9
CYBER THREAT INTELLIGENCE REPORT VOLOGY.COM | 888.808.2199

CYBER THREAT - Vology · For our data set, the CTAP results also provide the top cloud, infrastructure, social media and streaming services across each organization. This data provides

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CYBER THREAT - Vology · For our data set, the CTAP results also provide the top cloud, infrastructure, social media and streaming services across each organization. This data provides

CYBER THREAT INTELLIGENCE REPORT

VOLOGY.COM | 888.808.2199

Page 2: CYBER THREAT - Vology · For our data set, the CTAP results also provide the top cloud, infrastructure, social media and streaming services across each organization. This data provides

Through a combination of expansive managed security solutions, professional IT

security services and our 24/7/365 U.S.-based Security Operations Center, Vology

provides a comprehensive cybersecurity program to mitigate the vulnerabilities of

organizations’ critical infrastructure and intellectual property.

Reducing the risks caused by cyber threats for our customers is our most important task, and understanding

the trends we uncover in the analysis of their networks allows us to focus our efforts and provide as secure an

IT environment for them as possible.

Prior to developing an all-encompassing, customized security program for each customer, Vology will,

in many cases, perform a Cyber Threat Assessment Program (CTAP). The CTAP validates the customer’s

network security accuracy, analyzes application traffic, assesses user productivity and monitors network

performance — all at no cost to the customer and is completed within five to seven days. The results of the

CTAP are then presented with a comprehensive report that details the customer’s network security posture

and network activity, paving the way for the development of a wide-ranging security solution.

Vology’s Cyber Threat Intelligence Report, presents a cross-section of CTAP results performed on customers’

networks to provide insight into trends, common vulnerabilities and other data potentially threatening your

current security stance.

To have a Vology CTAP performed on your network to better understand your security posture and network

performance, contact your Vology representative today at 888-808-2199, or visit us at vology.com.

2 VOLOGY.COM | 888.808.2199

Page 3: CYBER THREAT - Vology · For our data set, the CTAP results also provide the top cloud, infrastructure, social media and streaming services across each organization. This data provides

Average Number of IPS Events

An Intrusion Prevention System (IPS) is a threat prevention/security technology that

monitors traffic flow through a network and detects potential vulnerability exploits. In

order to attempt to gain access and control of an application or machine, attackers will

direct malicious inputs at a target application or service. An IPS event is the count of one

such directed input.

Across our data set, the average number of IPS events detected was 220,619 over a four-day

period, or 55,154/day. That’s forty-three percent of organizations above 100,000 daily events, and

twenty-nine percent under 10,000 daily events. According to an industry leading security product

manufacturer and threat intelligence agency, the average across all industries is 18,269 daily events.

Fifty-seven percent of our data set is above that average. This number underscores the fact that most

companies do not have clear insight into what is actually happening inside their networks, nor do they have

the appropriate tools to identify and remediate the threats.

% of Organizations by Number of Daily IPS Events

0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50%

>100,000

50,000-100,000

25,000-50,000

5,000-25,000

<5,000

43%

14%

14%

29%

0%

Application Vulnerability Exploits

Application vulnerabilities involve a weakness or system flaw in an application. These vulnerabilities

can be exploited to compromise security and can be caused by several issues including weak or invalid

form inputs, web server misconfiguration and other application design flaws. There are numerous ways

attackers can take advantage of application vulnerabilities, with severity levels between 1-5 indicating

the level of vulnerability. Looking at the most severe — levels 3-5 — our data showed all organizations

had at least one Severity-5 exploit, with an average of four. Forty-three percent of organizations tested had

greater than four Severity-5 exploits.

3 VOLOGY.COM | 888.808.2199

Page 4: CYBER THREAT - Vology · For our data set, the CTAP results also provide the top cloud, infrastructure, social media and streaming services across each organization. This data provides

86% of organizations tested had at least one Severity-4 exploit, where only 14% had more than two.

Likewise, 86% of organizations had at least one Severity-3 exploit, with 28% having more than two.

% of Organizations with Severity 3-5 App Vulnerability Exploits

0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%

Level 5

Level 4

Level 3

100%

86%

86%

% of Organizations with Severity 3-5 App Vulnerability Exploits

0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50%

>10

7-10

4-6

<3

29%

43%

14%

14%

4 VOLOGY.COM | 888.808.2199

Page 5: CYBER THREAT - Vology · For our data set, the CTAP results also provide the top cloud, infrastructure, social media and streaming services across each organization. This data provides

Application Vulnerability Attacks

Application vulnerabilities, which are also known as IPS attacks, act as entry points used to

bypass security infrastructure and allow potential attackers a foothold into your network.

Most likely due to either overlooked updates or the lack of a patch management process,

the identification of unpatched hosts is critical to protecting against application vulnerability attacks.

Across our data set, organizations suffered an average of 26 application vulnerability attacks during

their CTAP. Twenty-eight percent were attacked greater than 26 times, forty-three percent between

20-25 times and twenty-nine percent less than 20.

% of Organizations by Number of Application Vulnerability Attacks

0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50%

>40

30-40

20-30

10-20

<10

43%

14%

14%

29%

0%

Malicious Websites Detected

Malicious websites are sites known to host software and/or malware that is designed to covertly

collect information, damage the host computer or otherwise manipulate the target machine without

the user’s consent.

Generally, visiting a malicious website is a precursor to infection and represents the initial stages of the

kill chain. Blocking malicious sites and/or instructing employees not to visit or install software from

unknown websites is the best form of prevention.

During the time of their CTAP, forty-three percent of all organizations had malicious websites detected,

with an average of 23 sites detected per organization.

5 VOLOGY.COM | 888.808.2199

Page 6: CYBER THREAT - Vology · For our data set, the CTAP results also provide the top cloud, infrastructure, social media and streaming services across each organization. This data provides

Phishing Websites

Similar to malicious websites, phishing websites emulate the web pages of legitimate

websites to collect personal or private (i.e. logins, passwords, etc.) information from end users.

Phishing websites are often linked to within unsolicited emails sent to unsuspecting employees.

A skeptical approach to emails asking for personal information and hovering over links to determine

validity can prevent most phishing attacks.

Like the results for malicious websites detected, forty-three percent of organizations had positive results for

phishing websites, with an average of six per organization.

Proxy Applications Detected

These applications are used — usually intentionally — to bypass in-place security

measures. For instance, users may circumvent a firewall by disguising or encrypting external

communications. In many cases, this can be considered a willful act and a violation of

corporate use policies.

Eighty-six percent of organizations tested showed at least one instance of a proxy application. The average

number of applications detected was five, with fourteen percent of organizations showing ten or higher.

Remote Access Applications Detected

Remote access applications are often used to access internal hosts remotely, thus bypassing Network

Address Translation (NAT) or providing a secondary access path (i.g. backdoor) to internal hosts. In a

worst-case scenario, remote access can be used to facilitate data exfiltration and corporate espionage

activity. Many times, the use of remote access is unrestricted and internal corporate use changes should

be put into practice. Further, remote access protocols are especially dangerous with respect to separated

employees who may have had elevated privileges (i.e. Systems administrators) or access to ancilliary

account credentials such as service accounts. These are easily installed, configured and highly susceptible

to data exfiltration of corporate data, intellectual property or customer information.

All organizations conducting a CTAP had remote access applications detected. The average number of

applications per organization was five. Forty-three percent of organizations had seven or greater.

6 VOLOGY.COM | 888.808.2199

Page 7: CYBER THREAT - Vology · For our data set, the CTAP results also provide the top cloud, infrastructure, social media and streaming services across each organization. This data provides

% of Organizations with Severity 3-5 App Vulnerability Exploits

0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50%

>10

7-10

4-6

<3

29%

43%

14%

14%

P2P and File Sharing Applications

Peer-to-peer (P2P) and file sharing applications can be used to bypass existing content

controls and lead to unauthorized data transfer and data policy violations. Policies on

appropriate use of these applications need to be implemented.

Forty-three percent of organizations in the data set had at least one instance of a P2P or file sharing

application found during their CTAP. The average across those organizations was one.

Network Usage

For our data set, the CTAP results also provide the top cloud, infrastructure, social media and streaming

services across each organization. This data provides IT managers and executive management a glimpse

into potential application usage that can be used to circumvent or even replace corporate infrastructure

already in use. Knowing what applications are being accessed can help ensure sensitive corporate data is

not transferred to the Cloud and/or exposed if the cloud provider’s security infrastructure is breached.

Cloud SaaSCloud SaaS — % of time App appears in top 3 highest usage

YouTube Office 365 Facebook Amazon Logmein WebEx Netflix LinkedIn DropBox

80%

60%

40%

20%

71%

43% 43% 43%

29% 29%14% 14% 14%

Amazon GoDaddy Azure Meraki Trend Micro

120%

100%

80%

60%

40%

20%

100%

86%

57%43%

14%

Facebook Twitter LinkedIn Instagram Snapchat

120%

100%

80%

60%

40%

20%

100%

86%71%

29%

14%

Cloud IaaSCloud IaaS — % of time appears in top 3 highest usage

Social Media AccessedSocial Media — % of time appears in top 3 highest usage

YouTube RTCP Netflix Vimeo Pandora WMP Flowplayer

80%

70%

60%

50%

40%

30%

20%

10%

71%

57%

43% 43%

29%

Streaming AccessedStreaming Media — % of time appears in top 3 highest usage

29%

14%

8 VOLOGY.COM | 888.808.2199

Page 8: CYBER THREAT - Vology · For our data set, the CTAP results also provide the top cloud, infrastructure, social media and streaming services across each organization. This data provides

Network Usage, continued

Cloud SaaSCloud SaaS — % of time App appears in top 3 highest usage

YouTube Office 365 Facebook Amazon Logmein WebEx Netflix LinkedIn DropBox

80%

60%

40%

20%

71%

43% 43% 43%

29% 29%14% 14% 14%

Amazon GoDaddy Azure Meraki Trend Micro

120%

100%

80%

60%

40%

20%

100%

86%

57%43%

14%

Facebook Twitter LinkedIn Instagram Snapchat

120%

100%

80%

60%

40%

20%

100%

86%71%

29%

14%

Cloud IaaSCloud IaaS — % of time appears in top 3 highest usage

Social Media AccessedSocial Media — % of time appears in top 3 highest usage

YouTube RTCP Netflix Vimeo Pandora WMP Flowplayer

80%

70%

60%

50%

40%

30%

20%

10%

71%

57%

43% 43%

29%

Streaming AccessedStreaming Media — % of time appears in top 3 highest usage

29%

14%

8 VOLOGY.COM | 888.808.2199

Cloud SaaSCloud SaaS — % of time App appears in top 3 highest usage

YouTube Office 365 Facebook Amazon Logmein WebEx Netflix LinkedIn DropBox

80%

60%

40%

20%

71%

43% 43% 43%

29% 29%14% 14% 14%

Amazon GoDaddy Azure Meraki Trend Micro

120%

100%

80%

60%

40%

20%

100%

86%

57%43%

14%

Facebook Twitter LinkedIn Instagram Snapchat

120%

100%

80%

60%

40%

20%

100%

86%71%

29%

14%

Cloud IaaSCloud IaaS — % of time appears in top 3 highest usage

Social Media AccessedSocial Media — % of time appears in top 3 highest usage

YouTube RTCP Netflix Vimeo Pandora WMP Flowplayer

80%

70%

60%

50%

40%

30%

20%

10%

71%

57%

43% 43%

29%

Streaming AccessedStreaming Media — % of time appears in top 3 highest usage

29%

14%

Page 9: CYBER THREAT - Vology · For our data set, the CTAP results also provide the top cloud, infrastructure, social media and streaming services across each organization. This data provides

Top 10 Application Vulnerabilities

Application vulnerabilities can be exploited to compromise the security of your network.

Our industry partner’s research team analyzes these vulnerabilities and then develops

signatures to detect them. We currently leverage a database of more than 5,800 known application

threats to detect attacks that evade traditional firewall systems. Below are the most frequent

vulnerabilities by type for the CTAP data set:

Buffe

r Erro

rs

Info

rmat

ion

Dis

clos

ure

DoS

Code

Inje

ctio

nAcc

ess

Contr

olBot

net

Impr

oper

Aut

hent

icat

ion

Mal

war

e

Remot

e Cod

e Exe

cutio

n

Frag

men

t Ano

mal

y

Passw

ord

Secu

rity

Bybas

s

Privile

dge/

Acces

s Con

trol

Anom

aly

Brute

For

ce

Buffe

r Ove

rflo

wCod

e Exe

cutio

nD

NS

Anom

aly

Privile

dge

Eleva

tion

SYN

Per

mis

sion

25%

20%

15%

10%

5%

22%

Top Application Vulnerabilities by Type

14%12% 10%

7% 5% 4% 4% 4% 3% 3% 3%1% 1% 1% 1% 1% 1% 1%

Vology’s Cyber Threat Intelligence Report is not intended to be a replacement for a comprehensive test of

your IT network. It allows for better understanding of current threats across a number of Vology customers

representing many industries, and to provide insight into trends, common vulnerabilities and other

potentially threatening IT issues you should be aware of.

To schedule your own Vology CTAP to better understand your security posture and network performance,

contact your Vology representative today at 888-808-2199 or visit us at vology.com.

Vology, a leading Managed IT, Security and Cloud Services Provider, positions companies for growth by powering digital transformation and delivering custom solutions. Vology currently monitors, manages and maintains 260,000 devices at 32,000 customer sites, providing 24/7/365 support through its U.S.-based Network and Security Operations Centers. Vology is ranked as the No. 21 Managed Services Provider in the world on the 2018 MSP 501 list with access to 2,200 fully vetted field technicians nationwide.

ABOUT VOLOGY

GET IN TOUCH

888.808.2199 [email protected]