Skip to main content
banner image
venafi logo

Manage TLS Machine Identities to Mitigate the Rise in Malware via HTTPS [Encryption Digest #67]

Manage TLS Machine Identities to Mitigate the Rise in Malware via HTTPS [Encryption Digest #67]

October 15, 2021 | Alexa Hernandez

Is your network as secure as you think it is? If you’re entirely upgraded to HTTPS to prevent malware from infecting your web traffic, the answer might be: not as much as you think.

Shocking statistics revealed by the quarterly Internet Security Report from WatchGuard Technologies should have network administrators across all industries questioning how much they blindly trust HTTPS web traffic. If HTTPS alone won’t protect your machine identities from attack, an encryption strategy that prioritizes regular intelligence updates and immediate response to threat alerts will be crucial moving forward. So, it turns out that it’s more about the importance of managing and protecting your encryption, than about just having it.

Download the FREE Venafi e-Book Now to Learn More About Machine Identity Management!
Why are malware attacks increasing so drastically?

In the first half of 2021, 91% of malware attacks arrived via HTTPS-encrypted channels. BreachQuest Co-Found and CTO, Jake Williams, found this figure lower than he expected! “It’s unsurprising that most malware is delivered over encrypted channels. This research puts numbers to what would otherwise be anecdotes. I would have guessed the number was north of 95%.”

These figures shouldn’t suggest that organizations stop using HTTPS altogether, especially since it remains the security standard for most browsers. The reason for this new trend is that organizations rely on a false sense of security, becoming far too complacent about HTTPS, and automatically assuming all traffic from HTTPS connections is legitimate without any further due diligence. Once cybercriminals became aware of this tendency, sneaking malware in through these channels was the logical next step. In Q2 2021 alone, WatchGuard reported blocking more than 16 million malware variants, an average of roughly 430 attempted attacks per device.

There are many factors at play causing this rise of malware attack, but one of the main contributors over the past year or so has been the COVID-19 pandemic causing an unprecedented shift to remote work. IT teams often have a difficult time monitoring employees for compliance with corporate security policies. Negligent employees connecting to company infrastructure via insecure channels is a major vulnerability that can easily be the culprit of unauthorized network access.

Microsoft Office-based threats were another common occurrence in 2021. That’s not to say Microsoft is less secure, simply that the sheet number of attacks aimed at Microsoft make it inevitable for some to be successful. Between signing rootkit malware and the discovery of an AD CS vulnerability, to name a few, Microsoft users remain a persistent target of cybercriminals. Microsoft users should remain particularly alert to phishing scams, a form of cyber attack that WatchGuard has seen increasingly used to disguise malware as popular domains.

How to protect machine identities when HTTPS isn’t enough

A major takeaway of this report for organizations that is HTTPS traffic should be monitored closely for malware. The best way to mitigate risks is early detection and immediate action. This strategy is only possible when you have a complete inventory of your machine identities, along with regular intelligence reports on their status. This is critical because machine identities are the encryption keys and certificates that help you validate an https connection. If you don’t control them, then you don’t control the encrypted tunnel.

This is the ironclad security and peace of mind that automated machine identity management with Venafi allows organizations to enjoy. Automation not only makes it a breeze to consistently enforce your organization’s security policies, but it allows for streamlined and expedited remediation of security events.

Ready to start your digital transformation? Learn all about the Venafi Trust Protection Platform!

Related Posts

Like this blog? We think you will love this.
Featured Blog

What Is a Private Key?

How Are Private Keys Used?<

Read More
Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

Subscribe Now

See Popular Tags

You might also like

TLS Machine Identity Management for Dummies

TLS Machine Identity Management for Dummies

Certificate-Related Outages Continue to Plague Organizations
White Paper

CIO Study: Certificate-Related Outages Continue to Plague Organizations

About the author

Alexa Hernandez
Alexa Hernandez

Alexa is the Web Marketing Specialist at Venafi.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more