Trend Micro Report Reveals Malicious URL Attacks Prevalent in PH, 160 Billion Cyber Threats Blocked in 2023 Worldwide

Global ransomware detections fell 14% as alternative attack strategies evolved. In PH, malicious URL attacks were prevalent but recorded great decline

  • More than 76 million malicious URLs were accessed in the Philippines last year
  • Global ransomware detections fell 14% as alternative attack strategies evolved, yet an increase in incidents was seen in Southeast Asia

Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, revealed a 10% annual increase in total threats blocked in 2023, as detailed in its latest report, Calibrating Expansion: Annual Cybersecurity Threat Report. The report warns that attackers are using more advanced methods to target fewer victims with the potential for higher financial gains.

Ian Felipe, Trend Micro Philippines Country Manager: “We’re blocking more threats than ever before for our customers. However, adversaries showed a variety and sophistication of tactics, techniques, and procedures (TTPs) in their attacks, especially in defense evasion. As our report demonstrates, network defenders must continue to proactively manage risk across the entire attack surface today. Understanding the strategies favored by our adversaries is the foundation of effective defense.”

Trend Micro blocked 161 billion threats overall in 2023, compared to 82 billion threats five years ago. Some of the key global findings include: 

  • Email malware detection surged by 349% year-on-year (YoY), while malicious phishing URL detections declined by 27% YoY — suggesting a trend for more using malicious attachments rather than links directly included in emails
  • Business email compromise (BEC) detections increased 16% YoY
  • Ransomware detections dropped 14%, however, there was a 35% increase in threats blocked under Trend Micro’s File Reputation Services (FRS)

These findings suggest that firstly, threat actors are becoming more prudent about selecting their targets, and secondly, becoming more skilled in bypassing early detection layers. In the case of malicious emails, for instance, instead of launching large-scale attacks that rely on victims clicking on malicious links in websites and emails, cybercriminals are targeting a smaller pool of higher-profile victims with more sophisticated attacks. This approach helps them evade network and email filters, which could explain the surge in file detections at endpoints.


Similarly, in the case of ransomware, the increase in FRS detections suggests that threat actors are getting better at evading primary detection via techniques such as Bring Your Own Vulnerable Driver (BYOVD) and zero-day exploits, among others. 

The report also illuminated threat developments in Southeast Asia in 2023. While Southeast Asia saw an overall increase in ransomware detections, making up more than half (52%) of the global number, this was largely attributed to significant detections within Thailand. Other markets such as Indonesia, Malaysia, Singapore, and the Philippines saw a decline in ransomware detections, similar to the overall global trend. In the Philippines, the number of ransomware detections fell by 93%.

The report also delved into the Philippine threat landscape in 2023, which revealed that the government was largely targeted in Advanced Persistent Threat (APT) campaigns. Specifically, the report exposed that adversary groups Earth Estries (active from January 2023 to present) and Mustang Panda (active from August 2023 to present) have been targeting local government organizations. 

Earth Estries is known to deploy cyberespionage campaigns and use multiple backdoors and hacking tools, while Mustang Panda utilizes components of legitimate software for Dynamic Link Library (DLL) sideloading to gather user information.

Looking at other threats studied, malicious URLs being accessed in the Philippines remain prevalent. Despite a 20% decline, detections remained high, totaling over 76 million. A similar trend is seen for other threats, with a high number of detections despite a YoY decline. These include email threats (27%), and botnet victims (27%). Meanwhile, malware detections increased by 12%. 

In light of these findings, Trend Micro advises network defenders to:

  • Work with trusted security vendors with a cybersecurity platform approach to ensure resources are not only secured but also continuously monitored for new vulnerabilities.
  • Prioritize SOC efficiency by monitoring cloud applications carefully as they become more closely integrated into day-to-day operations. 
  • Ensure all the latest patches/upgrades are applied to operating systems and applications.
  • Utilize comprehensive security protocols to safeguard against vulnerabilities, tighten configuration settings, control application access, and enhance account and device security. Look to detect ransomware attacks earlier in the attack lifecycle by shifting left in defenses during initial access, lateral movement, or data exfiltration stages.

No comments

Post a Comment