2022 Unit 42 Network Threat Trends
2022 Unit 42 Network Threat Trends
THREAT TRENDS
RESEARCH REPORT
NETWORK
THREAT
TRENDS
VOL. 1
RESEARCH
REPORT
Table of Contents
Foreword . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Vulnerability Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Vulnerability Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Geolocation Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Case Studies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Log4Shell: The Highest-Impact Cybersecurity Event of 2021 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Apache HTTP Server Path Traversal Vulnerability: Potential Top Hit for 2022 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Vulnerability Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Exploitation in the Wild . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Siloscape: First Known Malware Targeting Windows Containers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Appendix 1. Top 10 Exploited CVEs from 2021 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
N et wo r k T h re at Tre n d s R e s e a rc h R e p o r t, Vo l u m e 1 2
Foreword
Remote work has become the new normal for many, paving the way for employees to work from
anywhere in the world and essentially redefining network security for enterprises. With the perimeter
all but disappearing, the network threat landscape has expanded. This fundamentally shifts how we
approach network security in the era of modern threats. To effectively protect against the surge in
attacks, now using advanced obfuscation and encryption techniques to evade detection, organizations
need to understand the new threat landscape as well as proper mitigation tactics.
Threats have increased exponentially with no signs of slowing down. We witnessed millions of active
exploitation attempts in 2021 for Log4Shell alone, and the number of detections is still climbing.
Furthermore, threat actors are now using automation and as-a-service offerings, sophisticated tools,
and evasive tactics to bypass the security defenses many organizations have in place today. Using these
tools and approaches, often remote access Trojans (RATs) or variations of popular Red Team tools,
adversaries have improved the speed and success rate of attacks. These tools make it easier than ever
for attackers to create completely customizable command-and-control (C2) channels that cannot be
stopped with traditional approaches. As we know, C2 is late in the attack lifecycle after delivery and the
last opportunity for a network defender to stop a malicious actor before they pivot to actioning on their
objective, which can include delivering ransomware, expanding their footprint, gathering intel, or other
nefarious actions. This makes it critical for security teams to prevent malicious C2 at lightning speed.
In lieu of prevention, network security teams need to be able to quickly and accurately detect and
validate these sophisticated attacks. Analysis of potentially malicious threats entering the network
must also be done on real, live traffic to see and stop attacks as they’re happening, rather than
retroactively offline where they can hide. Additionally, automation and machine learning (ML) are key
capabilities to defeat the deluge of unknown and evasive threats in real time. Organizations need to also
look at protecting their networks holistically, not just from any one source, as there is no silver bullet
when it comes to preventing all threats from entering the network. Thus, it’s not only vital to continue
measuring the security in data centers and campuses, but also endpoints, IoT devices, and remote
network access as work from home remains our new normal.
Adversaries are continually innovating to bypass security defenses and successfully breach a network.
In order for organizations to keep pace with the overwhelming speed and proliferation of attacks,
they need to understand the current state of threats and vulnerabilities. This report provides insight
into the latest network threat trends, including newly observed attacks in the wild. We hope that this
report will provide a better understanding of the state of network security and improve protection for
your organization.
N et wo r k T h re at Tre n d s R e s e a rc h R e p o r t, Vo l u m e 1 3
Attacks Continue to Rise as Actors
Shift from Physical World to Digital
Network threats and attacks continued to increase in 2021, a year after the observed surge in
2020 when large volumes of workers switched to home or hybrid work. 2021 saw more than
11,000 newly published vulnerabilities; our analysis found that while there was a decline in new
vulnerabilities published from 2020, there was an increase in the use of Remote Code Execution
(RCE) and information disclosure vulnerabilities. The ratio of malware samples to benign files
also saw a large increase, nearly doubling from the previous 12 months, proving just how much
adversarial automation has evolved and the need to detect and ideally prevent unknowns has
heightened. Threat actors are becoming more sophisticated in other ways—the use of Red Team
tools has also increased to deliver sophisticated attacks designed to simulate an attack, and for
offensive security testing, these tools along with Remote Access Trojans (RATs) are being used
often by adversaries to successfully evade network security defenses. However, it's not just the
new. Some RCE vulnerabilities, like CVE-2017-9841 and CVE-2019-9082, had been reported
several years ago and were still found active and widely exploited in 2021.
In this report by our Unit 42 Threat Intelligence team, we provide insight into the newly reported
network vulnerabilities of 2021 and reveal the emerging advanced threats of 2022 and 2023 based
on observations in the wild. These critical insights help us understand how the network threat
landscape will evolve so we can provide security recommendations for organizations to protect
themselves and reduce risk. By reading this report, we hope organizations will be able to improve
their security posture and better defend against persistent threats, thereby mitigating risk,
lowering response times, and maximizing security investments.
Key Insights
• Overall CVEs decline slightly, but attacks increase significantly: 11,841 network-related
Common Vulnerabilities and Exposures (CVEs) deemed medium severity and above were
reported in 2021. This represents a slight decrease compared to previous years (13,123 in 2020),
with medium severity vulnerabilities being the most discovered vulnerabilities in 2021. However,
attacks themselves have increased 15% from 2020 to 2021, reaching an all-time high—3X more
than what we’ve observed prior to the uptick in remote work due to COVID-19. Fewer CVEs with a
greater number of attacks in 2021 heightens the need for patching and virtual patching.
• Log4Shell, the most impactful exploit: Of all the network attacks in 2021, Log4Shell (CVE-2021-
44228, CVE-2021-45046) was exploited the most due to the large user base of Apache Log4j
and its severe security impact. We’ve witnessed 11 million active exploitation attempts since
it first became known to the public, and the number of detections is still rising at the time of
publishing. Log4Shell also caused observed cases of critical severity exploits in the wild to triple
in December compared to the previous month. Other exploited CVEs topping the list include
older vulnerabilities and those targeting IoT, emphasizing the need to patch maintenance across
all devices, not just IT.
• Remote code execution is a favorite among adversaries: We observed 262 million network
exploit attempts in 2021—most targeting high-severity vulnerabilities. Remote code
execution is an attacker's favorite type of exploit, with around 75% of them targeting critical
vulnerabilities. This is not surprising. With a successful remote code execution, a threat actor
is often able to compromise and take over the target machine, yielding higher control and
accessibility within the victim's network.
• Malware is on the rise: 525 million malicious samples out of a total of 13.7 billion samples were
collected by WildFire in 2021, yielding roughly a 4% malicious ratio—almost double what was
observed in 2020. The data revealed that while the use of malicious PDF files has significantly
increased, Portable Executables (PEs) remain the most popular form of malware at 80% of all
malware observed.
N et wo r k T h re at Tre n d s R e s e a rc h R e p o r t, Vo l u m e 1 4
Overview of Network Vulnerabilities
in 2021
In this section, we will do a deep dive into publicly reported network vulnerabilities as well as those
being detected in the real world. In 2021, we collected more than 17,000 public vulnerability reports
from multiple sources, such as National Vulnerability Database (NVD), Zero Day Initiative (ZDI),
Exploit-DB, Metasploit, GitHub, Talos, and over 262 million malicious network sessions from Palo
Alto Networks Advanced Threat Prevention service, an Intrusion Prevention System (IPS) delivered
on ML-Powered Next-Generation Firewalls (physical, virtual, container), Prisma SASE, Google
IDS, Cloud NGFW for AWS, and OCI Network Firewall for Oracle. By looking at the distribution of
severity, vulnerability type, and real-world attack data, we were able to gain a better understanding
of the network vulnerability landscape in 2021. This provides valuable insights for organizations to
understand the current state of threats and how to improve their security posture to better protect
their networks.
Methodology
There are tons of vulnerabilities discovered every year. Usually, a vulnerability with a reasonable
amount of impact will be reported to a Common Vulnerabilities and Exposures (CVE) organization,
and a CVE number will be assigned to it. At the time of writing, our internal threat intelligence
system for collecting the latest vulnerability-related information from the official CVE database and
other popular cybersecurity sources such as NVD, ZDI, Exploit-DB, Metasploit, GitHub, MITRE CVE
Database, and more, has captured 17,546 vulnerabilities with a CVE assigned in 2021. To concentrate
on higher-impact vulnerabilities, this paper focuses on network-related vulnerabilities that have
a “medium,” “high,” or “critical” severity level and corresponding NVD Common Vulnerability
Scoring System (CVSS) scores. Thus, we removed all non-network and undefined vulnerabilities that
did not meet our requirements; the remaining 11,841 vulnerabilities were analyzed for this report.
Real-world attack data is captured by Palo Alto Networks Next-Generation Firewall (NGFW) from
different regions, including the United States, Singapore, Japan, Australia, Canada, European
locations, and others. The data includes attacks on a variety of industries such as universities,
hospitals, e-commerce vendors, finance, tech companies, and so on. This data contains 262 million
attack traffic sessions from 2021, excluding internal traffic. We only focus on medium-, high-, and
critical-severity attacks to align with the published vulnerabilities. By analyzing such a large dataset,
we can identify key network threat trends and provide analysis for the most significant and prevalent
live exploit attempts in the wild.
Vulnerability Analysis
The severity of a vulnerability could be evaluated through multiple lenses, such as the difficulty to
exploit the vulnerability, or the impact on a single victim once exploited. The weight of each aspect
could vary from organization to organization and from researcher to researcher. Thus, building
a severity evaluation system that works for everyone is not easy. Fortunately, there are some
algorithms that are commonly used in this industry. Among them, the CVSS is the most popular one.
In this paper, we use the base severity from CVSS 3.x when available. Usually, the higher the CVSS
score, the bigger impact the vulnerability can cause, and the more severe the vulnerability is. For
example, the Log4Shell (CVE-2021-44228 ) vulnerability, the most impactful of 2021, has the highest
CVSS score of 10.0.
N et wo r k T h re at Tre n d s R e s e a rc h R e p o r t, Vo l u m e 1 5
Of all vulnerabilities in 2021, 98.96% were classified as medium severity or above, meaning that
they can be harmful and relatively easily exploited, allowing a fast and simple path to command
and control (C2), followed by actioning objectives (like data collection, ransom, or other forms of
malicious intent). Figure 1 reveals the distribution of severity. Vulnerabilities with low severity have a
lower impact and are less likely to be assigned to a CVE number by vendors for tracking; therefore we
see fewer low severity CVE numbers.
CRITICAL
RATIO
17.7%
COUNT
2,096
MEDIUM PoC AVAILABILITY
RATIO 10.9%
43.1%
COUNT
5,104
PoC AVAILABILITY
8.1%
HIGH
RATIO
39.2%
COUNT
4,641
PoC AVAILABILITY
11.1%
It’s important to note that among the critical-severity vulnerabilities, 10.9% have public proof-of-
concept (PoC) availability. This means that threat actors have access to public knowledge on how to
exploit the vulnerability. Typically, these PoCs are shared prior to patch availability, which can leave
software and networks vulnerable to attack. This critical time should be a major focus for IPS solutions
that can then be aided by patch updates.
Due to the long process from discovering a vulnerability to its publication, some of the CVEs published
in 2021 may have first appeared in 2020. Similarly, a CVE that first appeared at the end of 2021 may
be published in early 2022.1 For these reasons, information about 2021 vulnerabilities captured by
our threat intelligence system spans the time period from the end of 2020 to January 2022, and is
distributed as shown in Figure 2. We can see that although the total number of CVEs of different
severities varies from month to month, they do share a similar monthly distribution. It is typical
for critical-severity CVEs to have the lowest number. Medium- and high-severity CVEs tend to be
published in similar numbers throughout the year. However, the ratio of real-world attacks is quite
different from the vulnerability distribution.
1. We captured the published CVEs on January 15, 2022, which might suggest an underestimation of the last few months in 2021, due to the publication delay
of CVEs that were reported late in 2021.
N et wo r k T h re at Tre n d s R e s e a rc h R e p o r t, Vo l u m e 1 6
Critical High Medium
600
400
200
0
Dec ‘20 Jan ‘21 Feb ‘21 Mar ‘21 Apr ‘21 May ‘21 Jun ‘21 Jul ‘21 Aug ‘21 Sep ‘21 Oct ‘21 Nov ‘21 Dec ‘21 Jan ‘22
Even though there are tens of thousands of vulnerabilities being reported every year, not all of
them are used by attackers in real-world attacks. There are many reasons for this: a PoC may not be
available for attackers to weaponize, it may be too difficult to exploit the vulnerability, there may be
a lack of accessible vulnerable software on the internet, or it may simply not be worth exploiting due
to low vulnerability impact. Here, we present the real-world attacks we observed in 2021, providing
insights into where threat actors focused their efforts.
If we compare the severity and distribution of the vulnerabilities reported to the exploits detected in
attack traffic, we see that attacks targeting critical vulnerabilities are around 1.5 times the number of
critical vulnerabilities being reported. Moreover, we see that in the reported CVEs, medium severity
takes the largest share with 43.1%, while in the live exploits, high-severity attacks are the most
commonly observed exploits, taking 40.3% of all attack volume. This suggests that attackers tend to
exploit vulnerabilities of high and critical severity, likely seeking the largest impact. In lieu of this,
organizations should focus on defending against these vulnerability types.
Furthermore, the severity distribution for published CVEs remains relatively steady month to month.
However, there was a sharp surge in critical attacks in December 2021 due to the Apache Log4j
vulnerability with critical exploit-in-the-wild cases tripling (3x) previous months, especially CVE-
2021-44228 and CVE-2021-45046 [11].
N et wo r k T h re at Tre n d s R e s e a rc h R e p o r t, Vo l u m e 1 7
Critical High Medium Total Attack Sessions
150,000
100,000
50,000
46.30%
40.27%
33.85% 34.57%
31.58% 31.55%
28.66% 28.18%
25.04%
0
2019 2020 2021
Looking at the yearly trends for exploit attempts observed in the wild, we noticed a surge in attack
volume over the years.2 With remote work being more prevalent from 2019, network attacks have
become more wide-spread and severe, increasing in volume by roughly 180% in 2020, and increasing
again by 15% in 2021. We want to note these correlations are based on CVE attacks and do not
represent other types of attacks such as phishing. For more information about how threat actors have
been using the pandemic to execute attacks, please refer to this Unit 42 blog.
Vulnerability Types
Vulnerability type allows us to classify and categorize a vulnerability for reporting and
may refer to the root cause of a vulnerability (stack buffer overflow or use-after-free),
the potential impact of a vulnerability (information disclosure or code injection), or
a common attack targeting a vulnerability (Denial of Service or SQL injection). In our
threat intelligence system, there is not only information about the vulnerability, such
as CVE and severity, but also descriptions, Common Weakness Enumeration (CWE), and
related news/blogs about the vulnerability. To assign vulnerability types, we analyze
Attacks have increased
15% from 2020 to 2021.
available CVE information, severity, CWE data, and related news/blogs, and pick the
most appropriate for each vulnerability.
The top three vulnerability types, noted below, represent 31.9% of all published CVEs in An all-time high,
2021. Figure 4 shows the most common vulnerability types:
3X more attacks were
• Cross-site scripting (XSS) is a type of vulnerability that injects malicious scripts into
observed than before the
otherwise trusted websites. This type of vulnerability is most commonly classified as
medium severity. transition to remote work.
2. In order to eliminate the effects of the customer count on the total attack sessions being observed, we divided the total number of attack sessions by the
customer count to calculate the total attack sessions per customer for this analysis.
N et wo r k T h re at Tre n d s R e s e a rc h R e p o r t, Vo l u m e 1 8
• Information disclosure vulnerabilities reveal sensitive information. Sensitive information could
include directory listings, server information, or file path disclosure. These vulnerabilities are
typically high or medium severity.
Traversal 364
Use-After-Free 220
The large number of XSS vulnerabilities published in 2021 could indicate that web-based software
is more vulnerable, more accessible, or more popular than other types of software. Other types of
vulnerabilities, such as buffer overflow, SQL injection, or remote code execution, tend to include a
greater number of high- and critical-severity CVEs. These types of vulnerabilities are usually more
challenging for researchers to discover and therefore less often reported.
We’d like to note that published vulnerabilities are simply identified and reported on for public
knowledge, whereas exploited vulnerabilities are actually detected in an attack and the two may not
correlate.
The top three exploited vulnerability types, noted below, represent 65.4% of all attacks in 2021.
Figure 5 shows the top 15 attack categories:
• Remote Code Execution allows threat actors to execute or inject malicious instructions on a
vulnerable system from a remote location. The impact of this type of vulnerability can range from
malware execution to full control of the system.
• Traversal, also known as Path Traversal or Directory Traversal, is a vulnerability that allows threat
actors to gain access to restricted directories and files outside of the root folder. This may expose
application code, data, and other sensitive information a threat actor could steal or use to their benefit.
• Information Disclosure occurs when an application or web service does not protect information
adequately and may expose sensitive data such as usernames, technical details, or infrastructure
to an unauthorized user. This type of vulnerability can be a starting point for threat actors since it
expands the attack surface and could be used to identify additional vulnerabilities.
Remote code execution, being the most exploited vulnerability, is not surprising because attackers
leverage RCE vulnerabilities to gain server control, execute malware, and escalate privileges.
Traversal and information disclosure followed closely behind, serving as exploits that help attackers
obtain sensitive information, such as user credentials, or aid in further attacks. It’s interesting to
note that cross-site scripting, despite being the top reported CVE for 2021, makes up less than 10% of
total attacks in the wild.
N et wo r k T h re at Tre n d s R e s e a rc h R e p o r t, Vo l u m e 1 9
Critical High Medium
Denial-of-Service 9.05
0 20 40 60 80
When we categorized each malicious session observed in attack traffic by vulnerability type and
vulnerability severity, we noticed that some specific CVEs are popular with attackers. Figure 6 lists
the top 10 vulnerabilities exploited by attacks in 2021. Refer to Appendix 1 for additional details.
Unsurprisingly, the Apache Log4j vulnerability was the most exploited vulnerability in 2021 with over 11
million attack sessions observed in less than one month. This equates to 4.2% of the total attack sessions,
showing Log4Shell’s unprecedented impact on internet security. Details can be found in section 3.1.
Another interesting thing we can see here is that old vulnerabilities are still widely and actively being
exploited with some having been disclosed as far back as 2017.
0 2 4 6 8 10 12
N et wo r k T h re at Tre n d s R e s e a rc h R e p o r t, Vo l u m e 1 10
We want to clarify that for “F5 TMUI/ForgeRock OpenAM”—the seventh most exploited
vulnerabilities in Figure 6 and Appendix 1—we combined CVE-2020-5902 and CVE-2021-35464 as
they were both logged due to the Apache path normalization issue [12] and therefore related. Others
that show two or more CVEs are similar in nature and target the same vendor. It’s important to note
that IPS vendors, such as Palo Alto Networks, can use a single threat prevention signature to detect
multiple, similar CVE attacks.
Geolocation Analysis
As part of our observation of attacks being exploited in the wild, we traced the geographic origin by
correlating the IP addresses of bad actors. It should be noted that sophisticated attackers will often
leverage proxy servers and VPNs located in other regions to hide their actual locations. Apart from
hiding true locations, much of the exploitation traffic originates from botnet compromised machines,
which include IoT devices and public cloud virtual machines.
We discovered that the largest number of attacks appear to originate from the United States, with
almost 68% of all attack traffic volume, followed by the Russian Federation (5.6%), Mainland China
(4.0%), and Germany (3.2%). Appendix 2 has the 14 identified countries with traffic volume over
0.8%. Assuming actors do obfuscate their location by using a local compromised server, it elevates
the importance of all organizations deploying network security to minimize the availability of
compromisable machines in which to launch an attack.
The heat map in Figure 7 represents each location's traffic volume with colors, as described in the legend.
RU
5.6%
DE
3.2%
IR
1.7%
U.S U.K
67.8% 1.3%
CN
4.0%
BR IN
1.4% 2.1%
AU
1.2%
N et wo r k T h re at Tre n d s R e s e a rc h R e p o r t, Vo l u m e 1 11
Vulnerability Types to Watch in 2022 and 2023
Secondary analysis of the malicious sessions observed in attack traffic was conducted to search for
insights to inform defenders of the up-and-coming vulnerabilities that may headline 2022 and early
2023. Appendix 3 lists the top 10 vulnerabilities to watch in this time period with links to existing
research and potential patches.
The methodology factored in the potential user base of a vulnerability, its severity, reliability of
PoCs, recent trajectory, and where there are local (requires prior access to a compromised system)
or remote vulnerabilities (can be exploited over a network). Notably are a couple RCE vulnerabilities
affecting Java, such as the System Information Library npm package for Node.js [CVE-2021-21315]
and within the Spring Framework [CVE-2022-22963, CVE-2022-22965], the authentication bypass
vulnerabilities affecting multiple sectors in Zoho ManageEngine ADSelfService Plus [CVE-2021-
40539], and others, including Apache and Microsoft, given their user base.
The hope is that early indicators and existing research of these vulnerabilities will prevent them from
topping the charts next year. Refer to Appendix 3 for more information.
Malware Families
The Palo Alto Networks threat research INFOSTEALER
team, Unit 42, is constantly surveying RANSOMWARE 2.1%
the threat landscape to identify new and 6.9% PUP
N et wo r k T h re at Tre n d s R e s e a rc h R e p o r t, Vo l u m e 1 12
Gator Adware
are still being used successfully by threat actors Xolxo
3.9%
today. Here is a full breakdown of the malware 4.7% Berbew
families and their uses: Sarodip
4.9% 22.9%
• Berbew (22.9%) is a trojan that is
Miras
capable of stealing passwords and
other sensitive information that is stored 5.1%
on an infected device.
VTBoss
• Sivis (16.4%) is a file infector that spreads 7.2%
by adding its malicious code to other
executable files.
• Vindor (15.0%) is a backdoor that allows Valla
attackers to capture keyboard input, 7.4% Sivis
2019
2020
2021
0 20 40 60 80 100
PE PE64 PDF DLL Android APK DLL64 ELF Zip Archive Android DEX Microsoft Word Document
N et wo r k T h re at Tre n d s R e s e a rc h R e p o r t, Vo l u m e 1 13
Windows is the most common operating system, currently boasting a total of 1.4
billion monthly active devices. Thus, it’s not surprising that Windows executable
WF
file formats are the preferred malware file type for threat actors to use.
One interesting observation is that the 64-bit malware PE64 is used by
adversaries significantly less than portable executables. This is largely due to the
backward compatibility of the 64-bit Windows platform, which makes it able
13.7 billion
to run 32-bit applications. Many threat actors won’t bother to develop 64-bit
malware while the old ones are still working. We can also see that PDF is taking Of
a larger share as a vehicle for malware delivery over the years. While a malicious samples collected by WildFire
PDF typically won’t hurt your device directly, it will try to entice viewers to click
embedded links that take them to external malicious sites, where attackers can
in 2021, roughly 4% (525 million)
attempt to steal login credentials or credit card information or deliver malware. were malicious—almost double what
This is also known as phishing [14]. Phishing attacks ramped up since hybrid was observed in 2020
work became popular, which could explain why PDF-related phishing attacks are
being used more by attackers.
6%
4%
2%
0%
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec
Figure 11: Ratio of malicious samples each month for the past three years
N et wo r k T h re at Tre n d s R e s e a rc h R e p o r t, Vo l u m e 1 14
Case Studies
In this section, we will present an in-depth analysis of several vulnerabilities that had the greatest
impact to organizations in the recent past. The first three provide insight to attacks that have had
the greatest impact in 2021 and are continuing to wreak havoc. Subsequent use cases outline the use
of command and control in attacks and illustrate the elevation of sophistication and evasion threat
actors use today.
The goal is for security teams to understand how these adversaries operate so they may optimize
security controls and improve security posture. Covered are Log4Shell, Apache HTTP Path Traversal
exploit attempts, Siloscape (a piece of malware targeting Windows containers), and lastly Encoded C2
and Cobalt Strike characteristics.
Vulnerability Analysis
A path traversal vulnerability exists when a URL or file path is not
correctly normalized before accessing the resource it identifies.
By including the special pattern dot-dot-slash (../) in a URL, a
web server with faulty path normalization can allow access to
sensitive resources. Most commonly, this type of vulnerability
allows for information disclosure. However, depending on the Figure 12: HTTP request to execute code
resources that can be accessed, it may be extended to enable remote
code execution. A simple example of this is when a path traversal
vulnerability is used to access a database containing login credentials so that an attacker can authenticate
themselves with administrative privileges. In the context of Apache HTTP servers, code execution is
possible when a vulnerable server is configured with the mod_cgi module enabled. This module normally
allows any binary file or script to be executed as long as it is contained within a certain path such as /
cgi-bin/. With a path traversal vulnerability, this restriction can be bypassed to execute any binary file or
script that is available on the server’s file system. Figure 12 has an example of a HTTP request.
N et wo r k T h re at Tre n d s R e s e a rc h R e p o r t, Vo l u m e 1 15
Vulnerabilities such as this one can be detrimental due to the large number of websites they may
affect. A survey by W3Techs [16] estimates that more than 30% of the public websites are running
using Apache HTTP server software.
The cryptocurrency miner is named PwnRig by its developers, and it is a modified version of the
legitimate open source mining software XMRig, see Figure 14.
N et wo r k T h re at Tre n d s R e s e a rc h R e p o r t, Vo l u m e 1 16
Encrypted and Encoded C2: Threat Actors Evading Security
Detections
Encrypted C2 Channels and Detection Methodologies
The C2 channel is being widely used by attackers to communicate with victim machines. Malware
performs various actions with C2 traffic such as leaking sensitive data from infected hosts, receiving
remote commands or downloading additional software to perform additional attack steps. Multiple
network protocols are used to transmit most C2 traffic, including HTTP, Secure Socket Layer (SSL) or
Transport Layer Security (TLS), Domain Name Service (DNS), Internet Control Message Protocol (ICMP),
as well as traffic that isn’t identified as coming from known applications, such as unknown-TCP and
unknown-UDP.
Commands that are sent through C2 packets from an attacker to an injected host can often appear
harmless. Such types of C2 traffic can be hard to identify with signatures, since signatures sensitive
enough to detect them might lead to a high number of false positives. Figure 16 shows an example of a
HTTP packet used for C2 communication that appears innocent, but actually delivers a command from
the attacker in the cookie value.
The transmitted data can be encoded, obfuscated, or encrypted. The C2 sample generated by the
PowerShell Empire post-exploitation tool shown in Figure 16 transmits certain information from an
infected host to a C2 server. Figure 17 is another C2 example generated by NJRat.
N et wo r k T h re at Tre n d s R e s e a rc h R e p o r t, Vo l u m e 1 17
Based on a preliminary study of malware using TLS, we observed that features in the initial
handshakes of TLS communications can be used to classify malware C2 sessions. For instance, 2.4%
of malware leverages DGA to compose the domain name (one example is highlighted in Figure 18)
in the SNI. However, only 0.09% of malware is observed in benign TLS sessions. This suggests that
DGA-generated SNI can be an effective indicator to detect malicious TLS C2 traffic.
We also observed many malware samples using untrusted certificates, which were either self-signed,
expired, or had some type of abnormal validation. For instance, as shown in Figure 19, Ursnif malware
composed an untrusted certificate for TLS communications that includes a self-signed certificate with
the common name of “*” and an extremely long validity of 10 years.
Furthermore, many malware TLS communications use insecure settings of TLS—50.7% of them use
TLS 1.1 and lower TLS versions, which are known to have security flaws. In contrast, only 2.3% of
benign TLS sessions are using TLS 1.1 and lower versions.
In our research, while static IPS signatures might have trouble detecting encrypted C2
communications, we see that C2 detections can be done reliably with appropriately trained models
acting on live traffic.
N et wo r k T h re at Tre n d s R e s e a rc h R e p o r t, Vo l u m e 1 18
numbers, HTTP headers, DNS subdomains,
and SMB pipe names. The flexibility of this
tool can make it challenging for traditional
pattern-based signatures to detect C2
communications.
Figure 20 and Figure 21 demonstrate a
profile that will disguise C2 traffic as
HTTP. When a Beacon first connects to its
controller, it sends metadata to identify itself
to the controller. This metadata is Base64-
encoded and embedded in the Cookie header
of an HTTP GET request. The URI path of
each request is randomly chosen from a
list of inconspicuous paths specified in the
profile. Concealing C2 communication as
ordinary HTTP requests can make it difficult
to distinguish from benign HTTP traffic that
originates from typical network activity such
as web browsing.
Figure 20: A malleable C2 profile
N et wo r k T h re at Tre n d s R e s e a rc h R e p o r t, Vo l u m e 1 19
Conclusion and Recommendations
In the cat-and-mouse game of network security, threat actors are constantly evolving by increasingly
using CVEs and advanced obfuscation and encryption techniques to disguise attacks and bypass
security defenses. Unfortunately even older, sometimes forgotten, vulnerabilities still play a role
in successful attacks, leaving no room for an error or gap in security defenses. It’s critical that
effective and innovative detection and prevention of malicious behaviors evolve to catch up. Our
recommendations, below, are a critical part of what organizations need to be doing.
N et wo r k T h re at Tre n d s R e s e a rc h R e p o r t, Vo l u m e 1 20
Implement Zero Trust
As hybrid workforces and cloud resources solidify themselves as the new reality, infrastructure can
now be anywhere and interconnected with everything, presenting an unfortunately easy opportunity
for cyber adversaries to exploit. By implementing a Zero Trust security strategy, which includes
network segmentation and access management, an organization can effectively prevent an attacker's
ability to move through a network. Goals of a Zero Trust deployment should be to implement controls
across the entire organization—on-premises, in the data center, and in cloud environments—to
maximize security efficacy and keep your organization safe. However, organizations must start
somewhere and opening a project to implement new policies for users, applications, or infrastructure
on one area of the estate will start the systematic adoption of this strategy.
References
[1] National Vulnerability Database (NVD). https://nvd.nist.gov/.
[2] Zero Day Initiative (ZDI). https://www.zerodayinitiative.com/.
[3] Exploit-DB. https://www.exploit-db.com/.
[4] Metasploit. https://www.metasploit.com/.
[5] GitHub. https://github.com/.
[6] Talos. https://talosintelligence.com/.
[7] MITRE CVE database. https://cve.mitre.org/.
[8] Common Vulnerability Scoring System (CVSS). https://www.first.org/cvss/specification-document.
[9] Palo Alto Networks Next-Generation Firewall (NGFW). https://www.paloaltonetworks.com/
network-security/next-generation-firewall.
[10] Palo Alto Networks Cortex Data Lake (CDL). https://www.paloaltonetworks.com/cortex/cortex-
data-lake.
[11] CVE-2021-44228. https://nvd.nist.gov/vuln/detail/CVE-2021-44228.
[12] Apache path normalization issue from Blackhat. https://i.blackhat.com/us-18/Wed-August-8/us-
18-Orange-Tsai-Breaking-Parser-Logic-Take-Your-Path-Normalization-Off-And-Pop-0days-
Out-2.pdf.
[13] Palo Alto Networks WildFire. https://www.paloaltonetworks.com/products/secure-the-network/
wildfire.
[14] 2020 Phishing Trends with PDF Files. https://unit42.paloaltonetworks.com/phishing-trends-
with-pdf-files/ by Ashkan Hosseini and Ashutosh Chitwadgi. Palo Alto Networks.
[15] Another Apache Log4j Vulnerability Is Actively Exploited in the Wild (CVE-2021-44228) (Updated
Dec. 28). https://unit42.paloaltonetworks.com/apache-log4j-vulnerability-cve-2021-44228/. Tao
Yan, Qi Deng, Haozhe Zhang, Yu Fu, Josh Grunzweig, Mike Harbison, and Robert Falcone. Palo Alto
Networks.
[16] Usage statistics of web servers. https://w3techs.com/technologies/overview/web_server. W3
survey.
[17] Siloscape: First Known Malware Targeting Windows Containers to Compromise Cloud
Environments. https://unit42.paloaltonetworks.com/siloscape/. Daniel Prizmant. Palo Alto
Networks.
N et wo r k T h re at Tre n d s R e s e a rc h R e p o r t, Vo l u m e 1 21
Appendix 1. Top 10 Exploited CVEs from 2021
Session First
Ranking CVE Number Name Severity Count Disclose Vulnerability Type
(Million) Date (UTC)
D-Link DCS-2530L
Unauthenticated
2 CVE-2020-25078 Information High 7.19 2020-09-02 Information Disclosure
Disclosure
Vulnerability
PHPUnit Remote
3 CVE-2017-9841 Code Execution Critical 6.11 2017-06-27 Remote Code Execution
Vulnerability
ThinkPHP Remote
4 CVE-2019-9082 Code Execution Critical 3.26 2018-12-10 Remote Code Execution
Vulnerability
Oracle WebLogic
CVE-2020-14882 Server Remote Critical 2020-10-20
5 2.85 Remote Code Execution
CVE-2020-14883 Code Execution High 2020-10-20
Vulnerability
Apache Struts
CVE-2017-5638 Content-Type Remote Critical 2017-03-07
6 2.12 Remote Code Execution
CVE-2019-0230 Code Execution Critical 2020-08-14
Vulnerability
F5 Traffic
Management User
CVE-2020-5902 Interface Remote Critical 2020-06-30
Code Execution
Vulnerability
7* 1.81 Remote Code Execution
ForgeRock
CVE-2021-35464 OpenAM Insecure Critical 2021-06-29
Deserialization
Vulnerability
D-Link Routers
CVE-2018-19986 Remote Command Critical 2019-05-13
8 1.73 Remote Code Execution
CVE-2019-19597 Execution High 2019-12-04
Vulnerability
Oracle WebLogic
CVE-2019-2725 wls9-async Remote Critical 2019-04-23
9 1.33 Remote Code Execution
CVE-2019-2729 Code Execution Critical 2019-06-19
Vulnerability
MobileIron Core and
CVE-2020-15505 Connector Remote Critical 2020-07-06
10 0.90 Remote Code Execution
CVE-2020-15506 Code Execution Critical 2020-07-06
Vulnerability
* We want to clarify that for the seventh most exploited CVE shown in this appendix, we combined
CVE-2020-5902 and CVE-2021-35464 because they were both logged due to the Apache path
normalization issue and mixed with each other. For other bars in the figure that show two or
more CVEs, we list these CVEs together because they are similar and target the same vendor.
Sometimes, we use a single threat prevention signature to detect multiple similar CVE attacks.
N et wo r k T h re at Tre n d s R e s e a rc h R e p o r t, Vo l u m e 1 22
Appendix 2. Geolocation Distribution of Attacks
OTHERS
AUSTRALIA
11.8%
1.2%
UNITED KINGDOM
1.3%
BRAZIL
1.4%
IRELAND
1.7%
INDIA
2.1%
GERMANY
3.2%
MAINLAND CHINA
4.0%
RUSSIAN FEDERATION
5.6%
UNITED STATES
67.8%
N et wo r k T h re at Tre n d s R e s e a rc h R e p o r t, Vo l u m e 1 23
Appendix 3. CVEs to Watch Out For in 2022 and 2023
Node.js Remote
3 CVE-2021-21315 Code Execution High Remote Code Execution
Vulnerability
Spring Cloud
CVE-2022-22963 SpEL Remote Critical
4 Remote Code Execution
CVE-2022-22965 Code Execution Critical
Vulnerability
ZOHO Corp
ManageEngine
5 CVE-2021-40539 Improper Critical Improper Authentication
Authentication
Vulnerability
Microsoft Open
Management
6 CVE-2021-38647 Infrastructure Remote Critical Remote Code Execution
Code Execution
Vulnerability
Microsoft Exchange
CVE-2021-34473 Server Remote Critical
7 Remote Code Execution
CVE-2021-26855 Code Execution Critical
Vulnerability
Apache HTTP Server
8 CVE-2021-40438 Server-Side Request Critical Server-Side Request Forgery
Forgery Vulnerability
Apache Struts
2 Remote Code
9 CVE-2021-31805 Critical Remote Code Execution
Execution
Vulnerability
F5 BIG-IP Remote
10 CVE-2021-22986 Code Execution Critical Remote Code Execution
Vulnerability
3000 Tannery Way © 2022 Palo Alto Networks, Inc. Palo Alto Networks is a registered
Santa Clara, CA 95054 trademark of Palo Alto Networks. A list of our trademarks can be found at
https://www.paloaltonetworks.com/company/trademarks.html. All other
Main: +1.408.753.4000 marks mentioned herein may be trademarks of their respective companies.
Sales: +1.866.320.4788 unit42_network-threat-research-report-vol1_071422
Support: +1.866.898.9087
www.paloaltonetworks.com