By Pierluigi Paganini, Editor-in-Chief

Continues my overview of the main security reports published by leading companies that produce interesting analysis on the analysis of cyber threats, today I desire to introduce the data proposed by Solutionary in the 2013 Global Threat Intelligence Report (registration is required).

The GTIR report provides insight into prevalent cyber threats identified in 2012 thanks to data collection and analysis of various sources such as logs, alerts, vulnerabilities and devices.

What is interesting is the approach followed by the company in the formulation of the document, Solutionary in fact  proposed tactical and strategic recommendations for mitigation.

The report revealed that the impact of cyber attacks against private companies is costing thousands of dollars per day, DDoS attacks and impairment of internal networks due malware have an meaningful economic burden. Solutionary estimated that organizations are spending as much as $6,500 per hour to recover from incidents and data most concerning is that companies need up to 30 days to mitigate and recover from malware based attack, at a cost of just over $3,000 per day.

Contrary to what you might think, especially in relation to recent events discovered by the security community worldwide, the majority of attacks against American companies and organization is originated in US. Around 83% of the offensive has internal origin and only 6% are from China, the data must not be misleading in my opinion because in many cases foreign attackers using compromised machines locate in the United States to conduct attacks.

events

The observed attacks have affected virtually every sector, technology, finance and business services are most targeted, but more interesting are the data related to origin of attacks and sector hit. 90% of all attacks from China-based IP addresses have targeted business services, technology, and financial sectors meanwhile according Solutionary report 85% of all attack activity from Japan-based IP addresses was oriented against the manufacturing industry.

image 2

The report revealed that majority of attacks by US-based addresses targeted Government sector (23%) meanwhile NON-US based addresses targeted mainly Businesses Services.  Solutionary proposed a classification of attack techniques based on country of origin, China is responsible for majority of attacks from foreign states and the analysis of traffic related to the offensives confirms that attackers contacted compromised targeted devices. The report compare attack type distribution over different countries demonstrating that while Japanese and Canadian attackers based actions on application exploit attempts, attacks originating from Germany involve more botnet activity.

 

image 3

The 2012 was characterized but diffusion of malware of increased complexity that targeted the financial and retail verticals, the report states:

“Around 80% of attempts to infect organizations with malware are directed at financial (45%) and retail (35%) organizations. These attempts frequently arrive as targeted spam email, which attempts to coerce the recipient to execute an attachment or click on an infected link.”

Most malware analyzed by SERT in 2012 was evenly distributed among four primary categories: backdoors, downloaders, launchers, and information stealers.

Malware

The most concerning data is that 54% of malware is able to elude common anti-virus detection, due this reason it is necessary a different approach to avoid malicious code diffusion, organizations need to adopt multiple malware detection mechanisms.

Analyzing most popular exploit kits in 2012 it’s possible to note they rely heavily on vulnerabilities identified in 2011, 2010, and prior years. Attackers mainly target unpatched environments exploiting well known vulnerabilities discovered in previous years.

CVE

In 2012, 21 different exploit kits of significant importance were released or updated, most targeted software were Java (40%), Adobe (25%) and IE (16), the fact that these software are the cross-platform make them privileged targets for cyber criminals and state-sponsored hackers.

If this introduction has been to your liking I recommend reading the entire report, which is rich of further interesting information.

(Sources : CDM & Solutionary)