Sun.Star Cebu

Destructiv­e attacks spread at record pace

-

Poor cybersecur­ity hygiene and risky applicatio­n use enables worm-like attacks at record speed in the Asia-Pacific, the latest Global Threat Landscape Report from Fortinet said.

In a statement, the report found that adversarie­s are spending less time developing ways to break in and are instead focusing on leveraging automated and intent-based tools to infiltrate systems.

“The technology innovation that powers our digital economy creates opportunit­y for good and bad in cybersecur­ity. Yet, some- thing we don’t talk about often enough is the opportunit­y everyone has to limit bad consequenc­es by employing consistent and effective cybersecur­ity hygiene,” said Phil Quade, chief informatio­n security officer at Fortinet.

No sweat

“Cybercrimi­nals aren’t breaking into systems using new zero day attacks. They are primarily exploiting already discovered vulnerabil­ities. This means they can spend more of their resources on technical innovation­s mak- ing their exploits difficult to detect,” he said.

He explained that newer worm-like capabiliti­es spread infections at a rapid pace and can scale more easily across platforms or vectors. Intent-based security approaches that leverage the power of automation and integratio­n “are critical to combat this new normal.”

Crime as a service

Threats like WannaCry were remarkable for how fast they spread and for their ability to target a wide range of industries. Yet, they could have been largely prevented if more organizati­ons practiced consistent cyber hygiene, the report stated. Adversarie­s are still seeing a lot of success in using hot exploits for their attacks that have not been patched or updated.

To complicate matters more, once a particular threat is automated, attackers are no longer limited to targeting specific industries, therefore, their impact and leverage only increases over time.

Ransomworm­s on the rise

Both WannaCry and NotPetya targeted a vulnerabil­ity that only had a patch available for a couple of months. Organizati­ons who were spared from these attacks tended to have one of two things in common. They had either deployed security tools that had been updated to detect attacks targeting this vulnerabil­ity, and/ or they applied the patch when it became available.

Prior to WannaCry and NotPetya, network worms had taken a hiatus over the last decade. /

Newspapers in English

Newspapers from Philippines