sb-nz logo
Story image

NTT survey finds phishing methods are the hottest ways of delivering ransomware

08 May 2017

NTT Security has echoed the growing number of report that show email phishing is now one of the most widely-used methods of distributing ransomware, but organisations should not fear the statistics.

The company’s 2017 Global Threat Intelligence report found that Phishing attacks have been distributing the bulk (73%) of all malware, including ransomware.

77% of all detected ransomware is targeting four main sectors: Business and professional services (28%), government (19%), healthcare (15%) and retail (15%).

56% of all incidents in finance organisations were related to malware, and 50% of all incidents in healthcare organisations were related to ransomware. 

However, NTT Security says that organisations should not be fearful of the statistics; as it is a chance for everyone to be educated about the issues.

"Our end goal is not to create fear, uncertainty and doubt or to overcomplicate the current state of the threat landscape, but to make cybersecurity interesting and inclusive for anyone facing the challenges of security attacks, not just security professionals,” comments Steven Bullitt, VP of Threat Intelligence and Incident Response, GTIC, at NTT Security.

“We want to ensure everyone is educated about these issues and understands that they have a personal responsibility when it comes to the protection of their organisation, and that the organisation has an obligation to help them do so.”

The survey also found that just 25 passwords account 33% of all authentication attempts towards the organisation’s honeypots in 2016. More than 76% of those attempts used passwords associated with the Mirai Botnet, which was used to carry out massive DDoS attacks.

In general, DDoS attacks accounted for 23% of all attacks from Australia and 16% of attacks from Asia, compared to a worldwide average of just 6%.

However, the report found that organisations are doing their part to protect themselves from attacks: 32% of organisations had a formal incident response plan, an increase of 11% from previous years.

"We identified more than six billion attempted attacks over the 12-month period - that's around 16 million attacks a day - and monitored threat actors using nearly every type of attack,” comments Bullitt.

The company used data from 3.5 trillion logs, honeypots and sandboxes in more than 100 different countries.

Story image
Video: 10 Minute IT Jams - Bitglass director on all things SASE
This is our second IT Jam with both Bitglass and Jonathan Andresen, who is the company's senior director of marketing. In this video, Jonathan discusses all things related to Secure Access Service Edge (SASE): its advantages over traditional security tech, what enterprises should look for, and how SASE relates to cloud-delivered secure web gateways.More
Story image
Acronis accelerates growth plans with CyberLynx acquisition
"Acquiring these capabilities will advance Acronis' mission to deliver world-class cyber protection to organisations around the world."More
Story image
Research: NZ easy-pickings for cyber-criminals
One in ten businesses would be willing to pay $50,000-plus to retrieve ransomed data and half aren’t aware of the incoming data privacy laws.More
Story image
Why 2021 will be the year of catch-up
The transition to remote work and new online contactless business models is not temporary and is affecting the future strategy on how organisations invest in cybersecurity, writes Radware vice president and managing director for EMEA and LATAM, Rob Hartley.More
Story image
Claroty finds four vulnerabilities in Schneider Electric OT device
Unmitigated vulnerabilities could give an attacker access to the device, enabling the attacker to break encryption, modify code, and run certain commands.More
Story image
NetMotion and Netpoleon partner to deliver security platform
Netpoleon will sell, supply and support the NetMotion platform across all states and territories across Australia, and in New Zealand.More