Most cyberattacks now use encrypted channels

Security
(Image credit: Future)

Many modern cyberattacks leverage encrypted traffic, meaning they’re more difficult to identify and repel, a new report from Zscaler has claimed.

It states that businesses need to adopt a cloud-native zero-trust architecture to better monitor internet-bound traffic and defend against incoming threats. 

The report, based on more than 300 trillion daily signals and 270 billion daily transactions in the Zscaler Zero Trust Exchange, notes that the company blocked 24 billion encrypted threats, most using either TLS or SSL, in 2022. That’s a 20% increase from 2021 when the company blocked 20.7 billion such attacks and a 314% increase from 2020. 

Malware and ransomware

Most of the time, cybercriminals will hide malware in encrypted traffic. Malicious scripts and payloads make up almost 90% of all encrypted attack tactics that were blocked this year, Zscaler says. 

Of all the different types of malware, ransomware remains one of the most devastating variants. Still, destructive power does not warrant popularity - the most popular malware families include ChromeLoader (infostealer and adware), Gamaredon, AdLoad, SolarMarker, and Manuscrypt.

The biggest targets remain those based in the United States, India, the UK, and Australia, with South African victims making the top five for the first time. 

With 613% and 155% respectively, Japan and the US were among the countries with the biggest uptick in attacks. The manufacturing industry is still the number one target (239% increase), mostly due to Covid-19 measures still dictating the way these businesses operate. Another notable industry is education (132% increase year-on-year). 

On the other hand, attacks against government organizations and retail dropped by 40% and 63% respectively, mostly because law enforcement agencies were quick to pursue threat actors that targeted them, Zscaler believes.

“As organizations mature their cyber defenses, adversaries are becoming more sophisticated, particularly in their use of evasive tactics,” said Deepen Desai, CISO and VP of Security Research and Operations at Zscaler.

“Potential threats continue to hide in encrypted traffic, empowered by as-a-service models that dramatically reduce the technical barriers to doing so. It is critical for organizations to adopt a cloud-native zero-trust architecture that allows consistent inspection of all internet-bound traffic and effectively mitigates these attacks.”

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
ransomware avast
AI is helping hackers get access to systems quicker than ever before
Best email services: image of email with one unread message alert
Over 400 million unwanted and malicious emails were received by businesses in 2024
Android phone malware
Over 25 new malware variants created every single hour as smart device cyberattacks more than double in 2024
ransomware avast
“Every organization is vulnerable” - ransomware dominates security threats in 2024, so how can your business stay safe?
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
A wall of data on a large screen.
“It's the same doors that the good guys use, that the bad guys can walk through” - former White House tech advisor on data-centric security in the wake of Salt Typhoon
Latest in Security
Isometric demonstrating multi-factor authentication using a mobile device.
NCSC gets influencers to sing the praises of 2FA
Sam Altman and OpenAI
OpenAI is upping its bug bounty rewards as security worries rise
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Dangerous new CoffeeLoader malware executes on your GPU to get past security tools
China
Notorious Chinese hackers FamousSparrow allegedly target US financial firms
A digital representation of a lock
NYU website defaced as hacker leaks info on a million students
NHS
NHS IT supplier hit with major fine following ransomware attack
Latest in News
Nintendo Switch 2 Joy-Con up-close from app store
Nintendo's new app gave us another look at the Switch 2, and there's something different with the Joy-Con
cheap Nintendo Switch game deals sales
Nintendo didn't anticipate that Mario Kart 8 Deluxe was 'going to be the juggernaut' for the Nintendo Switch when it was ported to the console, according to former employees
Three angles of the Apple MacBook Air 15-inch M4 laptop above a desk
Apple MacBook Air 15-inch (M4) review roundup – should you buy Apple's new lightweight laptop?
Witchbrook
Witchbrook, the life-sim I've been waiting years for, finally has a release window and it's sooner than you think
Close up of Leica M11-P viewfinder
I wince at the prospect of the rumored Leica M11-V – here's why
Amazon Echo Smart Speaker
Amazon is experimenting with renaming Echo speakers to Alexa speakers, and it's about time