• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure, Network Security, News

Report: Advanced Threats Detected Rise 33% in Q4

WatchGuard Technologies' Internet Security Report finds that attacks are increasing and a 2018 Office exploit is being exploited.

April 7, 2022 Zachary Comeau Leave a Comment

WatchGuard Report
Oz/stock.adobe.com

If the fourth quarter for 2021 is any indication, 2022 will be another year that cybersecurity and IT professionals would want to forget, as advanced network attacks increase by 33% in the fourth quarter, indicating a higher level of zero day threats than ever before, reports WatchGuard Technologies.

In a new analysis of the fourth quarter of last year, the cybersecurity firm found that the continued shift to hybrid work remains a thorn in the side of IT and cybersecurity professionals as they are faced with an expanded attack surface and more holes to plug.

According to WatchGuard’s quarterly Internet Security Report, total network attack detections continue to climb, as there was a 33% increase in advanced threats and malware increased nearly 40% quarter over quarter. Network intrusion detections continue to rise, increasing 39% quarter over quarter due to the targeting of older vulnerabilities and growth in organization’s IT environments causing network defense to be more complex.

In addition to finding that malware threats in the EMEA region were detected at a much higher rate than anywhere else in the world, WatchGuard’s quarterly report also discovered a new leader in Office exploit malware. According to the company, the fourth quarter saw a significant incidence of malware targeting Office documents, which is in line with findings from the third quarter.

According to the WatchGuard report, a 2018 bug in Microsoft office that allows remote code execution has emerged as one of the most widespread Office exploits. CVE-2018-0802 is an RCE that exists in Office when the software fails to property handle objects in memory. According to Microsoft, an attacker could exploit it to run arbitrary code in the context of the user if the user opens a specially crafted file.

WatchGuard says that exploit remains in the top 10, but has since moved up one spot form last quarter, and may be the top Office exploit. The company says that 2018 bug may have replaced CVE-2017-11882, another Office RCE that has a similar exploit path.

In other alarming news for IT professionals, WatchGuard says two new malware domains were added this quarter to the list of top malware domains detected by the company, including one (Skyprobar[.]info) linked to Emotet, the banking trojan that has since evolved into a common-and-control and distribution infrastructure for other payloads.

In a statement, Corey Nachreiner, chief security officer at WatchGuard, urges organizations to harden their defenses and take a more unified approach to security.

“With the highest level of zero-day threats we’ve ever recorded and an attack surface that extends well beyond the network perimeter to IoT, home networks and mobile devices, companies need to adopt a true unified security approach that can adapt quickly and efficiently to the growing threat landscape,” Nachreiner said. “Organizations should make a commitment to implementing simple but critically important measures like updating and patching systems on a regular basis so they’re not enabling hackers.”

Tagged With: Cybersecurity, Malware, WatchGuard Technologies

Related Content:

  • Malwarebytes Mobile Security for Business Malwarebytes Launches Mobile Device Security Solution
  • Microsoft Adaptive Protection Microsoft Launches New Machine-Learning-Enabled Adaptive Protection for Data…
  • OneNote Malware, Proofpoint Hackers Are Pivoting to OneNote Documents for Malware…
  • cybersecurity, vendor risk, third party vendor security risk Research: Vendors Are Introducing Security Risk Into Customer…

Free downloadable guide you may like:

  • Harnessing the Power of Digital SignageHarnessing the Power of Digital Signage

    Choosing the best solutions for messaging, branding, and communicating in today’s content-everywhere landscape

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Harnessing the Power of Digital Signage
Harnessing the Power of Digital Signage

Choosing the best solutions for messaging, branding, and communicating in today’s content-everywhere landscape

Blueprint Series Cover: What works for hybrid work
Blueprint Series: What Works for Hybrid Work

Download this free resource to learn about how IT leaders can effectively manage and implement a hybrid work model.

Guide to creating a ransomware response plan download
Blueprint Series: Creating a Ransomware Response Plan

Chances are ransomware hackers are researching your company right now. They’re investing time and money to choose the most profitable targets and a...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2023 Emerald X, LLC. All rights reserved.