November 23, 2024 04:43 (IST)
Follow us:
facebook-white sharing button
twitter-white sharing button
instagram-white sharing button
youtube-white sharing button
'Third World War has begun:' Ex-Ukraine military commander-in-chief Valery Zaluzhny | UK-India Free Trade Agreement negotiations to resume in early 2024 | UK can arrest Benjamin Netanyahu if he visits country based on ICC warrant | Centre to send over 10,000 additional soldiers to violence-hit Manipur amid fresh violence | Chhattisgarh: 10 Maoists killed during encounter with security forces in Sukma
New vulnerabilities soar, OT attacks on the rise and cryptominers reign supreme: Report

New vulnerabilities soar, OT attacks on the rise and cryptominers reign supreme: Report

| @indiablooms | 29 Jan 2019, 10:20 am

San Jose, Jan 29 (IBNS): Skybox Security, a global leader in cybersecurity management, on Tuesday announced the release of its latest Vulnerability and Threat Trends Report which analyzes the vulnerabilities, exploits and threats in play over the previous year.

The report, compiled by the team of security analysts at the Skybox® Research Lab, aims to help organizations align their security strategy with the reality of the current threat landscape.

What stands out first from the data is the sheer volume of new vulnerabilities published in 2018.

The National Vulnerability Database (NVD) assigned 16,412 new CVEs, a 12-percent increase over the previous year.

That may seem like a small climb, but the 2017 figure was already an all-time high, and Skybox Director of Threat Intelligence Marina Kidron believes these record-breaking figures are the new normal.

“It would come as no surprise if 2019 breaks the CVE record again,” said Kidron. “While more resources in vulnerability research is what’s driving these high numbers, that’s cold comfort to CISOs trying to keep their organization safe. The challenge of answering, ‘What do I fix today?’ is only getting harder — unless you have the right information to contextualize this mountain of data. That’s what drives the work we’re doing and why we publish the report.”

Ron Davidson, Skybox CTO and vice president of R&D, echoed a similar sentiment: “If you’re hanging your vulnerability management strategy on fixing CVSS critical- or high-severity vulnerabilities, 2018 added about 9,000 vulnerabilities to that list; it’s simply no longer practical to ‘focus’ attention on this large group. Exploitability — what’s being used in the wild, what sample code is available — is a more important indicator of what should get attention first. It’s something many vulnerability management programs lack, so their resources are going in the wrong place and they’re not moving the needle on risk.”

Other findings of the report include risks to the growing attack surface, including operational technology (OT) networks. Attacks on OT continue to climb with a 10-percent increase between 2017 and 2018. While these attacks range in motive and impact, the WannaCry outbreak in Taiwan Semiconductor Manufacturing Companywas a prime example of how a cybercriminal tool like ransomware, nation-state threats and internal exposure can create the perfect storm to wreak havoc on a network, as well as a company’s bottom line.

The report also warns of a false sense of security in cloud networks. While security of clouds is relatively strong, misconfiguration issues within them can still abound and security issues can arise within the applications used to manage such networks.

A number of examples can be given of attacks on cloud networks, but a notable one from 2018 targeted Tesla’s Amazon Web Services network.

While attackers could have accessed a variety of information, they instead used the opportunity to launch a malicious cryptominer, pointing to a larger trend in the threat landscape of stealing computational power rather than data. In 2017, ransomware reigned supreme accounting for 28 percent of malware attacks, while cryptominers only made up 9 percent.

Those figures essentially flipped in 2018, with ransomware dropping to 13 percent of malware attacks and cryptominers soaring to 27 percent.

“While cryptomining may seem like a relatively innocuous, low-priority threat, it’s important to remember that these attacks slow down system processes and may overwhelm system capacity,” said Skybox Senior Security Analyst Sivan Nir. “More than that, it’s impossible to predict what the attacker’s end goal may be. The cryptominer may be only part of a larger attack structure. By letting them set up home in your network, you’re inviting them to try to gain access to other parts of your environment.”

Whether protecting against cryptominers, threats to the OT network or simply trying to keep up with what vulnerability to fix next, incorporating threat intelligence in vulnerability management programs will give organizations the edge they need to counter a dynamic threat landscape.

Support Our Journalism

We cannot do without you.. your contribution supports unbiased journalism

IBNS is not driven by any ism- not wokeism, not racism, not skewed secularism, not hyper right-wing or left liberal ideals, nor by any hardline religious beliefs or hyper nationalism. We want to serve you good old objective news, as they are. We do not judge or preach. We let people decide for themselves. We only try to present factual and well-sourced news.

Support objective journalism for a small contribution.
Related Images
Xi Jinping, Putin in Russia 22 Mar 2023, 02:56 pm
Related Videos