GoDubai
  
  
  
  
Citylife > Press Release
  Home Contact us Add to Favourites
Most Recent Postings
More Press Releses
Featured Sections

Event Finder
A daily roundup of exhibitions, promotions and other events in Dubai and the rest of the Emirates.
Submit an Event
Latest Dubai Press Releases >> Technology

 
  Share

Cybercriminals Are Exploiting Known Vulnerabilities and Maximizing Impact With a Hybrid Threat Known as Ransomworms

Dubai, UAE, September 4, 2017: Fortinet® (NASDAQ: FTNT), the global leader in high-performance cybersecurity solutions, today announced the findings of its latest Global Threat Landscape Report. The research reveals that poor cybersecurity hygiene and risky application usage enables destructive worm-like attacks to take advantage of hot exploits at record speed. Adversaries are spending less time developing ways to break in, and instead are focusing on leveraging automated and intent-based tools to infiltrate with more impact to business continuity.

“The technology innovation that powers our digital economy creates opportunity for good and bad in cybersecurity. Yet, something we don't talk about often enough is the opportunity everyone has to limit bad consequences by employing consistent and effective cybersecurity hygiene,” said Phil Quade, chief information security officer, Fortinet. “Cybercriminals aren't breaking into systems using new zero day attacks, they are primarily exploiting already discovered vulnerabilities. This means they can spend more of their resources on technical innovations making their exploits difficult to detect. Newer worm-like capabilities spread infections at a rapid pace and can scale more easily across platforms or vectors. Intent-based security approaches that leverage the power of automation and integration are critical to combat this new ‘normal'.”

Effective Cyber Hygiene is Critical to Fight Worm-like Attacks

Crime-as-a-Service infrastructure and autonomous attack tools enable adversaries to easily operate on a global scale. Threats like WannaCry were remarkable for how fast they spread and for their ability to target a wide range of industries. Yet, they could have been largely prevented if more organizations practiced consistent cyber hygiene. Unfortunately, adversaries are still seeing a lot of success in using hot exploits for their attacks that have not been patched or updated. To complicate matters more, once a particular threat is automated, attackers are no longer limited to targeting specific industries, therefore, their impact and leverage only increases over time.

Ransomworms on the Rise: Both WannaCry and NotPetya targeted a vulnerability that only had a patch available for a couple of months. Organizations who were spared from these attacks tended to have one of two things in common. They had either deployed security tools that had been updated to detect attacks targeting this vulnerability, and/or they applied the patch when it became available. Prior to WannaCry and NotPetya, network worms had taken a hiatus over the last decade.


Critical-severity of Attacks: More than two-thirds of firms experienced high or critical exploits in Q2 2017. 90% of organizations recorded exploits for vulnerabilities that were three or more years old. Even ten or more years after a flaw's release, 60% of firms still experienced related attacks. Q2 data overall quantified 184 billion total exploit detections, 62 million malware detections, and 2.9 billion botnet communications attempts.

Active During Downtime: Automated threats do not take weekends or nights off. Nearly 44% of all exploit attempts occurred on either Saturday or Sunday. The average daily volume on weekends was twice that of weekdays.

Technology Use Foreshadows Threat Risk

Speed and efficiency are business critical in the digital economy, which means that there is zero tolerance for any device or system downtime. As usage and configuration of technology such as applications, networks, and devices evolves, so do the exploit, malware, and botnet tactics of cybercriminals. Cybercriminals are ready and able to exploit weakness or opportunities in these new technologies or services. In particular, business-questionable software usage and the vulnerable IoT devices of hyperconnected networks represent potential risk because they are not being consistently managed, updated, or replaced. In addition, while good for Internet privacy and security, encrypted Web traffic also presents a challenge to many defensive tools that have poor visibility into encrypted communications.

Application Usage: Risky applications create risk vectors, which open the door for threats. Organizations allowing a large amount of peer-to-peer (p2p) applications report seven times as many botnets and malware as those that don't allow p2p applications. Similarly, organizations allowing a lot of proxy applications report almost nine times as many botnets and malware as those that don't allow proxy apps. Surprisingly, there was no evidence that higher usage of cloud-based or social media applications leads to increased numbers of malware and botnet infections.

Sector Analysis: The education sector led in nearly every measure of infrastructure and application usage when grouped by element type and industry. The energy sector exhibited the most conservative approach with all others falling in between.

IoT Devices: Almost one in five organizations reported malware targeting mobile devices. IoT devices continue to present a challenge because they don't have the level of control, visibility, and protection that traditional systems receive.

Encrypted Web Traffic: Data shows the second straight record high this quarter for encrypted communications on the web. The percentage of HTTPS traffic increased over HTTP to 57%. This continues to be an important trend because threats are known to use encrypted communications for cover.

Report Methodology
The Fortinet Global Threat Landscape report is a quarterly view that represents the collective intelligence of FortiGuard Labs drawn from Fortinet's vast array of network devices and sensors within production environments during Q2 2017.  Research data covers global, regional, industry sector, and organizational perspectives. It also focuses on three central and complementary aspects of the threat landscape: application exploits, malicious software, and botnets. In addition, Fortinet publishes a free, subscription-based Threat Intelligence Brief that reviews the top malware, virus, and web-based threats discovered every week, along with links to that week's most valuable Fortinet research.

 



Posted by : GoDubai Editorial Team
Viewed 5405 times
Posted on : Monday, September 4, 2017  
Replication or redistribution in whole or in part is expressly prohibited without the prior written consent of GoDubai.com.
Previous Story : Western Digital® Breaks Boundaries with World's Highest-Capacity microSD™ Card
Next Story : Red Hat and Microsoft Simplify Containers to Help Enterprises Accelerate to the Hybrid Cloud
Email this article Print this article

Share this article with your friends and followers
NewsVine

Comments

Back to Top  
Most Viewed Press Release posted in the last 7 days
Let It Glow
Filorga Launches FLASH-NUDE Collection
Let All Your Photos Be Merry & Bright
The Rado DiaMaster Petite Seconde Automatic COSC The Rado watch at the top of th...
HP ProBook x360 11 G3 and G4 Education Edition
Chrono 4 Grande Taille - an extra-special timepiece
30 Years of Ryder Cup Heroes Confirmed for the 30th Edition of the Omega Dubai ...
Maintain Healthy Skin Year Round
PopSockets launches a new collection with crystals from Swarovski, the must-have...
Free gold coins at Malabar Gold & Diamonds Festival
MIDO Baroncelli Lady Day & Night collection
American Eagle Is the Go-to Destination for Gifting This Holiday Season'
The Interiors Gift Guide with Home and Soul
Golden Mile Galleria's ‘A Cultural Flair' attracts hundreds of art lovers to Pal...
Newby Teas Launches Advent Calendar For Christmas 2018
GAZOO Racing Wins Australia Rally at FIA World Rally Championship
24 Karat Gold Elixir by Mehrunisa Launches in the UAE Beauty Market
Tissot Chemin des Tourelles
Growth and inclusivity drive Avaya's channel strategy for 2019
Interview with Asil Attar, CEO of Al Yasra Fashion
Get Ready for Party Season with Lottie's new make-up hits
Festive Gift Sets from Bubble T
Time For Enchanting Moments
Holiday Handbags | GUESS
Holiday Gifting Made Easy with Wet n Wild Beauty Specials
BharatMatrimony launches office in Dubai targeting 2 Million Indians
Tissot PR100 Lady Sport – Chic Glamourous Festive Season
Winter wool Christmas must- haves
Michael Kors Collection Transeason 2019 Press Presentation
New 1948 Seamaster Watches Join the Ranks'
Samsung Galaxy A9 – Designed to capture the world in its fullest
Five-Star Euro NCAP for Jaguar's Electric I-PACE
Global Knowledge Index 2018 and The Future of Knowledge: A Foresight Report shin...
France Attractiveness Scoreboard 2018 Released
UOWD's quality management expert wins ASQ-UAE Quality Professionals Award
Dubai's Most Magical Festive Market Opens at Dubai Festival City Mall
Tissot PR100 Lady Sport – Chic Sporty yet Feminine
Ring in a dazzling festive season at Ibn Battuta Mall
Chinese Manufacturing Companies to Highlight Trade Opportunities in Middle East
Dubai Customs wins 3 awards from Ideas UK 2018
FBMA and 47 Emirati women celebrate UAE National Day
New ACH145 Mercedes-Benz Style Cabin Model Highlights First Presence at MEBAA fo...
Spinneys Dubai 92 Cycle Challenge | Road Closure Timings
Chic and Stylish Wraps with a 3 in 1 effortless concept
Jury Announced for Epson's First Ever Win-A-Robot Competition in Europe, The Mid...
Raja Al Gurg is one of Forbes Magazine's 100 most powerful women in the world
New Menu alert: Moombai & Co. launches exciting and delicious food items to its menu
Al Hosn Now Open to the Public
ICAEW recognises Middle East's best finance professionals
Nine winners honored by DQG for their innovative ideas at the 10th Global Contin...