Top 3 Insights from the Q2 2024 Cyber Threat Report

Cato CTRL (Cyber Threats Research Lab) recently unveiled its Q2 2024 SASE Threat Report, offering a comprehensive overview of cybersecurity risks based on data from over 1.38 trillion network flows across more than 2,500 global customers. The report, covering the period from April to June 2024, provides critical insights into emerging threats and security trends.

1. IntelBroker: A Persistent Threat in the Cyber Underground

Cato CTRL's deep investigation into hacking communities, particularly the dark web, has uncovered the activities of a notorious threat actor known as IntelBroker. A key figure within the BreachForums hacking community, IntelBroker has been actively involved in selling data and source code from high-profile organizations. These victims include companies such as AMD, Apple, Facebook, KrypC, Microsoft, Space-Eyes, T-Mobile, and even the US Army Aviation and Missile Command. IntelBroker’s operations highlight the significant risks posed by underground marketplaces where stolen corporate data is frequently traded.

2. Brand Spoofing: 66% Targets Amazon

One of the most alarming trends identified in the report is the rise of cybersquatting, where threat actors spoof domain names to profit from brand trademarks. Amazon has emerged as the most spoofed brand, accounting for a staggering 66% of all spoofed domains. Google follows, though at a much lower rate of 7%. This trend underscores the growing challenge companies face in safeguarding their digital identity and preventing phishing attacks that exploit these fake domains.

3. Log4j: Still a Major Threat

Even though it was discovered in 2021, the Log4j vulnerability continues to be a tool of choice for cybercriminals. Cato CTRL reports a 61% increase in attempted Log4j exploits in inbound traffic and a 79% rise in WANbound traffic between Q1 and Q2 2024. Additionally, there has been a sharp 114% surge in exploitation attempts targeting the Oracle WebLogic vulnerability (discovered in 2020) in WANbound traffic. These numbers reflect the persistence of older vulnerabilities and the need for organizations to prioritize timely patching.

Security Recommendations for Enterprises

To mitigate these ongoing threats, Cato CTRL offers several security recommendations:

  • Monitor Dark Web: Continuously watch for mentions of your company’s data being traded on the dark web or hacking forums.
  • Brand Protection: Implement tools to detect and prevent brand spoofing and cybersquatting attacks.
  • Proactive Patching: Establish a regular patching schedule, focusing on critical vulnerabilities like Log4j.
  • Incident Response Plans: Develop a detailed plan for responding to data breaches.
  • "Assume Breach" Mindset: Adopt security approaches such as Zero Trust Network Access (ZTNA), Extended Detection and Response (XDR), and regular penetration testing.
  • AI Governance: Ensure that AI tools and systems are governed effectively to prevent security risks.

The Q2 2024 report serves as a timely reminder for organizations to stay vigilant and proactive in their cybersecurity efforts, especially in addressing long-standing vulnerabilities and emerging threats like cybersquatting.


Similar Articles
Image Description
Threat Intelligence A new malware campaign targeting Linux systems is exploiting Oracle WebLogic vulnerabilities to mine cryptocurrency.

One of the key tactics used in this attack is obfuscation. Hackers cleverly disguise their malware to avoid detection by antivirus software a ...

  • By DragonX Team

  • Updated Sep 13, 2024

Cato CTRL (Cyber Threats Research Lab) recently unveiled its Q2 2024 SASE Threat Report, offering a comprehensive overview of cybersecurity risks based on data from over 1.38 trillion network flows across more than 2,500 global customers. The report, covering the period from April to June 2024, provides critical insights into emerging threats and security trends.

1. IntelBroker: A Persistent Threat in the Cyber Underground

Cato CTRL's deep investigation into hacking communities, particularly the dark web, has uncovered the activities of a notorious threat actor known as IntelBroker. A key figure within the BreachForums hacking community, IntelBroker has been actively involved in selling data and source code from high-profile organizations. These victims include companies such as AMD, Apple, Facebook, KrypC, Microsoft, Space-Eyes, T-Mobile, and even the US Army Aviation and Missile Command. IntelBroker’s operations highlight the significant risks posed by underground marketplaces where stolen corporate data is frequently traded.

2. Brand Spoofing: 66% Targets Amazon

One of the most alarming trends identified in the report is the rise of cybersquatting, where threat actors spoof domain names to profit from brand trademarks. Amazon has emerged as the most spoofed brand, accounting for a staggering 66% of all spoofed domains. Google follows, though at a much lower rate of 7%. This trend underscores the growing challenge companies face in safeguarding their digital identity and preventing phishing attacks that exploit these fake domains.

3. Log4j: Still a Major Threat

Even though it was discovered in 2021, the Log4j vulnerability continues to be a tool of choice for cybercriminals. Cato CTRL reports a 61% increase in attempted Log4j exploits in inbound traffic and a 79% rise in WANbound traffic between Q1 and Q2 2024. Additionally, there has been a sharp 114% surge in exploitation attempts targeting the Oracle WebLogic vulnerability (discovered in 2020) in WANbound traffic. These numbers reflect the persistence of older vulnerabilities and the need for organizations to prioritize timely patching.

Security Recommendations for Enterprises

To mitigate these ongoing threats, Cato CTRL offers several security recommendations:

  • Monitor Dark Web: Continuously watch for mentions of your company’s data being traded on the dark web or hacking forums.
  • Brand Protection: Implement tools to detect and prevent brand spoofing and cybersquatting attacks.
  • Proactive Patching: Establish a regular patching schedule, focusing on critical vulnerabilities like Log4j.
  • Incident Response Plans: Develop a detailed plan for responding to data breaches.
  • "Assume Breach" Mindset: Adopt security approaches such as Zero Trust Network Access (ZTNA), Extended Detection and Response (XDR), and regular penetration testing.
  • AI Governance: Ensure that AI tools and systems are governed effectively to prevent security risks.

The Q2 2024 report serves as a timely reminder for organizations to stay vigilant and proactive in their cybersecurity efforts, especially in addressing long-standing vulnerabilities and emerging threats like cybersquatting.


Similar Articles
Image Description
Cybercrime Organizations Lose Up to $186 Billion Annually to Vulnerable APIs and Bot Attacks, Report Warns

A recent report reveals that organizations are losing up to $186 billion each year due to vulnerable APIs and bot attacks. Learn about the im ...

  • By DragonX Team

  • Updated Oct 11, 2024



Latest News and Updates

Latest News

  • Android's New Identity Check Feature Locks Device Settings Outside Trusted Locations

    1

    Posted Date Jan 25, 2025

    Android's New Identity...

    Google has launched a new...
  • DoJ Indicts 5 Individuals for $866K North Korean IT Worker Scheme Violations

    2

    Posted Date Jan 25, 2025

    DoJ Indicts 5...

    The U.S. Department of Justice...
  • RANsacked: Over 100 Security Flaws Found in LTE and 5G Network Implementations

    3

    Posted Date Jan 25, 2025

    RANsacked: Over 100...

    A group of academics has...
  • Beware: Fake CAPTCHA Campaign Spreads Lumma Stealer in Multi-Industry Attacks

    4

    Posted Date Jan 24, 2025

    Beware: Fake CAPTCHA...

    Cybersecurity researchers are calling attention...
  • Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass and Firmware Exploits

    5

    Posted Date Jan 24, 2025

    Palo Alto Firewalls...

    An exhaustive evaluation of three...
X
DragonX Cookie Policy

At DragonX, we employ cookies on our website to enhance the site, providing the best service and customer experience possible

Category

Necessary (Always active)

These cookies enable essential site features like secure log-in and consent preference adjustments, without storing any personally identifiable data

Functional

This category aids in specific functions such as sharing website content on social media platforms, receiving feedback, and incorporating third-party features

Analytics

Analytical cookies are utilized to comprehend visitor interactions on the website, offering insights into metrics like visitor numbers, bounce rates, and traffic sources

Performance

These cookies help in understanding and analyzing important performance indicators of the website to enhance the user experience

Advertisement

Tailored advertisements are provided to visitors based on previously visited pages, while also evaluating the effectiveness of ad campaigns