• Solutions Launch
  • Solutions News
  • Cover Story
  • Featured Article
  • Interview
  • Products Plus
  • Case stady
  • AV Solutions
    • Article
    • Interview
    • Products
    • Case Study
  • EDU Solutions
  • Solutions
No Result
View All Result
SUBSCRIBE
Smart Solutions World
  • Solutions Launch
  • Solutions News
  • Cover Story
  • Featured Article
  • Interview
  • Products Plus
  • Case stady
  • AV Solutions
    • Article
    • Interview
    • Products
    • Case Study
  • EDU Solutions
  • Solutions
No Result
View All Result
No Result
View All Result
Home Solutions News World | Latest Tech & Innovation Updates

Malware-as-a-Service Responsible For More Than Half Of Cyber Threats

SmartSolutionUser1 by SmartSolutionUser1
February 19, 2025
in Solutions News World | Latest Tech & Innovation Updates
0
Infopercept Unveils Invinsense 6.0
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Darktrace has announced the findings of Darktrace’s 2024 Annual Threat Report, revealing that Malware-as-a-Service (MaaS) is now responsible for more than half (57%) of all cyber threats to organizations, marking the continued growth of Cybercrime-as-a-Service (CaaS) models. These insights, observed by Darktrace’s Threat Research team using its unique Self-Learning AI across its customer fleet of nearly 10,000 customers spanning all major industries globally, detail a shifting threat landscape that continues to grow in complexity, marked by rising sophistication of common threats.

You might also like

Calculus Partners with Aprecomm to Bring Next Generation AI-Powered Network Intelligence to ISPs Throughout MEA, Asia, and Latam

Tech Mahindra and DFKI Collaborate to Co-innovate and Co-create Smart Factory Solutions for German Enterprises

GoPro Unveils MAX2, LIT HERO, and Fluid Pro AI Cameras in India

The persistence of CaaS models, particularly Ransomware-as-a-Service (RaaS) and MaaS is growing rapidly as less experienced threat actors access new tools to carry out disruptive attacks. According to the report, use of MaaS tools rose 17% in the latter half 2024, from 40% in the first six months to 57% of campaign activity identified by the Darktrace Threat Research.

The use of Remote Access Trojans (RATs) also saw a significant increase in the latter half of the year, representing 46% of campaign activity identified, compared to only 12% in the first half. RATs allow an attacker to remotely control an infected device, enabling them to conduct further malicious activity such as data exfiltration, credential theft, or surveillance, underscoring the rising complexity and increased risk of day-to-day threats.

Darktrace’s Threat Research team tracked several ransomware threats impacting customers, from novel strains like Lynx to re-emerging threats including Akira, RansomHub, Black Basta, Fog and Qilin. While these groups have been observed frequently using phishing as an attack vector, there has also been a shift toward more sophisticated techniques. These include the use of legitimate tools like AnyDesk and Atera to mask command and control (C2) communications, LOTL techniques for lateral movement, data exfiltration to commonly used cloud storage services and use of file-transfer technology for rapid exploitation and double extortion methods.

Inboxes Under Siege

Phishing remains attackers’ preferred technique, with over 30.4 million phishing emails detected across Darktrace’s customer fleet between December 2023 and December 2024. The techniques observed highlight how threat actors continue to curate more targeted and sophisticated emails to improve the success of their campaigns. Of all the phishing emails detected in 2024:

  • 38% were spear phishing attempts, tailored attacks on high value individuals
  • 32% used novel social engineering techniques including AI generated text with linguistic complexity, like increased text volume, punctuation, and sentence length
  • 70% successfully passed the widely used DMARC authentication approach
  • 55% passed through all existing security layers before Darktrace detection
  • Over 940,000 malicious QR codes were identified                        

Darktrace also observed an increase in threat actors targeting third-party services employees rely on, like Zoom Docs, QuickBooks, HelloSign, Adobe, and Microsoft SharePoint, to send. By leveraging trusted platforms and domains, malicious actors can bypass traditional security measures and increase the likelihood of their phishing attempts being successful. These efforts highlight how threat actors continually adapt and evolve to keep pace with the emergence of new technologies that represent new avenues to exploit.

Nathaniel Jones, VP of Threat Research at Darktrace, comments, “Email is at the forefront of the evolving threats we’re seeing across the threat landscape. Ransomware-as-a-Service tools, combined with the growing use of AI, are allowing even low-skilled attackers to engineer convincing, targeted  at scale, and making it harder than ever for traditional security measures to keep up.”

Evading Detection Via Edge Device Vulnerabilities and LOTL Techniques

Threat actors are increasingly focused on evading detection rather than causing disruption, often leveraging vulnerabilities in edge, perimeter or internet-facing devices to gain initial access to networks and then using LOTL techniques, the malicious use of legitimate tools present on a system, to remain undetected.

The most significant campaigns observed in 2024 involved the ongoing exploitation vulnerabilities in edge and perimeter network technologies, with 40% of identified campaign activity in the first half of the year involving the exploitation of internet-facing devices. Some of the most common exploitations involved Ivanti Connect Secure (CS) and Ivanti Policy Secure (PS) appliances, Palo Alto Network (PAN-OS) firewall devices, and Fortinet appliances. For example, Darktrace detected anomalous malicious activity on Palo Alto firewall devices as early as March 26th on customer networks, now recognized as evidence of PAN-OS exploitation, 17 days prior to public disclosure on April 12th.

In addition to vulnerabilities, Darktrace has also observed threat actors increasingly using stolen credentials to log into remote network access solutions like VPNs to gain initial access to networks. Following initial access, threat actors will use legitimate tools and processes already present on infected systems to achieve their goals while remaining undetected.

Many traditional tools struggle to identify and stop these attacks as differentiating between legitimate use by administrators and malicious use by attackers is challenging without an established baseline of normal user behavior. While often used by more sophisticated actors like Advanced Persistent Threats (APTs), smaller criminal enterprises also benefit from exploiting native tools, saving time and money by avoiding the need for custom malware development that might be blocked by traditional security tools once indicators of compromise (IoCs) are published.

“The combination of Cybercrime-as-a-Service, automation and AI are increasing the sophistication and diversity of attack techniques faster than ever – from AI-enhanced phishing campaigns to evolving ransomware strains,” said Nathaniel Jones, VP of Threat Research at Darktrace. “Detecting and responding to threats in progress is no longer sufficient. Organizations must prioritize cyber resilience by proactively addressing weaknesses across systems, people, and data before attackers can exploit them.”

Tags: DarktraceThreats
Share30Tweet19
SmartSolutionUser1

SmartSolutionUser1

Recommended For You

Calculus Partners with Aprecomm to Bring Next Generation AI-Powered Network Intelligence to ISPs Throughout MEA, Asia, and Latam

by SmartSolutions
December 5, 2025
0
Calculus Partners with Aprecomm to Bring Next Generation AI-Powered Network Intelligence to ISPs Throughout MEA, Asia, and Latam

Calculus, a global leader in advanced network innovation, announced a strategic partnership with Aprecomm, a leading provider of intuitive, self-healing network and customer experience solutions. The collaboration sees...

Read moreDetails

Tech Mahindra and DFKI Collaborate to Co-innovate and Co-create Smart Factory Solutions for German Enterprises

by SmartSolutions
November 19, 2025
0
Tech Mahindra and DFKI Collaborate to Co-innovate and Co-create Smart Factory Solutions for German Enterprises

Tech Mahindra, a leading global provider of technology consulting and digital solutions to enterprises across industries, and Deutsches Forschungszentrum für Künstliche Intelligenz GmbH (DFKI), German Research Center for...

Read moreDetails

GoPro Unveils MAX2, LIT HERO, and Fluid Pro AI Cameras in India

by SmartSolutions
November 13, 2025
0
GoPro Unveils MAX2, LIT HERO, and Fluid Pro AI Cameras in India

GoPro announced the availability of its three new cameras in the Indian market. MAX2 – the highly anticipated next-generation GoPro 360 camera featuring Emmy® Award-Winning 360 Technology for...

Read moreDetails

Delvitech closes a $40 million investment round, among the most significant Deep Tech investments in Switzerland

by SmartSolutions
November 12, 2025
0
Delvitech closes a $40 million investment round, among the most significant Deep Tech investments in Switzerland

Delvitech, a Deep Tech company specializing in the development of AI-native Automated Optical Inspection (AOI) solutions for electronics, successfully closed a Series B investment round of USD 40...

Read moreDetails

SAP and Snowflake Partner to Unlock Enterprise AI and Data Potential Through a Unified Business Data Fabric

by SmartSolutions
November 12, 2025
0
SAP and Snowflake Partner to Unlock Enterprise AI and Data Potential Through a Unified Business Data Fabric

Snowflake, the AI Data Cloud company, and SAP SE, a global leader in enterprise applications and business AI, announced a new collaboration to enable organizations to seamlessly leverage...

Read moreDetails
Next Post
Extreme Unveils Platform ONE For Managed Service Providers

Extreme Unveils Platform ONE For Managed Service Providers

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Vertiv Concludes AI Strategy & CXO Meet to Support India’s Next-Gen AI Infrastructure Growth

Vertiv Concludes AI Strategy & CXO Meet to Support India’s Next-Gen AI Infrastructure Growth

January 13, 2026
Verizon acquires Frontier in $20 bn deal to boost fiber network

Verizon acquires Frontier in $20 bn deal to boost fiber network

September 6, 2024
Zscaler Unveils Asset Exposure Management

Zscaler Unveils Asset Exposure Management

March 4, 2025

Browse by Category

  • Agora
  • AI
  • Article
  • AV Solutions
  • Business
  • Careers
  • Case Study
  • Cover Story
  • cyber security
  • EDU Solutions
  • Featured Article
  • Finance
  • Gartner
  • Global Academic
  • Health
  • Indian Government
  • Innovation
  • Interview
  • Interview
  • IT industry,
  • Jobs
  • Market
  • Networking
  • Nucleus Software
  • Open Ai
  • Politics
  • Products
  • Products Plus
  • projects
  • Security
  • SentinelOne®
  • Software
  • Solutions
  • Solutions Launch world
  • Solutions News World | Latest Tech & Innovation Updates
  • Startups
  • tech mahindra
  • Technology
  • Terafac Technologies
  • Uncategorized
Smart Solutions World

We bring you the best Premium news, magazine, personal blog, etc. Check our landing page for details.

CATEGORIES

  • Agora
  • AI
  • Article
  • AV Solutions
  • Business
  • Careers
  • Case Study
  • Cover Story
  • cyber security
  • EDU Solutions
  • Featured Article
  • Finance
  • Gartner
  • Global Academic
  • Health
  • Indian Government
  • Innovation
  • Interview
  • Interview
  • IT industry,
  • Jobs
  • Market
  • Networking
  • Nucleus Software
  • Open Ai
  • Politics
  • Products
  • Products Plus
  • projects
  • Security
  • SentinelOne®
  • Software
  • Solutions
  • Solutions Launch world
  • Solutions News World | Latest Tech & Innovation Updates
  • Startups
  • tech mahindra
  • Technology
  • Terafac Technologies
  • Uncategorized

BROWSE BY TAG

Acquisition Adobe Agentic AI AI AI-powered AMD automation Check Point Software Cloudflare CloudKeeper CrowdStrike Cybersecurity Databricks Fortinet Gartner GenAI Google Cloud Helium AI Hitachi Vantara Honeywell IBM Infosys Kaspersky Kramer LTIMindtree Microsoft NetApp New Relic NTT DATA Nvidia OpenAI Palo Alto Networks PPDS Qlik security ServiceNow smart solutions world smartsolutionsworld smart solutions world latest news Snowflake Software Tech Mahindra Technology Tenable Vertiv

© 2024 NCN - Premium news & magazine by NCN.

No Result
View All Result
  • Solutions Launch
  • Solutions News
  • Cover Story
  • Featured Article
  • Interview
  • Products Plus
  • Case stady
  • AV Solutions
    • Article
    • Interview
    • Products
    • Case Study
  • EDU Solutions
  • Solutions

© 2024 NCN - Premium news & magazine by NCN.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?