IT Brief Australia logo
Technology news for Australia's largest enterprises
Story image

Sharp increase in phishing as cybercriminals leverage SEO to lure victims

By Shannon Williams
Tue 10 May 2022

Cybercriminals are growing in sophistication, leveraging various social engineering techniques and Trojan families to target victims more effectively, according to a new report.

Netskope has published new research that found that phishing downloads saw a sharp increase of 450% over the past 12 months, fuelled by attackers using search engine optimisation techniques to improve the ranking of malicious PDF files on popular search engines, including Google and Bing. 

The findings are part of the latest edition of the Netskope Cloud and Threat Report: Global Cloud and Malware Trends, which examines the past 12 months of malware downloads from the cloud and web around the globe.

The top web referrer categories contained some categories traditionally associated with malware, particularly shareware/freeware, but were dominated by more unconventional categories. The acceleration in the use of search engines to deliver malware over the past 12 months provides insight into how adept some attackers have become at SEO. Malware downloads referred by search engines were predominantly malicious PDF files, including many malicious fake CAPTCHAs that redirected users to phishing, spam, scam, and malware websites.

The report also found that most malware over the past 12 months was downloaded from within the same region as its victim, a growing trend that points to the increasing sophistication of cybercriminals, which more frequently stage malware to avoid geofencing filters and other traditional prevention measures. 

"Malware is no longer confined to traditional risky web categories. It is now lurking everywhere, from cloud apps to search engines, leaving organisations at greater risk than ever before," says Ray Canzanese, threat research director at Netskope. 

"To avoid falling victim to these social engineering techniques and targeted attack methods, security leaders must regularly revisit their malware protection strategy and ensure all possible entry points are accounted for," he says.

Based on a subset of anonymised usage data collected by the Netskope Security Cloud platform, additional key findings from the report include: 

  • Trojans continue to prove effective: Trojans account for 77% of all cloud and web malware downloads as attackers use social engineering techniques to gain an initial foothold and to deliver a variety of next-stage payloads, including backdoors, infostealers, and ransomware. There is no single family of Trojans that is globally dominant. The top 10 Trojan families account for only 13% of all downloads, with the remaining 87% coming from less common families.
  • Cloud and web are an attackers perfect pair: 47% of malware downloads originate from cloud apps compared to 53% from traditional websites, as attackers continue to use a combination of both cloud and web to target their victims.
  • Popular cloud storage apps continue to be the source of most cloud malware downloads. Additional top cloud app referrers included collaboration and webmail apps, where attackers can send messages directly to their victims in many different forms, including emails, direct messages, comments and document shares.  
  • Microsoft Office malware files have declined to pre-Emotet levels: EXE and DLL files account for nearly half of all malware downloads as attackers continue to target Microsoft Windows, while malicious Microsoft Office files are on the decline and have returned to pre-Emotet levels. This is due in large part to the past years worth of proactive warnings and security controls introduced by technology vendors like Google and Microsoft.
Related stories
Top stories
Story image
ExtraHop
Organisations exposing highly sensitive protocols to public internet
More than 60% of organisations expose remote control protocol SSH to the public internet, while 36% of organisations expose the insecure FTP protocol.
Story image
SaaS
Exclusive: The Access Group shares the benefits of embracing SaaS
In today's rapidly changing working environments, efficiency and productivity are surefire ways to create business growth and success.
Story image
IDC
High level of Customer Identity & Access Management adoption
The study from Okta revealed that the pandemic has either accelerated or highlighted the need for digital-first strategies.
Story image
Microsoft
Microsoft, NSW partnership to accelerate digital transformation
The renewed partnership is designed to maximise the value of Microsoft solutions to various NSW Government agencies.
Story image
Application Performance Monitoring / APM
New Relic integrates offering with Atlassian’s Jira Software
New Relic has integrated errors inbox with Jira Software to allow developers to easily access and set up complete stack error tracking and software performance monitoring from within the tool.
Story image
Infrastructure
IBM expands Power10 server line for business modernisation
IBM has recently announced a significant expansion of its Power10 server line with the introduction of mid-range and scale-out systems.
Story image
Charity
SnapLogic teams up with meetmagic for charity and children
SnapLogic has announced its partnership with meetmagic, an online Australian platform that combines business and philanthropy.
Story image
Australian Spatial Analytics
Australian Spatial Analytics expands to Melbourne
The data services provider employing neurodiverse people experiences significant growth, gearing up for national expansion.
Wiise
Discover why a localised cloud ERP is the way to go for Australian businesses.
Link image
Story image
Enterprise Resource Planning / ERP
Exclusive: SYSPRO on how ERP plays a role in Australia's manufacturing investment plan
While there is a significant drive for change, it's really down to execution, and businesses need to be prepared to find the right strategies for them to make full use of the government support.
Story image
ACCC
Telstra to address 5G competition concerns by ACCC
The Australian Competition and Consumer Commission has accepted a court-enforceable undertaking from Telstra to address competition concerns with Optus.
Story image
Enterprise Resource Planning / ERP
Why the right ERP (and partner) is crucial to an innovative and successful business
Enterprise Resource Planning (ERP) is a foundational step to ensuring a robust business model; here's why choosing the right one could be vital to ensuring long-term success and innovative results.
Story image
Hybrid Cloud
The essential guide to digital transformation by SolarWinds
Digital transformation is a buzzword thrown around all the time by companies, but what does it actually mean and why is it important? SolarWinds breaks it down.
Story image
Data Protection
VMware introduces advanced workload protection for AWS
VMware Carbon Black Workload for AWS delivers comprehensive visibility and security across on-premises and cloud environments for AWS customers.
AWS Marketplace
Learn how security orchestration, automation, and response (SOAR) enhances your security strategy.
Link image
Story image
Artificial Intelligence
Exclusive: NZ-based DEFEND offers global cyber protection
DEFEND supports customers in 66 countries across the globe with a relentless focus on ensuring that every dollar spent on security provides a meaningful return on investment and reduces cyber risk.
Story image
Compliance
Why security needs to shape your journey to the cloud
It's estimated that 80% of workloads could be in the cloud in the next few years. How can you make all that data secure?
Story image
APAC
Automation to take over 63 million jobs in APAC by 2040 - report
Forrester forecasts that working populations in the five largest economies in APAC are more at risk of physical robot automation than in Europe and North America.
Story image
Cybersecurity
Datacom research explores reality of zero trust in A/NZ
Zero trust is fast emerging as global best practice in cybersecurity and local leaders are on board, with 83% considering it essential to security.
Story image
Cybersecurity
Palo Alto Networks responds to rise in threats with MDR service
Unit 42 Managed Detection and Response is a new service that can offer continuous 24/7 threat detection, investigation and response.
Story image
Healthcare
Why the Metaverse could be the key to enhancing the healthcare sector
The experts at Accenture understand that the programmable world is about building the next version of the physical world in healthcare, understanding complex layers in order to fully utilise technology to its maximum effect.
Story image
Dark web
Beware the darkverse and its cyber-physical threats
A darkverse of criminality hidden from law enforcement could quickly evolve to fuel a new industry of metaverse-related cybercrime.
Story image
Microsoft
Spectralink DECT devices now integrated with Microsoft Teams SIP Gateway
Spectralink DECT devices are now integrated with Microsoft Teams SIP Gateway to help create better results for business-critical frontline workers.
Story image
eCommerce
Online shoppers leaving cart because of high shipping costs - report
New research commissioned by HUBBED reveals 90% of online shoppers abandoned a cart due to high shipping costs, and 64% say the lack of security was a purchase deterrent.
Story image
Red Hat
Red Hat announces 2022 awards winners for A/NZ region
Red Hat recently acknowledged Australia and New Zealand partners with its annual awards, highlighting partners across various categories.
Story image
Transcribe
VIQ Solutions starts contract with Queensland Courts DJAG
VIQ Solutions has started providing transcription and recording services to Queensland Courts Department of Justice and Attorney General.
Story image
Developers
Snyk announces plans to expand partner network in APJ
Recognising that partnerships are critical for growth, Snyk is building an entire partner ecosystem that will drive its expansion across APJ.
Story image
Indusface
Why enhancing bot protection for web and API endpoints matters
The trouble with bots is that they aren’t all bad. Unfortunately, this can make it challenging to detect malicious bots that find their way into your system and threaten your business.
Story image
SaaS
AvePoint rebrands SaaS learning product to MaivenPoint
"Our mission with MaivenPoint is to make your learning experience limitless and inspire everyone to achieve their aspirations."
Story image
Gigabit
Keysight Technologies and Nokia’s public test of 800GE success
Keysight and Nokia have successfully demonstrated the first public 800GE test, validating the readiness of next-generation optics for service providers and network operators.
Story image
Pure Storage
Pure Storage named leader in GigaOm report for Kubernetes storage
Pure Storage named the leader for the third consecutive year by GigaOm Radar Report for enterprise Kubernetes storage.
AWS Marketplace
See how managed security services (MSS) have evolved to Managed Detection and Response (MDR) and Extended Detection and Response (XDR). Learn how these new holistic solutions can simplify security management and improve your threat detection and response.
Link image
Story image
Digital Transformation
Adobe and FC Bayern collaborate on a multi-year partnership
Adobe is embarking on a multi-year partnership with FC Bayern, using its enterprise solutions to carry out the club’s digital transformation.
Story image
Document Management
TrustRadius gives M-Files two document management awards
TrustRadius has recognised M-Files with both a 2022 Best Feature Set and a 2022 Best Relationship award in document management.
Story image
Data analytics
Data analytics a struggle for A/NZ healthcare organisations
A study by InterSystems has found that most Australian and New Zealand healthcare organisations struggle to use data analytics to support their business objectives.
Story image
Neat
Workplace design a crucial factor for better employee experience - report
The key to a successful workplace could be its design, according to research from Ecosystm and Neat.
Story image
VMware
Latest VMware threat report reveals truth about deepfakes
"Cyber criminals have evolved. Their new goal is to use deepfake technology to compromise organisations and gain access to their environment."
Story image
Gartner Magic Quadrant
Gartner positions Commvault as Leader in 2022 Magic Quadrant
Gartner has named Commvault a Leader in its 2022 Gartner Magic Quadrant for Enterprise Backup and Recovery Software Solutions report.
Story image
First Nations
Google.org and INCO's $750,000 First Nations digitisation fund
INCO has launched its First Australians Digitisation Fund, with support from Google.org, to help organisations using tech to achieve better outcomes for First Nations communities.
Story image
Malware
Avast One extends protection with Online Safety Score
Avast One has extended its cross-platform support by adding its Online Safety Score feature to both the Mac and iOS platforms of Avast One.
Story image
Digital Transformation
Dear boardroom, please don’t put digital transformation back in the box
Australian companies are years ahead of where they would have been – a position that the country is poised to take advantage of to do great things. And one that it risks losing.