throbber
@ ETL2018
`
`m
`
`m
`
`=
`wD @
`
`2)
`Cc
`wm
`如
`m
`之
`一
`
`THREAT
`
`LANDSCAPE
`
`之
`
`ENISA Threat Landscape Report 2018
`15 Top Cyberthreats and Trends
`
`FINAL VERSION
`
`1.0
`
`ETL 2018
`
`JANUARY 2019
`
`www.enisa.europa.eu
`
`European Union Agency For Network and Information Security
`Fl
`WIZ, Inc. EXHIBIT - 1026
`WIZ, Inc. v. Orca Security LTD. - IPR2024-00220
`
`
`| ly
`
`WIZ, Inc. EXHIBIT - 1026
`WIZ, Inc. v. Orca Security LTD.
`
`

`

`*
`
`enisa
`
`About ENISA
`
`ENISA Threat Landscape Report 2018
`ETL 2018 |
`1.0
`|
`External
`| January 2019
`
`
`
`The European Union Agency for Network and Information Security (ENISA) is a centre of network and
`information security expertise for the EU, its member states, the private sector and Europe’s citizens. ENISA
`works with these groups to develop advice and recommendations on good practice in information security. It
`assists EU member states in implementing relevant EU legislation and works to improve the resilience of
`Europe’s critical information infrastructure and networks. ENISA seeks to enhance existing expertise in EU
`member states by supporting the development of cross-border communities committed to improving network
`
`and information security throughout the EU. More information about ENISA and its work can be found at
`www.enisa.europa.eu.
`
`Contributors
`Andreas Sfakianakis, Christos Douligeris, Louis Marinos (ENISA), Marco Lourenco (ENISA), and Omid Raghimi.
`
`Editors
`Louis Marinos (ENISA) and Marco Lourengo (ENISA).
`
`Contact
`For queries on this paper, please use enisa.threat.information@enisa.europa.eu
`For media enquiries about this paper, please use press@enisa.europa.eu.
`
`Acknowledgements
`ENISA would like to thank the members of the ENISA ETL Stakeholder group: Pierluigi Paganini, Chief Security
`Information Officer, IT, Paul Samwel, Banking, NL, Jason Finlayson, Consulting, IR, Stavros Lingris, CERT-EU, Jart
`Armin, Worldwide coalitions/Initiatives, International, Thomas Haberlen, Member State, DE, Neil Thacker,
`Consulting, UK, Shin Adachi, Security Analyst, US, R. Jane Ginn, Consulting, US, Andreas Sfakianakis, Industry, NL,
`Thomas Hemker, Industry, DE. The group has provided valuable input, has supported the ENISA threat analysis and
`has reviewed ENISA material. Their support is highly appreciated and has definitely contributed to the quality of the
`material presented in this report. Moreover, we would like to thank CYjAX for granting access pro bono to its cyber
`risk intelligence portal providing information on cyberthreats and cyber-crime.
`
`Legal notice
`Notice must be taken that this publication represents the views and interpretations of ENISA, unless stated
`otherwise. This publication should not be construed to be a legal action of ENISA or the ENISA bodies unless
`adopted pursuant to the Regulation (EU) No 526/2013. This publication does not necessarily represent state-of
`the-art and ENISA may update it from time to time.
`
`Third-party sources are quoted as appropriate. ENISA is not responsible for the content of the external sources
`including external websites referenced in this publication.
`
`This publication is intended for information purposes only. It must be accessible free of charge. Neither
`ENISA nor any person acting on its behalf is responsible for the use that might be made of the information
`contained in this publication.
`
`Copyright Notice
`© European Union Agency for Network and Information Security (ENISA), 2019
`Reproduction is authorised provided the source is acknowledged.
`
`ISBN 978-92-9204-286-8, ISSN 2363-3050, DOI 10.2824/622757
`
`02
`
`

`

`*
`
`*
`
`了 enisa
`
`ENISA Threat Landscape Report 2018
`ETL 2018 |
`1.0
`|
`External
`| January 2019
`
`*
`
`x
`
`*
`
`*
`
`Table of Contents
`
`
`
`1.
`
`Introduction
`
`1.1
`
`Policy context
`
`1.2
`
`Target audience
`
`1.3
`
`Structure of the document
`
`2.
`
`Cyberthreat Intelligence and ETL
`
`2.1 Cyberthreat Intelligence: State of Play
`
`2.2
`
`Cyberthreat Intelligence Maturity Model
`
`3.
`
`Top Cyberthreats
`
`3.1 Malware
`
`321.1
`3.1.2
`3.1.3
`3.1.4
`31:5
`3.1.6
`31.7
`3.1.8
`
`Description of the cyberthreat
`Interesting points
`Trends and main statistics
`Top malware families by type
`Specific attack vectors
`Specific mitigation actions
`Kill Chain
`Authoritative references
`
`3.2 Web Based Attacks
`
`3.2.1
`3.2.2
`3:2;3
`3.2.4
`3.2.5
`3.2.6
`3.2.7
`
`Description of the cyberthreat
`Interesting points
`Trends and main statistics
`Specific attack vectors
`Specific mitigation actions
`Kill Chain
`Authoritative references
`
`3.3 Web Application Attacks
`
`3.3.1
`3.3.2
`3.3.3
`3.3.4
`3.3.5
`3.3.6
`3.3.7
`
`Description of the cyberthreat
`Interesting points
`Trends and main statistics
`Top Web Application Attacks
`Specific mitigation actions
`Kill Chain
`Authoritative references
`
`3.4
`
`Phishing
`
`3.4.1
`3.4.2
`3.4.3
`3.4.4
`3.4.5
`
`Description of the cyberthreat
`Interesting points
`Trends and main statistics
`Top Phishing Themes
`Specific mitigation actions
`
`10
`
`11
`
`12
`
`13
`
`14
`
`14
`
`18
`
`24
`
`26
`
`26
`26
`29
`30
`31
`3
`32
`32
`
`33
`
`33
`33
`34
`35
`36
`36
`36
`
`37
`
`37
`37
`38
`39
`39
`40
`40
`
`40
`
`40
`40
`43
`44
`45
`
`03
`
`

`

`*
`
`*
`
`了 enisa
`
`3.4.6
`3.4.7
`
`Kill Chain
`
`Authoritative references
`
`3.5
`
`Denial of Service
`
`3.5.1
`35:2
`3.5.3
`3.5.4
`3.5.5
`3.5.6
`3.5.7
`3.5.8
`
`Description of the cyberthreat
`Interesting points
`Trends and main statistics
`Top 5 DDoS attacks
`Specific attack vectors
`Specific mitigation actions
`Kill Chain
`Authoritative references
`
`3.6 Spam
`
`3.6.1
`3.6.2
`3.6.3
`3.6.4
`3.6.5
`3.6.6
`3.6.7
`
`Description of the cyberthreat
`Interesting points
`Trends and main statistics
`Top Spam sources
`Specific mitigation actions
`Kill Chain
`Authoritative references
`
`3.7
`
`Botnets
`
`3.7.1
`
`3.7.2
`
`3.7.3
`
`3.7.4
`
`3.7.5
`
`3.7.6
`
`3.7.7
`
`3.7.8
`
`Description of the cyberthreat
`Interesting points
`Trends and main statistics
`Top Botnet Attacks
`Specific attack vectors
`Specific mitigation actions
`Kill Chain
`Authoritative references
`
`3.8
`
`Data Breaches
`
`3.8.1
`3.8.2
`3.8.3
`3.8.4
`3.8.5
`3.8.6
`3.8.7
`3.8.8
`
`Description of the cyberthreat
`Interesting points
`Trends and main statistics
`Top Data Breaches
`Specific attack vectors
`Specific mitigation actions
`Kill Chain
`Authoritative references
`
`3.9
`
`Insider threat
`
`3.9.1
`3.9.2
`3.9.3
`3.9.4
`3.9.5
`3.9.6
`3.9.7
`3.9.8
`
`Description of the cyberthreat
`Interesting points
`Trends and main statistics
`Top IT and other assets vulnerable to insider attacks
`Specific attack vectors
`Specific mitigation actions
`Kill Chain
`Authoritative references
`
`ENISA Threat Landscape Report 2018
`ETL 2018 |
`1.0
`|
`External
`| January 2019
`
`46
`46
`
`47
`
`47
`47
`49
`51
`51
`52
`53
`53
`
`54
`
`54
`54
`56
`57
`57
`58
`58
`
`59
`
`59
`59
`61
`62
`62
`62
`63
`63
`
`64
`
`64
`64
`65
`66
`67
`67
`68
`68
`
`69
`
`69
`69
`69
`70
`71
`72
`73
`73
`
`04
`
`

`

`*
`
`*
`
`了 enisa
`
`3.10 Physical manipulation/damage/theft/loss
`
`3.10.1
`3.10.2
`3.10.3
`3.10.4
`3:10:5
`3.10.6
`
`Description of the cyberthreat
`Interesting points
`Trends and main statistics
`Specific mitigation actions
`Kill Chain
`Authoritative references
`
`3.11 Information Leakage
`
`3.11.1
`3.71.2
`3221.3
`3.11.4
`3711.5
`3.11.6
`3.11.7
`3.11.8
`
`Description of the cyberthreat
`
`Interesting points
`Trends and main statistics
`Top data leaks incidents
`Specific attack vectors
`Specific mitigation actions
`Kill Chain
`Authoritative references
`
`3.12 Identity Theft
`
`3.12)1
`3212.2
`3.12.3
`3.12.4
`3.12.5
`3.12.6
`3.12.7
`3.12.8
`
`Description of the cyberthreat
`Interesting points
`Trends and main statistics
`Top identity theft threats
`Specific attack vectors
`Specific mitigation actions
`Kill Chain
`Authoritative references
`
`3.13 Cryptojacking
`
`3.13.1
`3.13.2
`3.13.3
`3.13.4
`3.13.5
`3.13.6
`3.13.7
`3.13.8
`
`Description of the cyberthreat
`Interesting points
`Trends and main statistics
`Top 5 cryptojacking threats
`Specific attack vectors
`Specific mitigation actions
`Kill Chain
`Authoritative references
`
`3.14 Ransomware
`
`3.14.1
`3.14.2
`3.14.3
`3.14.4
`3.14.5
`3.14.6
`3.14.7
`3.14.8
`
`Description of the cybe-threat
`Interesting points
`Trends and main statistics
`Top ransomware threats
`Specific attack vectors
`Specific mitigation actions
`Kill Chain
`Authoritative references
`
`3.15 Cyber Espionage
`
`3315.1
`3.15.2
`
`Description of the cyberthreat
`Interesting points
`
`ENISA Threat Landscape Report 2018
`ETL 2018 |
`1.0
`|
`External
`| January 2019
`
`74
`
`74
`74
`76
`WT
`77
`78
`
`79
`
`79
`80
`81
`82
`83
`83
`84
`84
`
`85
`
`85
`86
`87
`88
`89
`90
`91
`91
`
`92
`
`92
`92
`96
`97
`97
`99
`99
`99
`
`100
`
`100
`100
`101
`103
`105
`105
`106
`106
`
`107
`
`107
`107
`
`os
`
`

`

`3415:3
`3.15.4
`3:15:35
`3.15.6
`3.15.7
`3.15.8
`
`Trends and main statistics
`Top cyberespionage attacks
`Specific attack vectors
`Specific mitigation actions
`Kill Chain
`Authoritative references
`
`3.16 Visualising changes in the current threat landscape
`
`4.
`
`Threat Agents
`
`4.1
`
`Threat agents and trends
`
`4.2
`
`Top threat agents and motives
`
`4.3
`
`Threat Agents and top threats
`
`5.
`
`Attack Vectors
`
`5.1
`
`Attack vectors taxonomy for this year’s threat landscape
`
`5.2
`
`Misinformation/Disinformation
`
`5.3
`
`Web and browser based attack vectors
`
`5.4
`
`Fileless or memory-based attacks
`
`5.5
`
`Multi-staged and modular threats
`
`6.
`
`Conclusions
`
`6.1
`
`Main CTl-related cyber-issues ahead
`
`6.2
`
`Conclusions and recommendations for this year’s ETL report.
`
`ENISA Threat Landscape Report 2018
`ETL 2018 |
`1.0
`|
`External
`| January 2019
`
`109
`110
`113
`113
`113
`114
`
`115
`
`116
`
`116
`
`118
`
`123
`
`125
`
`125
`
`126
`
`128
`
`129
`
`130
`
`133
`
`133
`
`136
`
`06
`
`

`

`*
`enisa
`
`*
`
`ENISA Threat Landscape Report 2018
`ETL 2018 |
`1.0 | External
`| January 2019
`
`Executive Summary
`
`
`2018 was a year that has brought significant changes in the cyberthreat landscape. Those changes had as
`source discrete developments in motives and tactics of the most important threat agent groups, namely
`cyber-criminals and state-sponsored actors. Monetization motives have contributed to the appearance of
`crypto-miners in the top 15 threats. State-sponsored activities have led to the assumption that there is a
`shift towards reducing the use of complex malicious software and infrastructures and going towards low
`profile social engineering attacks. These developments are the subject of this threat landscape report.
`
`Developments have been achieved from the side of defenders too. Through the emergence of active
`defence, threat agent profiling has led to a more efficient identification of attack practices and malicious
`artefacts, leading thus to more efficient defence techniques and attribution rates. Initial successes
`through the combination of cyberthreat intelligence (CTI) and traditional intelligence have been achieved.
`This is a clear indication about the need to open cyberthreat intelligence to other related disciplines with
`the aim to increase quality of assessments and attribution. Finally, defenders have increased the levels of
`training to compensate skill shortage in the area of cyberthreat intelligence. The vivid interest of
`stakeholders in such trainings is a clear indicator for their appetite in building capabilities and skills.
`
`Recent political activities have underlined the emergence of various, quite novel developments in the
`perceived role of cyberspace for society and national security. Cyber-diplomacy, cyber-defence and cyber-
`war regulation have dominated the headlines. These developments, when transposed to actions, are
`expected to bring new requirements and new use cases for cyberthreat intelligence. Equally, through
`these developments, existing structures and processes in the area of cyberspace governance will undergo
`a considerable revision. These changes will affect international, European and Member States bodies. It is
`expected that threat actors are going to adapt their activities towards these changes, affecting thus the
`cyberthreat landscape in the years to come.
`
`In summary, the main trends in the 2018’s cyberthreat landscape are:
`
`e
`
`e
`
`‧
`
`e
`
`e
`
`e
`
`e
`
`e
`
`e
`
`Mail and phishing messages have become the primary malware infection vector.
`
`Exploit Kits have lost their importance in the cyberthreat landscape.
`
`Cryptominers have become an important monetization vector for cyber-criminals.
`
`State-sponsored agents increasingly target banks by using attack-vectors utilised in cyber-crime.
`
`= Skill and capability building are the main focus of defenders. Public organisations struggle with staff
`retention due to strong competition with industry in attracting cybersecurity talents.
`
`The technical orientation of most cyberthreat intelligence produced is considered an obstacle towards
`awareness raising at the level of security and executive management.
`
`Cyberthreat intelligence needs to respond to increasingly automated attacks through novel
`approaches to utilization of automated tools and skills.
`
`The emergence of loT environments will remain a concern due to missing protection mechanisms in
`low-end loT devices and services. The need for generic loT protection architectures/good practices
`will remain pressing.
`
`The absence of cyberthreat intelligence solutions for low-capability organisations/end-users needs to
`be addressed by vendors and governments.
`
`All these trends are included in the content of the ENISA Threat Landscape 2018 (ETL 2018). Identified
`open issues leverage on these trends and propose actions to be taken in the areas of policy, business and
`
`07
`
`

`

`enisa
`
`ENISA Threat Landscape Report 2018
`ETL 2018 |
`1.0
`External
`| January 2019
`
`research/education. They serve as recommendations and will be taken into account in the future
`activities of ENISA and its stakeholders. An overview of identified points is as follows:
`
`Policy Conclusions:
`
`The EU will need to develop capabilities (human and technical) to address the needs for CTI
`knowledge management. EU Member States are requested to introduce measures to increase its
`independence from currently available CTI sources (mostly from outside the EU) and enhance the
`quality of CTI by adding a European context.
`
`As CTl is perceived as a public good, capabilities will be required to offer “baseline CTI” to all
`interested organisations. EU governments and public administrations are requested to share
`“baseline CTI”, covering sectorial and low-maturity needs of organizations.
`
`Regulatory barriers to collect CTI exists and should be removed. Coordinated efforts among EU
`Member States is required in the collection and analysis of CTI, as crucial activity in the
`implementation of proper defence strategies.
`
`Business conclusions
`
`Businesses will need to work towards making CTI available to a large number of stakeholders, with
`focus on the ones that lack technical knowledge. The security software industry needs to research and
`develop solutions using automation and knowledge engineering, helping end-users and organizations
`mitigating most of the low-end automated cyberthreats, with minimum human intervention.
`
`Businesses will need to take into account emerging supply chain threats and risks. The technology
`industry needs to introduce qualitative measures into its production processes, perform end-to-end
`security assessments and adhere to certification schemes.
`
`Businesses will need to bridge the gap in security knowledge among the operated services and end-
`users of the service. The consumption of CTI knowledge is a major step to achieve this goal.
`
`Technical/research/educational conclusions
`
`The ingestion of CTI knowledge needs to be enlarged to include accurate information on incidents and
`information from related disciplines. CTI vendors and researchers have to find ways to enlarge the
`scope of CTI, while reducing necessary manual activities.
`
`CTI knowledge management needs to be the subject of standardisation efforts. Of particular
`importance are the developments of standard vocabularies, standard attack repositories, automated
`information collection methods and knowledge management processes.
`
`Research needs to be conducted to better understand attack practices, malware evolution, malicious
`infrastructure evolution and threat agent profiling. Advances in those areas may significantly reduce
`exposure to cyberthreats and advance CTI practices.
`
`Much more training offerings need to be developed in order to satisfy the current market needs in CTI
`training.
`
`a number of important issues leading to the above
`In the last chapter of this document (see chapter 6),
`conclusions are mentioned, providing more elaborated conclusions. It is proposed to consider these
`issues and identify their relevance by reflecting them to the own situation and elaborate on it accordingly.
`
`The figure below summarizes the top 15 cyberthreats and trends in comparison to the landscape of 2017.
`
`08
`
`

`

`ENISA Threat Landscape Report 2018
`ETL 2018 |
`1.0 | External
`| January 2019
`
`Top Threats 2018
`
`Assessed
`Trends 2018
`
`Change in
`ranking
`
`>>< 人 >
`
`NEW
`
`
`
`oO
`
`所 所 局 和 站
`
`.Malware
`
`.Web Based Attacks
`
`.Web Application Attacks
`
`. Phishing
`
`. Denial of Service
`
`.Spam
`
`.Botnets
`
`8.
`
`9.
`
`Data Breaches
`
`Insider Threat
`
`10. Physical manipulation/
`damage/ theft/loss
`
`11. Information Leakage
`
`12. Identity Theft
`
`13. Cryptojacking
`
`14, Ransomware
`
`
`
`Assessed Trends
`
`2017
`
`0
`
`已 和 局
`
`Top Threats 2017
`
`1. Malware
`
`2. Web Based Attacks
`
`3. Web Application
`Attacks
`
`4. Phishing
`
`5. Spam
`
`6. Denial of Service
`
`7. Ransomware
`
`8. Botnets
`
`9. Insider threat
`
`10. Physical
`manipulation/ damage/
`theft/loss
`
`11. Data Breaches
`
`12. Identity Theft
`
`13. Information
`Leakage
`
`14. Exploit Kits
`
`15. Cyber Espionage
`15. Cyber Espionage
`
`
`Legend:
`
`Trends: © Declining,
`Ranking:
`个 Going up,
`
`今 Stable, @ Increasing
`Same, \) Going down
`
`Table 1- Overview and comparison of the current threat landscape 2018 with the one of 2017
`
`09
`
`

`

`*
`
`*
`*
`
`*
`*
`enisa
`
`1. Introduction
`
`ENISA Threat Landscape Report 2018
`ETL 2018 |
`1.0 | External
`| January 2019
`
`
`
`This is the 2018 version of the ENISA Threat Landscape (ETL 2018) yearly report. It is the seventh in a
`series of ENISA reports analysing the state-of-the-art in cyberthreats based on open source material’. This
`report is the result of a one-year long collection, analysis and assessment activity of cyberthreat related
`information found in the public domain. Moreover, it captures experience gained through interactions
`with experts during various ENISA events on the topic of Cyberthreat Intelligence (CTI)**1*. The time span
`of the ETL 2018 is ca. December 2017 to December 2018 and is referred to as the “reporting period”
`throughout the report.
`
`In essence, ETL 2018 has maintained the structure of the previous ETL? by using the same template for the
`description of the assessed cyberthreats.
`
`As part of the annual improvement process, some adaptations have been applied to the ETL 2018. These
`improvements, originated from discussions with internal/external experts, helped increasing the
`efficiency in generating the report, collecting and disseminating the information and establishing better
`coherence among a variety of ENISA materials on cyberthreats. As opposed to the ETL 2017, in 2018 these
`advancements are merely content-oriented. Firstly, we included some work performed by ENISA in the
`area of CTI Maturity Model. Secondly, the assessment of threats has been brought into a wider basis,
`leveraging upon contributions of additional experts who have supported the information collection and
`the assessment exercise.
`
`An additional step in advancing ETL 2018 has been the inclusion of CTI knowledge obtained within related
`ENISA events. Both the ENISA - FORTH Summer School and the ENISA event of CTI (CTI EU)? have
`delivered valuable insights into the trends governing current CTI state-of-the-art. This knowledge has
`been integrated in this report by means of content related to CTI State-of-Play, the assessed cyberthreats
`and the conclusions drawn.
`
`The channels used for information collection, ENISA has used information provided by the MISP
`platform*, by CERT-EU® and by also using threat intelligence of the cyber-security portal CYjAX5 granted
`as access pro bono to ENISA. Confidential information found in these platforms has been taken into
`account in our analysis without any disclosure or reference to this material.
`
`Finally, it is worth mentioning that in 2018 ENISA has advanced with an established liaison with the EU
`agencies with cyber-security on the mandate. This involves the European Defence Agency (EDA), CERT-EU
`and EC3. This has been implemented by means of discussions for a more enhanced cooperation among all
`
`
`
`https://www.enisa.europa.eu/news/enisa-news/enisa-report-the-2017-cyber-threat-landscape, acce
`
`https://www.enisa.europa. eu/events/2018-cti-eu-event, accessed November 2018.
`http://www. misp-project.org/, a
`ed
`November 2018.
`https://cert.europa. eufcetitereton/en/CERT LatestNews.html,
`https://www.cyjax.com/, a
`d
`Novembs
`
`ed November 2018.
`
`10
`
`

`

`ENISA Threat Landscape Report 2018
`ETL2018 |
`1.0
`|
`External
`| January 2019
`
`four organisations, on the basis of
`reporting period’.
`
`a Memorandum of Understanding that has been signed in the
`
`The links to these institutions already existed at a working level. ENISA has a tight cooperation with CERT-
`EU in the area of threat information. This is implemented by means of mutual reviews of cyberthreat
`assessments, use of CERT-EU services and by intensive personal communication.
`
`While with EC3 and EDA a working relationship already exists, this year cooperation in the area of CTI has
`advanced with the ENISA CTI EU event that was commonly supported by all four institutions. In addition,
`in 2018, ENISA has intensified its cooperation with the Commission services by engaging resources from
`DG Connect and European Security and Defence College within its CTI EU event’®.
`
`1.1
`
`Policy context
`
`The Cyber Security Strategy of the EU® underscores the importance of threat analysis and emerging trends
`in cyber security. The ENISA Threat Landscape contributes towards the achievement of objectives
`formulated in this strategy, in particular by contributing to the identification of emerging trends in
`cyberthreats and understanding the evolution of cyber-crime (see 2.4 regarding proposed role of ENISA).
`
`Moreover, the ENISA Regulation? mentions the need to analyse current and emerging risks (and their
`components), stating: “the Agency, in cooperation with Member States and, as appropriate, with
`statistical bodies and others, collects relevant information”. In particular, under Art. 3, Tasks, d), iii), the
`new ENISA regulations states that ENISA should “enable effective responses to current and emerging
`network and information security risks and threats” .
`
`ETL 2018 also relates to the context of the NIS-Directive’®, as it contributes towards the provision of
`cyberthreat knowledge needed for various purposes defined in the NIS-Directive (e.g. article 69).
`Moreover, it comprises a comprehensive overview of cyberthreats and as such, it is
`a decision support
`tool for EU Member States used in various tasks in the process of building cybersecurity capabilities.
`
`Of particular interest is, however, the important role of threat landscaping and threat intelligence within
`the proposed new ENISA regulation/ ENISA mandate”’. Article 7.7 foresees that “The Agency shall prepare
`a regular EU Cybersecurity Technical Situation Report on incidents and threats based on open source
`information, its own analysis, and reports shared by, among others: Member States’ CSIRTs (ona
`voluntary basis) or NIS Directive Single Points of Contact {in accordance with NIS Directive Article 14 (5));
`European Cybercrime Centre (EC3) at Europol, CERT EU.”. ENISA’s work in the area of threat analysis (as
`exemplified by this report) largely satisfies this requirement, while articles 9 and 10 states the role of
`emerging cyberthreats, both to perform long-term analysis and feed research initiatives. Despite the fact
`that this proposal may be modified during the review process, the role of threat analysis assigned by this
`draft regulation is indicative for its future importance.
`
`
`
`https://www.eda.europa.eu/docs/default-source/documents/mou---eda-enisa-cert-eu-ec3---23-05-18.pdf,
`
`accessed November 2018.
`
`http://www.ec.europa.eu/digital-agenda/en/news/eu-cybersecurity-plan-protect-open-internet-and-online-
`freedom-and-opportunity-cyber-security, accessed November 2018.
`http://eur-lex.europa.eu/LexUriServ/LexUriServ.do ?uri=OJ:L:2013:165:0041:0058:EN:PDF, accessed November
`
`http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016L1148&from=EN, accessed November
`
`2018.
`https://www.enisa.europa.eu/news/enisa-news/european-commission-proposal-on-a-regulation-on-the-future-
`of-enisa, accessed November 2018.
`
`11
`
`

`

`*
`
`*
`*
`
`*
`*
`enisa
`
`ENISA Threat Landscape Report 2018
`ETL 2018 |
`1.0 | External
`| January 2019
`
`Concluding the entire policy context with regard to cybersecurity, one has to mention an announcement
`of the Commission services that puts all cybersecurity related initiatives in the context policy areas in the
`EU space’’. Besides repeating some of the policy documents mentioned above, this source touches upon
`domains that are related to cybersecurity, thus underlying the importance of understanding the emerging
`threat landscape. Of particular interest are the developments in the area of cyber defence, being one of
`the most dynamic ones in the current and forthcoming Commission activities.
`
`1.2
`
`Target audience
`
`is
`The information in this report has mainly strategic and tactical relevance’ of approximately one year. It
`directed at executives, security architects and security managers. Nonetheless, the information provided
`is also of use by non-experts. For all these target groups, ENISA has developed a web application that will
`facilitate the use of the ETL information.
`
`Looking at the details provided by this report and ETL in general, one can distinguish between the
`following information types and target groups:
`
`e
`
`e
`
`a description of the current state-of-play in
`©The first part of the document found in chapter 2 is
`cyberthreat intelligence (CTI). It reflects discussions performed in 2018 with the ENISA Threat
`Landscape Stakeholder Group (ETL SG) and within the ENISA event on Cyberthreat Intelligence in the
`EU (CTI EU)”®. This information targets security professionals or scholars interested in open/emerging
`issues of CTI.
`
`The top cyberthreats may find a wider group of potential stakeholders who are interested in
`understanding the threat landscape in general or deepen their understanding to cover particular
`threats and their aspects. Hence, decision makers, security architects, risk managers, auditors clearly
`belong to the target group. Scholars and end-users who wish to be informed about the where-about
`of various cyberthreats may find this material useful. Finally, ETL 2018 can be a useful tool for
`professionals of any speciality who are interested in understanding the state-of-play in the area of
`cyberthreats.
`
`Besides the information on cyberthreats, ETL 2018 is offering an overview of the entire cybersecurity
`threat “ecosystem”, by covering the relationships of various objects, such as threat agents, trends and
`mitigation controls. These interconnections make up the context of cyberthreats and can be used in
`various other activities, such as, any kind of security assessment, identification of protection needs or
`categorization of assets.
`
`Together with ETL 2018, interested readers may find a series of publications analysing cyberthreats based
`on contemporary incidents. These reports are published as Cybersecurity Infonotes’®, issued in a regular
`basis.
`
`
`
`ed November 2018.
`* https://ec.europa.eu/digital-single-market/en/cyber-security, :
`https: 1/www. consilium.europa. eu/en/press/press- veleases/2018/11/19/cyber- defence-council-updates-policy-
`framework/,
`accessed Novembe
`https: //www, cpni.gov. uk/documents/publications/2015/23- march-2015-mwr_threat_intelligence_whitepaper-
`2015.pdf?epslanguage=en-gb, accessed December 2017.
`https://www.enisa.europa.eu/publications/info-
`notes#c5=2008&c5=2018&c5=false&c2=infonote_publication_date&reversed=on&b_start=0, accessed November
`2018.
`
`12
`
`

`

`*
`enisa
`
`*
`
`ENISA Threat Landscape Report 2018
`ETL 2018 |
`1.0
`|
`External
`| January 2019
`
`1.3
`
`Structure of the document
`
`The structure of ETL 2018 is as follows:
`
`Chapter 2 “Cyberthreat Intelligence and ETL” provides an overview of recent developments in cyberthreat
`intelligence, positions the ETL and summarizes some cyberthreat intelligence issues that are seen as
`emerging.
`
`Chapter 3 “Top Cyberthreats” is the heart of the ENISA Threat Landscape. It provides the results of the
`yearly threat assessment for the top 15 cyberthreats.
`
`Chapter 4 “Threat Agents” is an overview of threat agents with short profiles and references to
`developments that have been observed for every threat agent group, in the reporting period.
`
`Chapter 5 “Attack Vectors” provides an overview of important attack vectors that have led to the most
`important incidents in 2018.
`
`Chapter 6 “Conclusions” concludes this year’s ETL report. Synthesizes a generic view from the assessed
`cyberthreats, it provides some policy, business and research recommendations.
`
`13
`
`

`

`*
`
`*
`*
`
`*
`*
`enisa
`
`* «+
`
`ENISA Threat Landscape Report 2018
`ETL 2018 |
`1.0
`|
`External
`| January 2019
`
`2. Cyberthreat Intelligence and ETL
`
`
`
`2.1
`
`Cyberthreat Intelligence: State of Play
`In 2018, Cyberthreat Intelligence (CTI) has continued improving with regard to good practices, tools,
`training courses and standards. These developments are the response to an increasing demand for
`contextualized and actionable information about threats. Just as in 2017, large organisations continue to
`be the main customer base for CTI. It is worth mentioning, that CTI has matured in concert with other
`related cybersecurity disciplines, such as Security Operation Centres (SOC), threat hunting and Security
`Information and Event Management (SIEM). Nevertheless, CTI experts worry about the differences
`between cycles of cybersecurity related processes. In particular, syncing CTI with Incident Management,
`Vulnerability Management and Risk management seems to be a necessity in order to keep the focus on
`incidents that matter for the protection of respective “crown jewels”?°.
`
`Though higher maturity levels are gradually implemented in large organisations, experts argue about the
`appropriateness of CTI in terms of a positive contribution to the enhancement of the level of defence’®?’.
`The main concerns here are the increasing technical nature of CTI, the variability between CTI and other
`cybersecurity management disciplines in the organisation (e.g. Risk Management) and the potential
`diversification of objectives among them. Shortage of CTI skills aggravates these deficiencies’®. The
`immense interest of experts in CTI trainings is a clear indicator of the market need for CTI trainings?®.
`Moreover, the adequacy of CTI for small and medium organisations is a valid concern within CTI experts.
`
`Through the analysis of CTI publications?°”2, but also through a series of consultations with experts, ENISA
`has identified the following topics as
`a summary of current CTI state of play.
`
`Some positive CTI developments:
`
`e
`
`e
`
`Pretty good information collection of publicly available CTI: information collection engines and tools
`exist, comprising of comprehensive collections in some cases grouped according various threat/attack
`types??7374,
`
`Good information sharing, especially for low confidentiality incidents/threats: there are already either
`ad-hoc or established CTI information sharing networks’, Loosely coupled individuals and user
`groups establish repositories with CTl information for the most common threats.
`
`
`
`‘© https://www.enisa.europa.eu/events/2018-cti-eu-event, accessed November 2018.
`1 https://www.darkreading.com/vulnerabilities---threats/5-reasons-why-threat-intelligence-doesnt-work/a/d-
`id/1333188?print=yes, accessed November 2018
`'S https://www.sans.org/reading-room/whitepapers/analyst/membership/38285, accessed November 2018.
`'S https://nis-summer-school.enisa.europa.eu/, accessed November 2018
`*°https://www.researchgate.net/publication/323704364_ODNI_COMMON_CYBER_THREAT_FRAMEWORK_A_NEW_
`
`MODEL_IMPROVES_UNDERSTANDING_AND_COMMUNICATION,

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket