WatchGuard latest quarterly Internet Security Report reveals that Linux malware made up more than 36 percent of the top threats identified in Q1 2017. The increased presence of Linux/Exploit, Linux/Downloader and Linux/Flooder attacks highlights the need to protect Linux-based IoT devices and Linux servers from the Internet with layered defences / defenses.
Other key findings from the Q1 2017 report include:
- The cyber security battleground is shifting toward web servers. In Q1, drive-by downloads and browser-based attacks were predominant. Furthermore, 82 percent of the top network attacks targeted web servers or other web-based services. Users should strengthen web server defences by hardening permissions, limiting resource exposure, and patching server software.
- Legacy antivirus (AV) continues to miss new malware at a higher rate. AV solutions missed 38 percent of the total threats WatchGuard caught in Q1, compared to 30 percent in Q4 2016. The growing number of new or zero-day malware now evading traditional AV highlights the weaknesses of signature-based detection solutions and the need for services that can detect and deter advanced persistent threats.
- Attackers still exploit the Android StageFright flaw. This exploit first gained notoriety in 2015 and is proving its longevity as the first mobile-specific threat to hit WatchGuard Threat Lab’s top 10 attacks list this year. At a minimum, Android users should regularly upgrade their operating systems to prevent mobile attacks like StageFright.
- Overall, threat volume decreased 52 percent in Q1 2017 compared to Q4 2016. WatchGuard believes that the drop in malware detections can be attributed to the absence of seasonal malware campaigns associated with various Q4 holidays, which increased overall malware instances during that period.