New report examines eight trends that pose significant data theft risks for organisations

Websense, Inc. a global leader in protecting organisations from the latest cyber attacks and data theft, released the Websense® Security Labs™ 2015 Threat Report, analysing evolving attack trends, tactics and defense vulnerabilities.

The report looks at how threat actors are gaining capabilities through the adoption of cutting-edge tools instead of technical expertise. Redirect chains, code recycling and a host of other techniques are allowing these actors to remain anonymous, making attribution time consuming, difficult and ultimately unreliable. Widespread use of older standards in lieu of newer and more secure options continues to leave systems vulnerable and exposed. Threats expand into the network framework itself, including the code base of Bash, OpenSSL, and SSLv3, to result in a brittle infrastructure.

Key findings from the Websense Security Labs 2015 Threat Report include:

  • 99.3% of malware uses a command and control infrastructure used by at least one other malware author –Malware authors are consistently reusing the same delivery techniques and infrastructure.
  • 30% of end-users click through a malicious URL in an email even though they have been warned of the danger  – End users are increasingly desensitised from the warnings, don’t feel responsible and still lack enterprise-driven education
  • Total volume of threats decreased 5 percent in 2014 from 2013 – Even with all of the breaches, the total volume of threats is decreasing and focusing more on accuracy than volume. Quiet, targeted and unique attacks are proving to be far more effective

“Cyber threats in 2014 combined new techniques with the old, resulting in highly evasive attacks that posed a significant risk for data theft,” said Charles Renert, vice president of security research for Websense. “In a time when Malware-as-a-Service means more threat actors than ever have the tools and techniques at hand to breach a company’s defenses, real-time detection across the Kill Chain is a necessity.”

The Websense Security Labs 2015 Threat Report details eight key behavioural and technique based trends along with actionable information and guidance to assist security professionals in planning their network defense strategy. Top findings include:

Cybercrime Just Got Easier: In this age of MaaS (Malware-as-a-Service), even entry level threat actors can successfully create and launch data theft attacks due to greater access to exploit kits for rent, MaaS, and other opportunities to buy or subcontract portions of a complex multi-stage attack. In addition to easier access to cutting-edge tools, malware authors are also blending new techniques with the old, resulting in highly evasive techniques.  For example, while the source code and exploit may be unique and advanced, much of the other infrastructure used in attacks is recycled and reused by the criminal element. For example:

  • In 2014, 99.3 percent of malicious files used a Command & Control URL that has been previously used by one or more other malware samples. In addition, 98.2 percent of malware authors used C&C’s found in five other types of malware.

Something New or Déjà Vu?: Threat actors are blending old tactics, such as macros, in unwanted emails with new evasion techniques. Old threats are being “recycled” into new threats launched through email and web channels, challenging the most robust defensive postures. Email, the leading attack vector a decade ago, remains a very potent vehicle for threat delivery, despite the now dominant role of the web in cyberattacks. For example:

  • In 2014, 81 percent of all email scanned by Websense was identified as malicious. This number is up 25 percent against the previous year. Websense also detected 28 percent of malicious email messages before an anti-virus signature became available.
  • Websense Security Labs identified more than 3 million macro-embedded email attachments in just the last 30 days of 2014.

Digital Darwinism – Surviving Evolving Threats: Threat actors have focused on the quality of their attacks rather than quantity. Websense Security Labs observed 3.96 billion security threats in 2014, which was 5.1 percent less than 2013. Yet, the numerous breaches of high profile organisations with huge security investments attest to the effectiveness of last year’s threats.

Attackers have restructured the methodology of attacks to reduce their threat profile. They do this by becoming less linear in following the traditional Kill Chain. These are harder to detect as stages are skipped, repeated or only partially applied, thereby reducing the threat profile. Activity at any one stage of the Kill Chain varied widely. Just as spam probe activity focuses upon the first stages of the Kill Chain, other stages of the Kill Chain saw varying levels of activity. Some stages saw more activity; others had much less than the year before.

For example, suspicious emails were up 25 percent year-over-year, dropper files fell 77 percent, call home activity rose 93 percent and exploit kit usage dropped 98 percent, while malicious redirect activity remained flat.

Avoid the Attribution Trap: It is particularly difficult to do attribution, given the ease by which hackers can spoof information, circumvent logging and tracking or otherwise remain anonymous. Often analysis of the same circumstantial evidence can lead to widely different conclusions. Use valuable time following an attack on remediation.

Other topics addressed in the report:

Elevating the IQ of IT: With an anticipated global shortfall of 2 million skilled security practitioners by 2017, unless new approaches to utilisation of resource and adoption of technology, it is inevitable that organisations will be out-maneuvered by their adversaries.

Insight on the insider: Insider threats will continue to be among the risk factors for data theft, from both accidental and malicious actions by employees.

Brittle infrastructure: 2014 saw the threat landscape expand into the network infrastructure itself, as hidden vulnerabilities were revealed deep within the code base of Bash, OpenSSL, SSLv3 and others that have been in popular use for decades.

IoT – The threat multiplier: The Internet of Things (IoT) will magnify exploitation opportunities as it grows to an estimated range of 20-50 billion connected devices by 2020. IoT offers previously unimaginable connectivity and applications, yet ease of deployment and the desire to innovate often override security concerns.

Duo Security RSAC 2015 – Register to win a free Quadcopter.

The Websense Security Labs 2015 Threat Report data was collected and evaluated using our ThreatSeeker® Intelligence Cloud, receiving up to five billion inputs daily from around the world. Expert interpretation was provided by Websense Security Labs based on interviews and investigations performed by researchers and engineers in Europe, the Middle East, Asia and North America examining attack activity and impact across the full Kill Chain.

To download the Websense 2015 Threat Report, visit here.

About Websense, Inc.

Websense securityWebsense, Inc. is a global leader in protecting organisations from the latest cyber-attacks and data theft. Websense TRITON® comprehensive security solutions unify web security, email security, mobile security and data loss prevention (DLP) at the lowest total cost of ownership. More than 11,000 enterprises rely on Websense TRITON security intelligence to stop advanced persistent threats, targeted attacks and evolving malware. Websense prevents data breaches, intellectual property theft and enforces security compliance and best practices. A global network of channel partners distributes scalable, unified appliance and cloud-based Websense TRITON solutions.

To access the latest Websense security insights and connect through social media, please visit here. For more information, visit here and For Websense TRITON please visit  here.

ISBuzz Staff
Expert Comments : 1
Security Articles : 12419

ISBuzz staff provides a brief synopsis and summary of the breaking information security news and topics to allow information security experts to provide their expert commentary on the breaking news or the topics.
Subscribe
Notify of
guest

0 Expert Comments
Inline Feedbacks
View all comments
Information Security Buzz
0
Would love your thoughts, please comment.x
()
x