GoDubai
  
  
  
  
Citylife > Press Release
  Home Contact us Add to Favourites
Most Recent Postings
More Press Releses
Featured Sections

Event Finder
A daily roundup of exhibitions, promotions and other events in Dubai and the rest of the Emirates.
Submit an Event
Latest Dubai Press Releases >> Technology

 
  Share

Swarm Cyberattacks Target the Internet of Things (IoT) with Growing Intensity

DUBAI, UAE. – February 25, 2018; Fortinet® (NASDAQ: FTNT), the global leader in broad, integrated and automated cybersecurity solutions, today announced the findings of its latest Global Threat Landscape Report. The research reveals that attacks per firm increased over the previous quarter. In addition, automated and sophisticated swarm attacks are accelerating making it increasingly difficult for organizations to protect users, applications, and devices.

“The volume, sophistication, and variety of cyber threats continue to accelerate with the digital transformation of our global economy. Cybercriminals have become emboldened in their attack methods as they undergo a similar transformation, and their tools are now in the hands of many,” said Phil Quade, chief information security officer, Fortinet. “The stark reality is that traditional security strategies and architectures simply are no longer sufficient for a digital-dependent organization. There is incredible urgency to counter today's attacks with a security transformation that mirrors digital transformation efforts. Yesterday's solutions, working individually are not adequate. Point products and static defenses must give way to integrated and automated solutions that operate at speed and scale.”

For a detailed view of the findings and some important takeaways for CISOs read the blog. Highlights of the report follow:

Swarm Cyberattacks Increase in Volume, Variety, and Velocity

The sophistication of attacks targeting organizations is accelerating at an unprecedented rate. Digital transformation isn't just reshaping business, cybercriminals are leveraging the expanding attack surface it creates for new disruptive opportunities to attack. They are implementing newer swarm-like capabilities while simultaneously targeting multiple vulnerabilities, devices, and access points. The combination of rapid threat development combined with the increased propagation of new variants is increasingly difficult for many organizations to combat.

Unprecedented Volume: An average of 274 exploit detections per firm were detected, which is a significant increase of 82% over the previous quarter. The number of malware families also increased by 25% and unique variants grew by 19%. The data not only indicates growth in volume, but also an evolution of the malware as well. In addition, encrypted traffic using HTTPS and SSL grew as a percentage of total network traffic to a high of nearly 60% on average. While encryption can certainly help protect data in motion as it moves between core, cloud, and endpoint environments, it also represents a real challenge for traditional security solutions.
IoT Attack Intensity: Three of the top twenty attacks identified targeted IoT devices and exploit activity quadrupled against devices like WiFi cameras. None of these detections were associated with a known or named CVE, which is one of the troubling aspects of vulnerable IoT devices. In addition, unlike previous attacks, which focused on exploiting a single vulnerability, new IoT botnets such as Reaper and Hajime can target multiple vulnerabilities simultaneously. This multi-vector approach is much harder to combat. Reaper's flexible framework means that, rather than the static, pre-programmed attacks of previous IoT exploits, Reaper's code is easily updated to swarm faster by running new and more malicious attacks as they become available. Demonstrating its swarm abilities, exploit volume associated with Reaper exhibited a jump from 50K to 2.7 million over a few days before dropping back to normal.
Ransomware Still Prevalent: Several strains of ransomware topped the list of malware variants. Locky was the most widespread malware variant and GlobeImposter followed as the second. A new strain of Locky emerged, tricking recipients with spam before requesting a ransom. In addition, there was a shift on the darknet from only accepting Bitcoin for payment to other forms of digital currency such as Monero.
Cryptocurrency Mining on the Rise: Cryptomining malware increased, which seems to be intertwined with the changing price of Bitcoin. Cybercriminals recognize the growth in digital currencies and are using a trick called cryptojacking to mine cryptocurrencies on computers using CPU resources in the background without a user knowing. Cryptojacking involves loading a script into a web browser, nothing is installed or stored on the computer.
Sophisticated Industrial Malware: An uptick in exploit activity against industrial control systems (ICS) and safety instrumental systems (SIS) suggests these under-the-radar attacks might be climbing higher on attackers' radar.  An example is an attack codenamed Triton. It is sophisticated in nature and has the ability to cover its tracks by overwriting the malware itself with garbage data to thwart forensic analysis. Because these platforms affect vital critical infrastructures, they are enticing for threat actors. Successful attacks can cause significant damage with far-reaching impact.
Attack Variety: Steganography is an attack that embeds malicious code in images. It's an attack vector that has not had much visibility over the past several years, but it appears to be on the resurgence. The Sundown exploit kit uses steganography to steal information, and while it has been around for some time, it was reported by more organizations than any other exploit kit. It was found dropping multiple ransomware variants.

Fighting Swarm Attacks Requires Integrated Security

The threat data in this quarter's report reinforces many of the predictions unveiled by the Fortinet FortiGuard Labs global research team for 2018, which predicted the rise of self-learning hivenets and swarmbots on the horizon. Over the next couple of years, the attack surface will continue to expand while visibility and control over today's infrastructures diminish. To address the problems of speed and scale by adversaries, organizations need to adopt strategies based on automation and integration. Security should operate at digital speeds by automating responses as well as applying intelligence and self-learning so that networks can make effective and autonomous decisions.

 



Posted by : GoDubai Editorial Team
Viewed 3745 times
Posted on : Sunday, February 25, 2018  
Replication or redistribution in whole or in part is expressly prohibited without the prior written consent of GoDubai.com.
Previous Story : Q4 2017 Akamai State of The Internet / Security Report Shows Botnets Shift Focus to Credential Abuse
Next Story : Cisco Annual Cybersecurity Report 2018 Finds Organizations Relying on Automated Cyber-Security
Email this article Print this article

Share this article with your friends and followers
NewsVine

Comments

Back to Top  
Most Viewed Press Release posted in the last 7 days
Introducing Burberry Bespoke Fragrances
Making many tones from one
Celebrate the Month of Love with a Brighter Smile at The Smile Bar
Longchamp Spring/summer 2019 Show
A Chaumet Valentine's Day Sentimental jewellery
Persil Appoints Nancy Ajram as the new Regional Brand Ambassador
Tissot PRS 516 Alpine Limited Edition A sporting tribute
Malabar Gold & Diamonds opens a new showroom in Millennium Dubai Airport Hotel t...
The Preston watch collection by Coach
Global Village presents Scheherazade, a timeless tale of intrigue and adventure
Tag Heuer Demonstrates Watchmaking Mastery With Its New Carrera Calibre Heuer 02...
Turkish Airlines reached the 80.2% Load Factor in December 2018.
Beef Sushi- Love at first bite
Always take the front row with this 7.2” supersized smartphone screen
Celebrate Valentine's Day With a Quintessential Timepiece From D1 Milano
Eberhard & Co. Gilda makes an extraordinary Valentine's Day gift
Walid Atallah's “Dream Dress”: The new revolution in the World of Fashion 2019
HUGO BOSS watches Legacy Casual Family collection
Nissan Energy demonstration hits the spot
Scuderia Ferrari presents PILOTA Family Collection
Bollywood Actor Anil Kapoor to inaugurate 2 new outlets of Malabar Gold & Diamon...
Jewellery shoppers to keep winning big this Dubai Shopping Festival
Third Edition of Al Shira'aa International Horse Show Concludes with Thrilling Finale
Luxury jewelry house Dhamani 1969 launches exclusive CHRYSALIS collection
MALABAR GOLD - DSF Winner Photo for Release - Anandan Ganesh
Spring/Summer ‘19 Collection IL Gufo Underwater
Sawalef Perfumes unveils product range of delicate scents in 2019
Flying Grand Regulator now available in new colour combinations
Nicole Kidman at the Golden Globe Awards
Joyalukkas Shopper wins BMW Car in DSF Mega Promotion
Time for Unsung Heroes to Be Recognised With Citizen Campaign
Bollywood Actor Anil Kapoor inaugurated 2 new outlets of Malabar Gold & Diamonds...
Al Mouj Muscat pays tribute to Oman with Layers of Oman Exhibition
Dubai-based sports star Sarra Lajnef gets Women Leadership Award
Airbus boosts Intersec 2019 with Progressive Comms Technology
OMEGA reintroduces the iconic Calibre 321
The Kingdom of Saudi Arabia's Minister of Energy, Industry, and Mineral Resource...
Dawoodi Bohra Trade Expo begins at Expo Centre Sharjah
Audi turns the car into a virtual reality experience platform at CES
Opening Ceremony of Azerbaijan House in the United Arab Emirates
Citi UAE opens Citigold lounge in Abu Dhabi.
Alawwal bank becomes first Middle East firm to offer AI training for all staff
2020 Cadillac XT6 Makes Global Debut
The UAE-Kosovo Economic Forum launches a new phase of economic partnerships
The Region's Most Anticipated Shopping Festival Is Back at Burjuman
Central Bank of the UAE Holds its 1st Board of Directors Meeting for 2019
Global Energy Forum: His Excellency Khalid Al-Falih's address on day three
IPAF hosts 10th UAE Nadwa
Sultan Awards Oil & Gas Exploration Concession to Italy's Eni
UAE residents go on a two-week Camel Trek across the UAE desert