’t in the top anymore after four months, they’re still in second place. We expect both PDFs and EXE files to remain popular among adversaries, with their relative popularity fluctuating depending on which specific malware campaigns are active that month.
In third place are ZIP archive files, and the usage of other file types remains consistent when compared to other months.
Top Malware Families
Attackers are constantly creating new malware families and new variants of existing families, either as an attempt to bypass security solutions or to update their malware’s capabilities. In October 2023, 66% of all malware downloads detected by Netskope were either new families or new variants that had not been observed in the preceding six months. The other 33% were samples that had been previously observed during the preceding six months and are still circulating in the wild.
By volume, Netskope blocks more Trojans than any other malware type. Trojans are commonly used by attackers to gain an initial foothold and to deliver other types of malware, such as Infostealers, remote access Trojans (RATs), backdoors, and ransomware. Remaining in second place, but still rising in popularity, were malware samples related to phishing campaigns.
The following list contains the top malware and ransomware families blocked by Netskope in October 2023:
- Adware.Bundlore (a.k.a. SurfBuyer) is an OSX adware installer that has circulated in many forms, including Flash player installers, hidden scripts, and browser plugins. Details
- Backdoor.Zusy (a.k.a. TinyBanker) is a banking Trojan based on the source code of Zeus, aiming to steal personal information via code injection into websites. Details
- Downloader.Upatre is a downloader used to distribute other payloads such as Locky and Dridex. Details
- Infostealer.AgentTesla is a .NET-based Remote Access Trojan with many capabilities, such as stealing browsers’ passwords, capturing keystrokes, clipboard, etc. Details
- Infostealer.Lazagne is a password recovery tool that can be used as a hacking tool to steal passwords from infected devices. Details
- Phishing.PhishingX is a malicious PDF file used as part of a phishing campaign to redirect victims to a phishing page.
- Ransomware.LockBit is the latest version of the LockBit ransomware, emerged in September 2019, becoming one of the most relevant RaaS groups in the world. Details
- RAT.AdWind is a RAT that can perform actions such as log keystrokes, collect sensitive information, download and run other payloads, and more. Details
- Trojan.Razy is a Trojan typically distributed via malicious ads disguised as legitimate software, often used to steal cryptocurrency data. Details
- Trojan.Valyria (a.k.a. POWERSTATS) is a family of malicious Microsoft Office Documents that contain embedded malicious VBScripts, usually to deliver other malicious payloads. Details
Recommendations
Attackers have always sought to evade detection and avoid suspicion in delivering malware. Two strategies that attackers have been using increasingly in the past six months are to deliver malware by abusing cloud apps and to package malware in PDF files. Netskope Threat Labs recommends that you review your security posture to ensure that you are adequately protected against both of these trends:
- Inspect all HTTP and HTTPS downloads, including all web and cloud traffic, to prevent malware from infiltrating your network. Netskope customers can configure their Netskope NG-SWG with a Threat Protection policy that applies to downloads from all categories and applies to all file types.
- Ensure that your security controls recursively inspe