DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

Zscaler: Over 87% of Cyberthreats Hide in Encrypted Traffic

DigitalCIO Bureau by DigitalCIO Bureau
December 9, 2024
in Tech News
0
Zscaler: Over 87% of Cyberthreats Hide in Encrypted Traffic
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Zscaler has published its Zscaler ThreatLabz 2024 Encrypted Attacks Report, which explores the latest threats blocked by the Zscaler security cloud and provides critical insights into how encryption has become a conduit for more sophisticated threats, further compounded by the rise of artificial intelligence (AI). ThreatLabz found that over 87% of all threats were delivered over encrypted channels between October 2023 and September 2024—a 10% increase year-over-year. The report offers strategies and best practices to help organizations tackle these covert threats.

“The rise in encrypted attacks is a real concern as a significant share of threats are now delivered over HTTPS,” said Deepen Desai, Chief Security Officer, Zscaler. “With threat actors focused on exploiting encrypted channels to deliver advanced threats and exfiltrate data, organizations must implement a zero trust architecture with TLS/SSL inspection at scale. This approach helps to ensure that threats are detected and blocked effectively, while safeguarding data without compromising performance.”

Encrypted malware continues to dominate
Malware accounted for 86% of encrypted attacks, totaling 27.8 billion hits—a 19% year-over-year increase. Encrypted malware includes malicious web content, malware payloads, macro-based malware, etc. This growing prevalence of malware reflects a strategic shift by attackers adapting tactics to thrive within encrypted traffic, using encryption to conceal malicious payloads and content.

According to ThreatLabz researchers, the most active malware families were:

  • AsyncRAT
  • Choziosi Loader/ChromeLoader
  • AMOS/Atomic Stealer
  • Ducktail
  • Agent Tesla
  • Koi Loader

The report also details notable year-over-year increases in web-based attacks, including cryptomining/cryptojacking (123%), cross-site scripting (110%) and phishing (34%), among other encrypted threats—surges that could be potentially fueled by the growing use of generative AI technologies by threat actors.

Most targeted industry verticals
Manufacturing was the most-targeted industry, accounting for 42% of encrypted attacks—nearly three times more than the second-most targeted industry, technology and communications. Attacks on the manufacturing industry grew 44% year-over-year, likely driven by rapid industry 4.0 advancements and the extensive use of interconnected systems, which have expanded the attack surface and heightened manufacturers’ vulnerability to cyber threats.

The top five most targeted industries were:

  • Manufacturing
  • Technology and communications
  • Services
  • Education
  • Retail and wholesale

Countries that experience the most encrypted attacks
ThreatLabz found that the United States, India and France are the most frequently targeted nations by encrypted attacks. The U.S. and India are consistently the top two most frequently targeted, highlighting their significance as high-value targets for cybercriminals. The top five most targeted countries by encrypted attacks were:

  • United States – 11B
  • India – 5.4B
  • France – 854M
  • United Kingdom – 741M
  • Australia – 672M

Stopping encrypted attacks with zero trust
Understanding how zero trust disrupts encrypted threats requires looking at a typical attack sequence. Advanced attacks often unfold in four stages:

  1. First, attackers conduct reconnaissance to find a way into the targeted network.
  2. Next, they breach the network, often via exploits, brute-force attacks or stolen credentials.
  3. Once inside, they move laterally, escalate privileges and establish persistence.
  4. Finally, they carry out their objectives, typically conducting data exfiltration to extract valuable information that can be leveraged for further extortion or attacks.

The Zscaler Zero Trust Exchange platform provides security controls at each stage to mitigate risk and stop encrypted threats.

A key component of the Zscaler platform’s approach is its full TLS/SSL inspection capabilities, based on an advanced proxy architecture. Zscaler advises inspecting 100% of traffic to protect users and organizations from threats concealed within encrypted channels.

Organizations can bolster their ability to protect their devices, apps and data from encrypted attacks by following these recommendations:

  • Understand that any internet-facing service can be found and attacked or abused
  • Inspect incoming encrypted traffic to detect and block threats
  • Use a zero trust architecture to secure all connectivity holistically between users and applications, between devices like IoT and OT systems, between all locations and branch offices, between cloud workloads and more.
  • Implement microsegmentation to reduce access, even for authenticated users.
  • Leverage an AI-driven cloud sandbox to isolate and quarantine unknown attacks and stop patient-zero malware before it touches users.
  • Reduce the number of entry points into an environment.
  • Inspect outgoing northbound traffic along with incoming southbound traffic to disrupt C2 communications and protect sensitive data.

 

Tags: Zscaler
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Digital CIO Interview with Zithara’s co-founder Varun Kashyap

by DigitalCIO Bureau
June 23, 2025
0
Digital CIO Interview with Zithara’s co-founder Varun Kashyap

Varun Kashyap, co-founder, Zithara, discusses how AI is revolutionizing customer experience in retail and how Zithara's Customer Behaviour Platform (CBP) is empowering offline retailers to unlock customer insights...

Read moreDetails

Email Phishing Analysis: A SOC Analyst’s Guide to Spotting Suspicious Emails

by DigitalCIO Bureau
June 21, 2025
0
Email Phishing Analysis: A SOC Analyst’s Guide to Spotting Suspicious Emails

In the ever-evolving landscape of cyber threats, phishing emails remain one of the most persistent and damaging attack vectors faced by organizations globally. Disguised as legitimate communications -...

Read moreDetails

Half of Emails in Spam Mailboxes Were Generated By Email Scammers Through AI

by DigitalCIO Bureau
June 21, 2025
0
Attackers Misusing Email Inbox Rules

Email scammers are using artificial intelligence (AI) tools to create and launch mass spam campaigns rather than advanced targeted attacks, according to new research by the Universities of...

Read moreDetails

Freshworks Appoints Ian Tickle as Chief of Global Field Operations

by DigitalCIO Bureau
June 20, 2025
0
Freshworks Appoints Ian Tickle as Chief of Global Field Operations

Freshworks has announced the appointment of Ian Tickle as Chief of Global Field Operations (CGFO). Tickle, who has served in this capacity on an interim basis since April, while maintaining...

Read moreDetails

C-Suite misalignment over GenAI adoption

by DigitalCIO Bureau
June 20, 2025
0

NTT DATA has launched its new report, “The AI Security Balancing Act: From Risk to Innovation,” highlighting the opportunities and risks AI presents in cybersecurity. The findings show...

Read moreDetails
Next Post
Fortinet Gets Recognized By Gartner

70% of Organizations Say Their Employees Lack Fundamental Security Awareness

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Top Priority Technologies for the New Age CIOs

May 27, 2019
AMD Acquires Open-Source AI Software Expert Nod.ai

Zendesk Completes Acquisition of Klaus

February 14, 2024

92% of Indian software developers believe AI Agents to be as Essential As Traditional Software Tools

April 17, 2025

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Dell Technologies Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud HCLTech Honeywell IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope NTT DATA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos Tenable Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?