Q1. What explains the recent and sustained increase in attacks targeting home routers? What, if any, threat does that pose to enterprises?
One reason for the increase is the pandemic. With a large majority of the population asked to stay home, we became increasingly reliant on home networks for both work and school. Cybercriminals know that a vast majority of home routers are insecure with default credentials and have ramped up attacks on a massive scale. For the home user, attackers are hijacking their bandwidth and slowing down their network. And for the businesses being targeted by secondary attacks, these botnets can totally take down a website, as we've seen in past high-profile attacks.
Our research provides evidence of the increase in attacks. Trend Micro's research revealed an increase from October 2019 onwards in which the number of brute force log-in attempts against routers increased nearly tenfold, from around 23 million in September to nearly 249 million attempts in December 2019. As recently as March 2020, Trend Micro recorded almost 194 million brute force logins.
This trend is concerning for enterprises because cybercriminals are competing with each other to compromise as many routers as possible so they can be conscripted into botnets. These are then sold on underground sites either to launch Distributed Denial of Service (DDoS) attacks, or as a way to anonymize other attacks such as click fraud, data theft and account takeover.
Q2. What are some of the challenges involved in protecting software-defined compute workloads? What kind of capabilities do you need to adequately protect these workloads?
As organizations adopt a software-defined data center model, challenges often arise as a result of virtualization. It can be a difficult and risky process to ensure that networks and infrastructure are compatible, there is enough storage and computational capacity, your IT staff has the necessary knowledge and skillset, and, above all, your model is secure from top to bottom. These organizations need to protect the VMs and containers that run on top of SDC environments.
A decade ago, we predicted that organizations would need multi-layered security to protect their cloud environments and software-defined data centers. As such, Trend Micro has steadily built out its SDC workload protection capabilities over the past several years for virtual, public cloud and container environments. This past year, we were honored to be recognized by IDC and ranked #1 in 2019 market share for Hybrid Cloud Workload Security, according to IDC's Worldwide Hybrid Cloud Workload Security Market Shares, 2019 report.
To protect these workloads, you need to ensure every area of your cloud environment is solidly secure--not just certain focus areas—and in the simplest way possible. The fewer individual point products you can use, the easier it will be for your organization to navigate and maintain a strong and secure cloud environment. With this in mind, Trend Micro launched a cloud security services program, Trend Micro Cloud One, in November 2019 to address customers' security challenges around data center, IaaS, containers, storage and serverless architectures. Our Cloud One offering delivers the most comprehensive range of security services in a single cloud-native platform to help secure digital transformations in the cloud: Workload Security, Container Security, Application Security, Network Security, Cloud Security Posture Management (Conformity), and File Storage Security.
Q3. What can organizations participating in the Black Hat USA 2020 virtual event expect to see and hear from Trend Micro this year? What are some of the topics you plan on highlighting at the event?
We are excited about our presence at Black Hat this year. The team has a total of 5 sessions; two of which will be delivering findings from our OT research reports. One focuses on the translation protocols that let OT machines communicate with IT machines, and the other digs into automation technology and security issues we found in the proprietary languages used by machines like robots.
Attendees can participate in the Threat Defense Challenge we're hosting to test their defense and response skills. Our team will also be discussing our XDR solution – which was announced at the show last year – and the progress we've made. We've been doing a lot of work around campaign tracking and understanding the end-to-end tactics, techniques and procedures of an attack campaign and our XDR solution really addresses the way criminal actors work to infiltrate a network to keep it safe. We will dive into why organizations should look to XDR for holistic detection and response.
Readers can learn more about what we have going on at the show here.