1
The Top 10 Cyberattacks Threatening Your Organization Cybersecurity has never felt more complicated. With the number of threats growing at a rapid pace, IT staffs are struggling to protect every potenal aack surface. While the number of specific bugs, viruses, bots, and exploits is beyond measure, they oſten fall within the same handful of aack types. In this infographic, we take a look at the top 10 cyberaacks in today's evolving threat landscape. With this list, you can take the first steps to ghten your security strategy and ulmately keep your business ahead of any threats. In 2018, 53% of midmarket companies experienced a breach 1 Phishing is a malicious email that tricks users to surrender their user credentials. The email may appear legitimate, as if coming from your bank, and ask you to reset your password. Ransomware is a type of malicious software that prevents the end user from accessing a system or data. Attackers typically request a payment, often in the form of bitcoins, to decrypt files or restore access. An SQL injection exploit executes malicious SQL queries to take control of a database server that is running a web application. Companies often use older software that has reached end-of-life and is no longer receiving new patches, making the software vulnerable to any new exploits that are developed. The average cost of a malicious insider aack rose 15% from 2018 to 2019 21 88% of companies with >1 million folders don’t limit access 20 77.5 Average numbers of days to close a vulnerability 18 95% of HTTPS servers are vulnerable to MitM 12 1/3 of exploitaon of inadvertent weaknesses involved MitM aacks 13 DDoS aack frequency has increased more than 2.5X in 3 years 9 The average cost of a data breach in 2020 $3,900,000 4 Over 75% of the healthcare industry has been infected with malware over the last year 5 98% of WordPress vulnerabilies are related to plugins that extend the funconality and features of a website or a blog 14 59% of all websites using a known content management system use Wordpress 15 Today’s tools can crack a single diconary word password within 1 second 10 80% of hacking-related breaches are caused by compromised, weak, and reused passwords 11 Ransomware costs businesses more than $75B/year 6 Ransomware is predicted to cost $6 trillion annually by 2021 7 66% of malware is installed via malicious email aachments 2 82% of manufacturers have experienced a phishing aack in the past year 3 A brute-force attack is an attempt by a malicious actor to gain unauthorized access to secure systems by trying all possible passwords and guessing the correct one. Malware is malicious software that spreads via an email attachment or a link to a malicious website. It infects the endpoints when a user opens the attachment or clicks on the link. A distributed denial-of-service attack is an attack with the purpose of crashing a web server or an online service by flooding it with more traffic than it can handle. Man-in-the middle attack is an attack where two legitimate users or devices are communicating with each other and have an undetected third-party secretly spying. A zero-day attack takes place when hackers exploit a previously undisclosed vulnerability in hardware, software, or a network that has been exposed. Because the exploit is new, there is no remedy available. Because insiders are already in your network and have some level of legitimate access, they have the time and capability to snoop around and steal data. 2019 2018 20% of all vulnerabilies caused by unpatched soſtware are classified as High Risk or Crical 18 Phishing Ransomware Outdated and Unpatched Software Brute-Force Password Attack Malware DDoS Distributed Denial-of-Service Attack Man-in-the-Middle Attack Zero-Day Attacks Insider Threats SQL Injection 60% of organizaons that suffered a data breach within the last two years cited known vulnerabilies that hadn’t been patched as the reason 19 76% of successful aacks on organizaon endpoints were zero-day aacks 16 Through the industry’s original Concierge Security™ Team, Arcc Wolf provides the scalable managed cybersecurity protecon IT-constrained companies need to keep their valuable business data safe. Working as an extension of your internal team, these highly-trained security experts deliver 24x7 cloud-based mon toring, risk management, threat detecon, and response servi es. For more informaon about Arcc Wolf, visit https://arcticwolf.com. References 1. Cisco Cybersecurity Special Report, 2018 2. Verizon Data Breach Invesgaons Report (DBIR), 2017 3. Check Point 2018 Security Report 4. Security. Cost of a Data Breach Report, 2019 5. Security Scorecard. 2016 Healthcare Industry Security Report 6. Dao. State of the Channel Ransomware Report 2016 7. Cybersecurity Ventures. Official Annual Cybercrime Report 8. Neustar. Cyber Threats and Trends Report. 9. VNI Global Fixed and Mobile Traffic Forecasts, 2017 10. IBM Security. Verizon Data Breach Invesgaons Report (DBIR), 2016 11. Verizon Data Breach Invesgaons Report (DBIR), 2019 12. IBM. X-Force Threat Intelligence Index, 2018 13. Netcraſt, 2016 14. Impreva. The State of Web Applicaon Vulnerabilies in 2018 15. Impreva. The State of Web Applicaon Vulnerabilies in 2018 16. Ponemon. 2018 State of Endpoint Security Risk 17. Scan. 2019 VULNERABILITY STATISTICS REPORT 18. Servicenow and Ponemon Instute. Costs and Consequences of Gaps in Vulnerability Response, 2018 19. Edgescan Stats Report, 2018 20. Varonis. Global Data Risk Report, 2018 21. Accenture and Ponemon. 2019 Cost of Cybercrime PERSONAL | PREDICTABLE | PROTECTION Protect your organization from cyberattacks and strengthen your security posture with Arctic Wolf. See firsthand how you can stay ahead of the game in today’s threat landscape. REQUEST A DEMO There was a 967% increase of DDoS aacks for 100Gbps or higher in Q1 2019 8

The Top 10 Cyberattacks - Arctic Wolf SOC-as-a …...1. Cisco Cybersecurity Special Report, 2018 2. Verizon Data Breach Investigations Report (DBIR), 2017 3. Check Point 2018 Security

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The Top 10 Cyberattacks - Arctic Wolf SOC-as-a …...1. Cisco Cybersecurity Special Report, 2018 2. Verizon Data Breach Investigations Report (DBIR), 2017 3. Check Point 2018 Security

The Top 10CyberattacksThreatening Your Organization

Cybersecurity has never felt more complicated. With the number of threats growing at a rapid pace, IT staffs are struggling to protect every potential attack surface. While the number of specific bugs, viruses, bots, and exploits is beyond measure, they often fall within the same handful of attack types.

In this infographic, we take a look at the top 10 cyberattacks in today's evolving threat landscape. With this list, you can take the first steps to tighten your security strategy and ultimately keep your business ahead of any threats.

In 2018, 53% of midmarket companies experienced a breach1

Phishing is a malicious email that tricks users to

surrender their user credentials. The email may

appear legitimate, as if coming from your bank,

and ask you to reset your password.

Ransomware is a type of malicious software

that prevents the end user from accessing a

system or data. Attackers typically request a

payment, often in the form of bitcoins, to

decrypt files or restore access.

An SQL injection exploit executes malicious

SQL queries to take control of a database

server that is running a web application.

Companies often use older software that has

reached end-of-life and is no longer receiving

new patches, making the software vulnerable to

any new exploits that are developed.

The average cost of a malicious insider attack

rose 15%from 2018 to 201921

88% of companieswith >1 million folders don’t limit access20

77.5Average numbers of days to close a vulnerability18

95% of HTTPS serversare vulnerable to MitM12

1/3 of exploitation ofinadvertent weaknesses involved MitM attacks13

DDoS attack frequencyhas increased more than

2.5X in 3 years9

The average cost of a data breach in 2020

$3,900,0004

Over 75% of the healthcareindustry has been infected with malware over the last year5

98%of WordPress vulnerabilities are

related to plugins that extend the functionality and features

of a website or a blog14

59%of all websites using a

known content management system use Wordpress15

Today’s tools can crack a single dictionary word password

within 1 second10

80%of hacking-related

breaches are caused by compromised, weak, and

reused passwords11

Ransomware costs businesses more than

$75B/year6

Ransomware ispredicted to cost

$6 trillion annually by 20217

66% of malware isinstalled via malicious

email attachments2

82% of manufacturershave experienced a phishing

attack in the past year3

A brute-force attack is an attempt by a malicious actor to

gain unauthorized access to secure systems by trying all

possible passwords and guessing the correct one.

Malware is malicious software that

spreads via an email attachment or a link

to a malicious website. It infects the

endpoints when a user opens the

attachment or clicks on the link. 

A distributed denial-of-service attack is an

attack with the purpose of crashing a web server

or an online service by flooding it with more

traffic than it can handle.

Man-in-the middle attack is an attack where two

legitimate users or devices are communicating

with each other and have an undetected

third-party secretly spying.

A zero-day attack takes place when hackers exploit a

previously undisclosed vulnerability in hardware,

software, or a network that has been exposed. Because

the exploit is new, there is no remedy available.

Because insiders are already in your

network and have some level of

legitimate access, they have the time and

capability to snoop around and steal data.

2019

2018

20% of allvulnerabilities caused

by unpatched software are classified as High

Risk or Critical18

Phishing

Ransomware

Outdated and Unpatched Software

Brute-Force Password Attack

Malware

DDoSDistributed Denial-of-Service Attack

Man-in-the-Middle Attack

Zero-Day Attacks

Insider Threats

SQL Injection

60% of organizations thatsuffered a data breach within

the last two years cited known vulnerabilities that hadn’t been

patched as the reason19

76% of successful attackson organization endpoints were zero-day attacks16

Through the industry’s original Concierge Security™ Team, Arctic Wolf provides the scalable managed cybersecurity protection IT-constrained companies need to keep their valuable business data safe. Working as an extension of your internal team, these highly-trained security experts deliver 24x7 cloud-based monitoring, risk management, threat detection, and response services.

For more information about Arctic Wolf, visit https://arcticwolf.com.

References

1. Cisco Cybersecurity Special Report, 20182. Verizon Data Breach Investigations Report (DBIR), 20173. Check Point 2018 Security Report4. Security. Cost of a Data Breach Report, 20195. Security Scorecard. 2016 Healthcare Industry Security Report6. Datto. State of the Channel Ransomware Report 20167. Cybersecurity Ventures. Official Annual Cybercrime Report8. Neustar. Cyber Threats and Trends Report.9. VNI Global Fixed and Mobile Traffic Forecasts, 201710. IBM Security. Verizon Data Breach Investigations Report (DBIR), 201611. Verizon Data Breach Investigations Report (DBIR), 201912. IBM. X-Force Threat Intelligence Index, 201813. Netcraft, 201614. Impreva. The State of Web Application Vulnerabilities in 201815. Impreva. The State of Web Application Vulnerabilities in 201816. Ponemon. 2018 State of Endpoint Security Risk17. Scan. 2019 VULNERABILITY STATISTICS REPORT18. Servicenow and Ponemon Institute. Costs and Consequences of Gaps

in Vulnerability Response, 201819. Edgescan Stats Report, 201820. Varonis. Global Data Risk Report, 201821. Accenture and Ponemon. 2019 Cost of Cybercrime

P E R S O N A L | P R E D I C T A B L E | P R O T E C T I O N

Protect your organization from cyberattacks and strengthen your

security posture with Arctic Wolf. See firsthand how you can stay

ahead of the game in today’s threat landscape.

REQUEST A DEMO

There was a 967% increase of DDoS attacks for 100Gbps or higher in Q1 20198