The Annual Report issued by the European Union’s (EU) Network and Information Security Agency (ENISA) has recently been released for patterns observed in 2018.  The scope of the report included trends by threat actors and defenders, a notable change from previous years.  At the top of the list for threat actor trends, there was the rapid rise of cryptomining, and the shift by state-sponsored threat actors towards very sophisticated social engineering attacks.  For network defenders advances in threat actor profiling, and active defense techniques was also notable.

The authors also noted some of the important political events that have given rise to the continued development of regulatory frameworks for cyber-diplomacy, cyber-defense, and cyber-war.

They summarized noting the following key trends for 2018:

  • Mail and phishing messages have become the primary malware infection vector.
  • Exploit Kits have lost their importance in the cyberthreat landscape.
  • Cryptominers have become an important monetization vector for cyber-criminals.
  • State-sponsored agents increasingly target banks by using attack-vectors utilised in cyber-crime.
  • Skill and capability building are the main focus of defenders. Public organisations struggle with staff retention due to strong competition with industry in attracting cybersecurity talents.
  • The technical orientation of most cyber threat intelligence produced is considered an obstacle towards awareness raising at the level of security and executive management.
  • Cyber threat intelligence needs to respond to increasingly automated attacks through novel approaches to utilization of automated tools and skills.
  • The emergence of IoT environments will remain a concern due to missing protection mechanisms in low-end IoT devices and services. The need for generic IoT protection architectures/good practices will remain pressing.
  • The absence of cyberthreat intelligence solutions for low-capability organisations/end-users needs to be addressed by vendors and governments.

A copy of the original report can be downloaded from here.

By Jane

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Translate »