Cloud security solutions provider Akamai has revealed three new research reports today at the RSA Conference 2022. These in-depth reports focus on three of the most critical areas of web security: ransomware, web applications and APIs, and DNS traffic.
The three reports link the most prominent security trends and paint an accurate map of the modern attack landscape
Analyzing trillions of data points across its multiple platforms, the Akamai research team uncovered new findings on threat actor behaviour via popular attack traffic and techniques. The three reports link the most prominent security trends and paint an accurate map of the modern attack landscape. An up-to-date analysis of ransomware attack trends highlight the risks and suggest mitigation, while an analysis of Web app and API attack trends offers a fresh look at the infection vectors used by ransomware operators and others. An analysis of DNS complements the reports with a view of overall attacks analyzed via one of the internet’s most foundational technologies.
Authored by Akamai’s team of cybersecurity experts, the analysis centers on attack trends and techniques as well as solutions to solve today’s most pressing cybersecurity issues. Highlights from each report include:
- Akamai Ransomware Threat Report: With the rise of Ransomware-as-a-Service (RaaS) attacks, including from the Conti ransomware gang, Akamai analyzed and discovered the most recent and effective components of ransomware attackers’ methodologies, tools and techniques. Key findings include:
- Sixty percent of successful Conti attacks were conducted on United States companies, while 30% occurred in the European Union.
- An analysis of the industries attacked highlights the risk of supply chain disruption, critical infrastructure impact, and supply chain cyberattacks.
- Most successful Conti attacks target businesses with $10-250 million in revenue, indicating a “goldilocks” range of successful attack targets among medium and small businesses.
- The gang’s tactics, techniques, and procedures (TTPs) are well-known, but highly effective – a sobering reminder of the arsenal that is at the disposal of other hackers. But also that these attacks can be prevented with the right mitigation.
- Conti’s emphasis in their documentation on hacking and hands-on propagation, rather than encryption, should drive network defenders to focus on those parts of the kill chain as well, instead of focusing on the encryption phase.
- Akamai Web Application & API Threat Report: Through the first half of 2022, Akamai observed significant increases in web application and API attacks across the globe, with more than nine billion attack attempts to date. Details for each of the company’s key observations are as follows:
- Web application attack attempts against customers grew by more than 300% year over year in H1, the largest increase Akamai has ever observed.
- LFI attacks now surpass SQLi attacks as the most predominant WAAP attack vector, increasing by nearly 400% year over year.
- Commerce is the most impacted vertical, accounting for 38% of recent attack activity, while technology has seen the most growth so far in 2022.
- Akamai DNS Traffic Insights Threat Report: Analyzing more than 7 trillion DNS queries per day and proactively identifying and blocking threats, including malware, ransomware phishing, and botnet, Akamai researchers found:
- More than 1 of 10 monitored devices communicated at least once to domains associated with malware, ransomware, phishing or command and control (C2).
- Phishing traffic showed that most victims were targeted by scams that abused and mimicked technology and financial brands, which affected 31% and 32% of the victims, respectively.
“These new reports offer a detailed look into some of the most pressing security issues facing organizations today,” said Ofri Ziv, Akamai’s Senior Director of Security Research.
“Akamai’s unparalleled visibility across much of the global threat landscape allows our researchers to analyze and correlate events that are seldom seen by other groups. We hope to help the community understand where threat actors are focused and how to better protect themselves from new threats as these threats continue to evolve,” he added.