Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Blogs
    • Security Watch

    SecureWorks Finds Most Cyber-Threats Involve Phishing, Network Scans

    By
    Robert Lemos
    -
    February 4, 2017
    Share
    Facebook
    Twitter
    Linkedin
      SecureWorks Cyber Study 2

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      The vast majority of successful attacks on companies are conducted by cyber-criminals using phishing, network scans for exploitable systems, and strategic web site compromises, security-services firm SecureWorks found in an analysis of six months of incident-response engagements.

      The analysis of 163 incidents found that 82 percent could be attributed to cyber-criminals, 11 percent to insiders and 7 percent to nation-state adversaries. The company attributed attacks to financially-motivated cyber-criminals if they included theft of funds, the copying of financial information or personal data, the use of computing power, or ransom of data.

      While advanced attacks and zero-day vulnerabilities garner a lot of attention, phishing, exploitation of known vulnerabilities and using websites to launch attacks were the most common methods of compromise. The vast majority—88 percent—of attacks were opportunistic and not targeted, the report stated.

      “There are a lot of companies focused on the advanced threats, but when we look at the companies, they don’t have the basics down,” Jeffrey Carpenter, director of threat intelligence and incident response consulting at SecureWorks, told eWEEK. “They are failing at some of the basic, basic components of defense.”

      SecureWorks conducts nearly 800 incident-response engagements every year, about half of which were proactive—to check cyber-defenses—and the other half reactive—to help clients clean up after an attack, Carpenter said.

      The study involves data from the 163 reactive incident response engagements SecureWorks did in the first half of 2016. The company emphasized that the focus on the victims means that the study reveals the actual attacks that threaten companies.

      Malware typically entered a corporate network through the compromise of a vulnerable public-facing system, compromised employee credentials, delivered in an email, downloaded from a website or through a third-party contractor.

      Phishing accounted for 38 percent of attacks, while scans for vulnerable systems that were then exploited accounted for 22 percent of attacks. Using a website to host exploits accounted for 21 percent of the attacks.

      In one incident, for example, one large-scale manufacturing firm had numerous malware infections. While the company had deployed antivirus software, it did not prevent the attacks, but only created continuous alerts about the infections, SecureWorks stated in the report. Cyber-criminals quickly monetized the attacks by installing banking trojans, bitcoin mining software and remote access trojans.

      SecureWorks found that the company had too many users with administrative privileges, still had systems running Windows XP and only a limited ability to respond to an attack.

      While phishing is the top attack vector, many companies are not prepared to deal with it, Carpenter said.

      “Training alone is not good enough,” he said. “No matter how much you train, you will always have someone who clicks.”

      SecureWorks identified many areas where companies could improve their preventative measures, but Carpenter highlighted the need for a strategy balanced between prevention, detection and incident response.

      Top preventative strategies included better and more consistent patching, managing user-account privileges and adding web application firewalls or content filters. Companies also have to implement a good endpoint security solution, improve logging and collection capabilities, and help incident responders, he said.

      “No matter how many steps you take, you are always going to have an incident,” Carpenter said. “So you need to focus on response as well.”

      Robert Lemos
      Robert Lemos
      Robert Lemos is an award-winning freelance journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      10 Best Artificial Intelligence (AI) 3D Generators

      Aminu Abdullahi - November 17, 2023 0
      AI 3D Generators are powerful tools for creating 3D models and animations. Discover the 10 best AI 3D Generators for 2023 and explore their features.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×