Comcast Business releases 2023 Comcast Business Security Threat Report

Aug. 21, 2023
Based on the analysis of over 23.5 billion cybersecurity attacks detected by Comcast Business among their security customers, the 2023 Security Threat Report encompasses customer data across Comcast security solutions.

Comcast Business released the 2023 Comcast Business Security Threat Report to help those at the forefront of security and technology glean a deeper understanding of cybersecurity threat trends, as well as preventative steps they can take to protect their organizations.

Based on the analysis of over 23.5 billion cybersecurity attacks detected by Comcast Business among their security customers, the 2023 Security Threat Report encompasses customer data across Comcast security solutions, including endpoint detection and response, managed detection and response, vulnerability scanning and exposure management, endpoint detection and response and DDoS mitigation.

The report utilizes the MITRE ATT&CK framework where possible and explores common evasion tactics, the anatomy and chronology of a cyber-attack, links between phishing and malware, exfiltration and impact techniques and consequences, and a growing vulnerability landscape.

Comcast Business’ exploration of the anatomy of a cyber-attack begins with initial interest and reconnaissance, during which threatening cyber actors start discovering vulnerabilities and other points of access. The next step is most often phishing; Comcast Business reports that nearly 90% of initial access attempts, which totaled almost 2 billion, were made via phishing emails. Other attack vectors included remote access, credential abuse, web or network access, redirects, and parked domain. Most of these phishing emails contained malicious URLs, attachments, and other credential-theft malware.
Once stolen, legitimate credentials can be utilized by criminals to bypass security, elevate privileges, and bypass other systems. As many companies made the switch to remote work during the COVID-19 pandemic, cyber-criminals began exploiting exposed ports, infecting networks with ransomware, and using vulnerabilities in Transmission Control Protocol (TCP) to establish connections to victim servers.

After a hacker has breached the network, they move quickly. Using malware payloads to scan endpoints and networks for vulnerabilities, establish evasion tactics, and find ways to access networks remotely from their own Command and Control (C&C) centers, they are able to drop in and out of the network whenever they wish. By utilizing backdoor malware to create encrypted reverse SSH-proxy tunnels, they can tunnel in and out of their C&C to download additional malware and even infect other machines.

Depending on the permissions hackers are able to obtain, they can do increasingly serious damage, and backdoor malware is difficult to identify and disable once installed. 14 billion backdoor malware events were identified in the report, as well as 6 billion halted connection attempts by infected machines.

Comcast Business’ report further expounds on the widening vulnerability landscape. According to the National Vulnerability Database, 26,448 new application- and infrastructure-related vulnerabilities were added, with 59% of that number classified as “critical”. More than 450 million vulnerability exploit attempts across 900 categories were stopped by Comcast in 2022, with pre-packaged exploit kits allowing even those without advanced knowledge to threaten systems.

One specific vulnerability Comcast Business outlines as particularly endemic is Apache Log4j, a zero-day vulnerability that remains a significant risk due to its prevalence in java applications and the low percentage of companies that patch these susceptible applications. Three-fifths of organizations have experienced a Log4j exploit attempt, and many of the 14 million backdoor attempts halted by the company were post-Log4j exploits.

The focus of a hacker shifts to expanding their presence once they’ve remained undetected, gathering as much information as possible to increase the impact of their attack. Lateral movement activities allow hackers to spread rapidly across networks using fileless malware techniques, remote services, or remote code execution.

Comcast Business reported that the end goals of the most common cyber-attacks include exfiltration of data stored on devices and servers, denial of service attacks, service stops, resource hijacking, and holding data hostage. 10 billion of these attack events were stopped by Comcast in 2022.

To halt the advances of cyber-criminals, Comcast Business suggests a number of steps organizations can take. Patching and keeping systems up to date remains the most vitally important step, though the report also advocates for the use of Zero Trust systems, multi-factor authentication, mandatory security awareness training, vulnerability scanning, segmentation, and endpoint security. Read the full 2023 Comcast Business Security Threat Report here.

Courtesy of BigStock.com -- Copyright: blackboard
Using modern AI-based tools and platforms, these cybercriminals are easily tricking people and stealing their personal or business information.