Poor security hygiene and risky application use are feeding cyber attacks
- Published: Wednesday, 23 August 2017 07:51
Fortinet has published the findings of its latest Global Threat Landscape Report. The research reveals that poor cybersecurity hygiene and risky application usage enables destructive worm-like attacks to take advantage of hot exploits at record speed. Adversaries are spending less time developing ways to break in, and instead are focusing on leveraging automated and intent-based tools to infiltrate with more impact to business continuity.
Research highlights are as follows:
Effective cyber hygiene is critical to fight worm-like attacks
Crime-as-a-service infrastructure and autonomous attack tools enable adversaries to easily operate on a global scale. Threats like WannaCry were remarkable for how fast they spread and for their ability to target a wide range of industries. Yet, they could have been largely prevented if more organizations practiced consistent cyber hygiene. Unfortunately, adversaries are still seeing a lot of success in using hot exploits for their attacks that have not been patched or updated. To complicate matters more, once a particular threat is automated, attackers are no longer limited to targeting specific industries, therefore, their impact and leverage only increases over time.
Ransomworms on the rise
Both WannaCry and NotPetya targeted a vulnerability that only had a patch available for a couple of months. Organizations who were spared from these attacks tended to have one of two things in common. They had either deployed security tools that had been updated to detect attacks targeting this vulnerability, and/or they applied the patch when it became available. Prior to WannaCry and NotPetya, network worms had taken a hiatus over the last decade.
Critical-severity of attacks
More than two-thirds of firms experienced high or critical exploits in Q2 2017. 90 percent of organizations recorded exploits for vulnerabilities that were three or more years old. Even ten or more years after a flaw’s release, 60 percent of firms still experienced related attacks. Q2 data overall quantified 184 billion total exploit detections, 62 million malware detections, and 2.9 billion botnet communications attempts.
Active during downtime
Automated threats do not take weekends or nights off. Nearly 44 percent of all exploit attempts occurred on either Saturday or Sunday. The average daily volume on weekends was twice that of weekdays.
Technology use foreshadows threat risk
Speed and efficiency are business critical in the digital economy, which means that there is zero tolerance for any device or system downtime. As usage and configuration of technology such as applications, networks, and devices evolves, so do the exploit, malware, and botnet tactics of cybercriminals. Cybercriminals are ready and able to exploit weakness or opportunities in these new technologies or services. In particular, business-questionable software usage and the vulnerable IoT devices of hyperconnected networks represent potential risk because they are not being consistently managed, updated, or replaced. In addition, while good for Internet privacy and security, encrypted web traffic also presents a challenge to many defensive tools that have poor visibility into encrypted communications.
Risky applications create risk vectors, which open the door for threats. Organizations allowing a large amount of peer-to-peer (P2P) applications report seven times as many botnets and malware as those that don’t allow P2P applications. Similarly, organizations allowing a lot of proxy applications report almost nine times as many botnets and malware as those that don’t allow proxy applications. Surprisingly, there was no evidence that higher usage of cloud-based or social media applications leads to increased numbers of malware and botnet infections.
Almost one in five organizations reported malware targeting mobile devices. IoT devices continue to present a challenge because they don’t have the level of control, visibility, and protection that traditional systems receive.
Encrypted web traffic
Data shows the second straight record high this quarter for encrypted communications on the web. The percentage of HTTPS traffic increased over HTTP to 57 percent. This continues to be an important trend because threats are known to use encrypted communications for cover.Read the full report (registration required).