This past summer, Skybox Security published a mid-year update to its 2020 Vulnerability and Threat Trends Report which analyzed the threats and vulnerabilities at work during the first half of the year and how they’ve been exacerbated by the COVID-19 pandemic. While the report offers valuable insight into several findings, this article intends to focus on one in particular. The key finding in question states, “Ransomware thrives during COVID-19 pandemic, with new samples increasing by 72 percent.” Ransomware continues to dominate the threat landscape, and the pandemic has only increased the severity of this threat. Every week we see a new company or organization fall victim to a ransomware attack such as Garmin, the University of Utah, and Cannon, just to name a few over the past month alone. Ransomware often uses trojans, embedded in email attachments, to infect networks and computers. For the last five quarters, ransomware has been a dominant cyberthreat, but now we're seeing it shift from using normal trojans such as emotet or trickbot to using a toolkit called Cobalt Strike.
Cobalt Strike is a tool kit designed for penetration testing and threat emulation. While this tool is supposed to be used ethically for vulnerability detection and remediation processes, attackers have found a way to use it for just the opposite. Threat intelligence group Cisco Talos Incident Response (CTIR) explains that 66% of all ransomware attacks involved Cobalt Strike last quarter, suggesting that threat actors are turning to this tool more and more as they abandon their usual methods. The main features of this toolkit are reconnaissance, attack packages, spear phishing, collaboration, post-exploitation, covert communication, browser pivoting, and reporting, and logging. This software is giving threat actors the building blocks to allow them to focus on the more profitable parts of their attack.
There are a few different things that a company or organization can do to better protect their network and users: