Story image

Cyberthreats shifting with ransomware attacks down - research

18 Jun 18

2017 was widely billed as the year of ransomware, but cyberthreats have moved in a new direction this year, according to ISACA’s State of Cybersecurity 2018 research.
 
Results show that 50% of the 2,366 security leaders surveyed have seen an increase in cyberattack volumes relative to last year.

In addition, 80% of respondents said they are likely or very likely to be attacked this year—a statistic that remains unchanged from last year’s study.
But despite an increase in cyberattacks generally, ransomware attacks are significantly declining.

Last year, 62% of respondents experienced a ransomware attack, compared to 45% this year—a 17-point drop.

This is likely because organisations are significantly better prepared after last year’s WannaCry and NotPetya attacks.

Eighty-two percent of respondents said that their enterprises now have ransomware strategies in place and 78% said they have a formal process—up 25-points from last year.

While these findings are positive, the data shows that ransomware attacks may have been displaced by cryptocurrency mining, which is becoming more frequent.

Cryptocurrency mining malware can operate without direct access to the file system, making them harder to detect—and as the prices of cryptocurrencies increase, the economics of cryptocurrency mining malware becomes better for the attacker.

Additionally, the three most common attack vectors remain unchanged from last year: phishing, malware and social engineering.

Active defence strategies are highly effective, but underutilised 

ISACA’s research also found that nearly 4 out of 10 respondents (39%) are not at all familiar or only slightly familiar with active defence strategies (e.g., honeypots and sinkholes).

Of those who are familiar with active defence strategies, just over half are actually using them.
ISACA cybersecurity director Frank Downs says, “This is a missed opportunity for security leaders and their organisations.”

“ISACA’s research indicates that active defence strategies are one of the most effective countermeasures to cyberattacks. A full 87% of those who use them indicate that they were successful.”
 
Recommendations
 
The ISACA report suggests enterprises must be better prepared with focused attention on several areas, including:

  • Investing in talent—With attacks still on the rise, enterprises must continue to invest in finding, retaining and training skilled cybersecurity professionals.
     
  • Exploring further automation benefits—Enterprises should consider automation-driven strategies and tools for detection and to support recovery and response efforts.
     
  • Ensuring appropriate investment in security controls—With attack vectors (phishing, malware and social engineering) minimally changing, existing control types are still valid and useful. Enterprise investment and attention to security controls should increase in line with the frequency of these attack vectors.
ForeScout acquires OT security company SecurityMatters for US$113mil
Recent cyberattacks, such as WannaCry, NotPetya and Triton, demonstrated how vulnerable OT networks can result in significant business disruption and financial loss.
Exclusive: Fileless malware driving uptake of behavioural analytics
Fileless malware often finds its way into organisations via web browsers (or in combination with other vectors such as infected USB drives).
'DerpTrolling’ faces jail time for Sony DoS attacks
A United States federal court has charged a 23-year-old man for the hacks on Sony Online Entertainment and other major companies back in 2014.
Kiwis concerned about being scammed – survey
This unease is warranted given the growing sophistication of scammers and their activities, and numbers of attempted fraud.
It's time to rethink your back-up and recovery strategy
"It is becoming apparent that legacy approaches to backup and recovery may no longer be sufficient for most organisations."
Dropbox strengthens security with raft of new partnerships
Integrations will keep customer content protected and secure with tools for controlling identity access, governing data, and managing devices.
Interview: Aruba’s NZ country manager talks channel strategy
“What we're taking to market is that message around simplification and having everything in one place.”
Companies swamped by critical vulnerabilities – Tenable
Research has found enterprises identify 870 unique vulnerabilities on internal systems every day, on average, with over 100 of them being critical.