{"id":10706,"date":"2020-06-04T12:58:54","date_gmt":"2020-06-04T10:58:54","guid":{"rendered":"https:\/\/www.boc.de\/watchguard-info-portal\/?p=10706"},"modified":"2020-07-10T11:58:55","modified_gmt":"2020-07-10T09:58:55","slug":"threat-landscape-auswertung-mai-2020","status":"publish","type":"post","link":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/2020\/06\/threat-landscape-auswertung-mai-2020\/","title":{"rendered":"Threat Landscape Auswertung Mai 2020"},"content":{"rendered":"<p>WatchGuards Threat Lab ist eine Gruppe von Bedrohungsforschern, die sich mit der Analyse und Aufbereitung der letzten Malware- und Netzwerk-Attacken besch\u00e4ftigen. Sie greifen dabei auf die Daten zur\u00fcck, die sie vom WatchGuard Firebox Feed bekommen, aber auch aus internen und externen Threat Intelligences und einem Forschungs-Honeynet. Daraus werden Analysen und praktische Sicherheitshinweise \u00fcber die gr\u00f6\u00dften Gefahren und Bedrohungen abgeleitet.<br \/>\n<!--more--><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4963 alignnone\" src=\"https:\/\/www.boc.de\/watchguard-info-portal\/wp-content\/uploads\/2018\/09\/threat-landscape.png\" alt=\"WatchGuard Threat Landscape\" width=\"506\" height=\"96\" \/><\/p>\n<h5>Malware-Attacken:<\/h5>\n<p>Wie die <a href=\"https:\/\/www.secplicity.org\/threat-landscape\/?s=2020-05-01&amp;e=2020-05-31&amp;type=all&amp;region=amer+emea+apac\" target=\"_blank\" rel=\"noopener noreferrer\">Threat Landscape<\/a> von WatchGuard zeigt, wurden alleine im Monat Mai 2020 \u00fcber <strong>11,16 Millionen Malware-Attacken<\/strong> weltweit von den WatchGuard-L\u00f6sungen geblockt:<br \/>\n<div class=\"su-list\" style=\"margin-left:0px\">\n<ul>\n<li><i class=\"sui sui-chevron-circle-right\" style=\"color:#333\"><\/i> t\u00e4glich 360.063 geblockte Angriffe<\/li>\n<li><i class=\"sui sui-chevron-circle-right\" style=\"color:#333\"><\/i> 58,68% aller von WatchGuard geblockten Attacken in EMEA<\/li>\n<li><i class=\"sui sui-chevron-circle-right\" style=\"color:#333\"><\/i> alleine in Deutschland \u00fcber 591.445 geblockte Angriffe<\/li>\n<\/ul>\n<\/div>\nVon den \u00fcber 11,16 Millionen geblockten Malware-Attacken waren 63% Zero-Day Malware. Da diese Attacken nicht von dem Gateway Antivirus erkannt werden, empfehlen wir als zus\u00e4tzliche Sicherheitsschicht den <a href=\"https:\/\/www.boc.de\/watchguard-info-portal\/produktinfos\/watchguard-security-services-und-suites\/watchguard-apt-blocker\/\" target=\"_blank\" rel=\"noopener noreferrer\">APT Blocker<\/a>,\u00a0<a href=\"https:\/\/www.boc.de\/watchguard-info-portal\/produktinfos\/watchguard-security-services-und-suites\/watchguard-threat-detection-and-response\/\" target=\"_blank\" rel=\"noopener noreferrer\">Threat Detection and Response (TDR)<\/a>\u00a0sowie\u00a0<a href=\"https:\/\/www.boc.de\/watchguard-info-portal\/produktinfos\/watchguard-security-services-und-suites\/watchguard-intelligentav\/\" target=\"_blank\" rel=\"noopener noreferrer\">IntelligentAV<\/a>\u00a0zu aktivieren. Alle drei Services sind in der Total Security Suite enthalten. Sollten Sie noch keine Lizenz f\u00fcr die Total Security Suite erworben haben, empfehlen wir Ihnen auf diese zu upgraden. Eine \u00dcbersicht der von WatchGuard angebotenen Suiten und den dazugeh\u00f6rigen Services finden Sie in unserem Infoportal unter\u00a0<a href=\"https:\/\/www.boc.de\/watchguard-info-portal\/produktinfos\/watchguard-security-services-und-suites\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security Services und Suites<\/a>\u00a0und <a href=\"https:\/\/www.boc.de\/watchguard-info-portal\/vertriebsinfos\/basic-security-suite-vs-total-security-suite\/\" target=\"_blank\" rel=\"noopener noreferrer\">Basic Security Suite vs. Total Security Suite<\/a>.<\/p>\n<h5>Netzwerk-Attacken:<\/h5>\n<p>Neben den Malware-Attacken wurden im Mai 2020 auch \u00fcber <strong>651.780 Netzwerkangriffe<\/strong> von WatchGuard Firebox Appliances blockiert:<br \/>\n<div class=\"su-list\" style=\"margin-left:0px\">\n<ul>\n<li><i class=\"sui sui-chevron-circle-right\" style=\"color:#333\"><\/i> t\u00e4glich 21.025 geblockte Angriffe<\/li>\n<li><i class=\"sui sui-chevron-circle-right\" style=\"color:#333\"><\/i> 39,95% aller von WatchGuard geblockten Attacken in EMEA<\/li>\n<li><i class=\"sui sui-chevron-circle-right\" style=\"color:#333\"><\/i> alleine in Deutschland 111.071 geblockte Angriffe<\/li>\n<\/ul>\n<\/div>\n<p><!--more--><\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Top 10 Malware-Angriffe<\/strong><\/td>\n<td width=\"50%\"><strong>Top 10 Netzwerk-Angriffe<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"col-sm-9 topTenLabel\">JS:Trojan.Gnaeus.G<\/div>\n<\/td>\n<td><a href=\"https:\/\/www.watchguard.com\/SecurityPortal\/ThreatDetail.aspx?rule_id=1059764\" target=\"_blank\" rel=\"noopener noreferrer\">WEB URI Handler Buffer Overflow &#8211; GET -3<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">JS:Trojan.Gnaeus.F<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<td><a href=\"https:\/\/www.watchguard.com\/SecurityPortal\/ThreatDetail.aspx?rule_id=1059160\" target=\"_blank\" rel=\"noopener noreferrer\">WEB SQL injection attempt -33<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">XLM.Trojan.Abracadabra.1.Gen<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<td><a href=\"https:\/\/www.watchguard.com\/SecurityPortal\/ThreatDetail.aspx?rule_id=1133407\" target=\"_blank\" rel=\"noopener noreferrer\">WEB Brute Force Login -1.1021<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">Win32\/Heim.D<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<td><a href=\"https:\/\/www.watchguard.com\/SecurityPortal\/ThreatDetail.aspx?rule_id=1133451\" target=\"_blank\" rel=\"noopener noreferrer\">WEB Cross-site Scripting -36<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">Win32\/Heri<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<td><a href=\"https:\/\/www.watchguard.com\/SecurityPortal\/ThreatDetail.aspx?rule_id=1130065\" target=\"_blank\" rel=\"noopener noreferrer\">RPC Drupal Core XML-RPC Endpoint xmlrpc.php Tags Denial of Service -1 (CVE-2014-5266)<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">Gen:Variant.Application.Graftor.291176<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<td><a href=\"https:\/\/www.watchguard.com\/SecurityPortal\/ThreatDetail.aspx?rule_id=1054837\" target=\"_blank\" rel=\"noopener noreferrer\">WEB Remote File Inclusion \/etc\/passwd<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">Exploit.CVE-2017-11882.Gen<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<td><a href=\"https:\/\/www.watchguard.com\/SecurityPortal\/ThreatDetail.aspx?rule_id=1133738\" target=\"_blank\" rel=\"noopener noreferrer\">WEB Windows Powershell Remote Command Injection -1 (CVE-2013-3763)<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">malicious<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<td><a href=\"https:\/\/www.watchguard.com\/SecurityPortal\/ThreatDetail.aspx?rule_id=1049802\" target=\"_blank\" rel=\"noopener noreferrer\">WEB Directory Traversal -4<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">JS:Trojan.Cryxos.2657<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<td><a href=\"https:\/\/www.watchguard.com\/SecurityPortal\/ThreatDetail.aspx?rule_id=1055396\" target=\"_blank\" rel=\"noopener noreferrer\">WEB Cross-site Scripting -9<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">\n<div class=\"col-sm-9 topTenLabel\">Gen:Variant.Razy.553929<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<td><a href=\"https:\/\/www.watchguard.com\/SecurityPortal\/ThreatDetail.aspx?rule_id=1056247\" target=\"_blank\" rel=\"noopener noreferrer\">SHELLCODE NOP Sled<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Weitere Informationen finden Sie in dem neuesten <a href=\"https:\/\/www.boc.de\/watchguard-info-portal\/2020\/05\/internet-security-report-q4-2019\/\" target=\"_blank\" rel=\"noopener noreferrer\">Internet Security Report Q4 2019<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>WatchGuards Threat Lab ist eine Gruppe von Bedrohungsforschern, die sich mit der Analyse und Aufbereitung der letzten Malware- und Netzwerk-Attacken besch\u00e4ftigen. Sie greifen dabei auf die Daten zur\u00fcck, die sie vom WatchGuard Firebox Feed bekommen, aber auch aus internen und externen Threat Intelligences und einem Forschungs-Honeynet. Daraus werden Analysen und praktische Sicherheitshinweise \u00fcber die gr\u00f6\u00dften Gefahren und Bedrohungen abgeleitet.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[445],"tags":[472],"class_list":["post-10706","post","type-post","status-publish","format-standard","hentry","category-aktuelle-nachrichten","tag-threat-landscape"],"_links":{"self":[{"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/posts\/10706"}],"collection":[{"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/comments?post=10706"}],"version-history":[{"count":3,"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/posts\/10706\/revisions"}],"predecessor-version":[{"id":10878,"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/posts\/10706\/revisions\/10878"}],"wp:attachment":[{"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/media?parent=10706"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/categories?post=10706"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/tags?post=10706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}