Home / IT / Telecom / Tech/ Poor security hygiene and risky applications enable destructive cyberattacks to spread infection at

Poor security hygiene and risky applications enable destructive cyberattacks to spread infection at


Comments / {{hitsCtrl.values.hits}} Views / Tuesday, 12 September 2017 00:00


Fortinet, the global leader in high-performance cybersecurity solutions, announced the findings of its latest Global Threat Landscape Report. The research reveals that globally, as well as in Asia Pacific, poor cybersecurity hygiene and risky application usage enables destructive worm-like attacks to take advantage of hot exploits at record speed. Adversaries are spending less time developing ways to break in, and instead are focusing on leveraging automated and intent-based tools to infiltrate with more impact to business continuity.
Commenting on this Fortinet Regional Vice President, India and SAARC Rajesh Maurya said, “The technology innovation that powers our digital economy creates opportunity for good and bad in cybersecurity. Yet, something we don’t talk about often enough is the opportunity everyone has to limit bad consequences by employing consistent and effective cybersecurity hygiene. Cybercriminals aren’t breaking into systems using new sero day attacks, they are primarily exploiting already discovered vulnerabilities. 
This means they can spend more of their resources on technical innovations making their exploits difficult to detect. Newer worm-like capabilities spread infections at a rapid pace and can scale more easily across platforms or vectors. Intent-based security approaches that leverage the power of automation and integration are critical to combat this new ‘normal’.”
 
 
Effective cyber hygiene is critical to fight worm-like attacks 
Crime-as-a-Service infrastructure and autonomous attack tools enable adversaries to easily operate on a global scale. Threats like WannaCry were remarkable for how fast they spread and for their ability to target a wide range of industries. Yet, they could have been largely prevented if more organisations practiced consistent cyber hygiene. Unfortunately, adversaries are still seeing a lot of success in using hot exploits for their attacks that have not been patched or updated. To complicate matters more, once a particular threat is automated, attackers are no longer limited to targeting specific industries, therefore, their impact and leverage only increases over time.
lRansomworms on the rise: Both WannaCry and NotPetya targeted a vulnerability that only had a patch available for a couple of months. Organisations who were spared from these attacks tended to have one of two things in common. They had either deployed security tools that had been updated to detect attacks targeting this vulnerability, and/or they applied the patch when it became available. Prior to WannaCry and NotPetya, network worms had taken a hiatus over the last decade.
lCritical-severity of attacks: More than two-thirds of firms experienced high or critical exploits in Q2 2017. 90% of organisations recorded exploits for vulnerabilities that were three or more years old. Even 10 or more years after a flaw’s release, 60% of firms still experienced related attacks.Q2 data overall quantified 184 billion total exploit detections, 62 million malware detections, and 2.9 billion botnet communications attempts.
lActive during downtime: Automated threats do not take weekends or nights off. Nearly 44% of all exploit attempts occurred on either Saturday or Sunday. The average daily volume on weekends was twice that of weekdays. 
 
 
Technology use foreshadows threat risk
Speed and efficiency are business critical in the digital economy, which means that there is zero tolerance for any device or system downtime. As usage and configuration of technology such as applications, networks, and devices evolves, so do the exploit, malware, and botnet tactics of cybercriminals. Cybercriminals are ready and able to exploit weakness or opportunities in these new technologies or services. In particular, business-questionable software usage and the vulnerable IoT devices of hyperconnected networks represent potential risk because they are not being consistently managed, updated, or replaced. In addition, while good for Internet privacy and security, encrypted Web traffic also presents a challenge to many defensive tools that have poor visibility into encrypted communications.
lApplication usage: Risky applications create risk vectors, which open the door for threats. Organisations allowing a large amount of peer-to-peer (P2P) applications report seven times as many botnets and malware as those that don’t allowP2P applications. Similarly, organisations allowing a lot of proxy applications report almost nine times as many botnets and malware as those that don’t allow proxy applications. Surprisingly, there was no evidence that higher usage of cloud-based or social media applications leads to increased numbers of malware and botnet infections.
lSector analysis: The education sector led in nearly every measure of infrastructure and application usage when grouped by element type and industry. The energy sector exhibited the most conservative approach with all others falling in between.
lIoT devices: Almost one in five organisations reported malware targeting mobile devices. IoT devices continue to present a challenge because they don’t have the level of control, visibility, and protection that traditional systems receive. 
lEncrypted web traffic: Data shows the second straight record high this quarter for encrypted communications on the web. The percentage of HTTPS traffic increased over HTTP to 57%. This continues to be an important trend because threats are known to use encrypted communications for cover.
 
 
Report methodology
The Fortinet Global Threat Landscape report is a quarterly view that represents the collective intelligence of FortiGuard Labs drawn from Fortinet’s vast array of network devices and sensors within production environments during Q2 2017. Research data covers global, regional, industry sector, and organisational perspectives. It also focuses on three central and complementary aspects of the threat landscape: Application exploits, malicious software, and botnets. In addition, Fortinet publishes a free, subscription-based Threat Intelligence Brief that reviews the top malware, virus, and web-based threats discovered every week, along with links to that week’s most valuable Fortinet research. 

Share This Article


DISCLAIMER:

1. All comments will be moderated by the Daily FT Web Editor.

2. Comments that are abusive, obscene, incendiary, defamatory or irrelevant will not be published.

3. We may remove hyperlinks within comments.

4. Kindly use a genuine email ID and provide your name.

5. Spamming the comments section under different user names may result in being blacklisted.

COMMENTS

Today's Columnists

Tamil actor Kamal Haasan stars in new role as political leader

Saturday, 24 February 2018

Srinivasan Kamal Haasan is one of India’s foremost film actors. Known popularly as Kamal, the talented and versatile thespian has not only excelled as an actor onscreen, but has successfully engaged in other cinematic spheres too. The multi-faceted


Yameen’s economic offensive to counter political adversity ahead of presidential poll

Saturday, 24 February 2018

The embattled Maldivian President Abdulla Yameen, who is facing intense political opposition both in and out of the country, hopes to win the September, 2018 presidential election using a combination of political belligerence and a strong economic pr


In the end, there was nothing

Saturday, 24 February 2018

Much more than a storm in a tea cup! To a non-discerning person, it all seemed like the final battle of the counter revolution. President Sirisena was up in smoke trying to oust Prime Minister Ranil Wickremesinghe for no articulated reason. He asked


Shouldn’t Govt. prevent parliamentary system from decay and destruction?

Friday, 23 February 2018

The wrong people teach us the best lessons. As a clever nation, we had always used our ballot and chased the wrong people


Columnists More