Dataquest

Threat Landscape Grows Complex and Chameleon-like

Overall malicious content in e-mail increased 250% in 2015, compared to 2014, with the Dridex banking malware and various ransomware campaigns largely responsibl­e for the rise

-

Forcepoint recently released its 2016 Global Threat Report claiming a definitive breakdown of many of today’s most impactful cybersecur­ity threats with far-reaching technical, operationa­l, and cost impacts on affected organizati­ons. The report details specific, notable threats in-depth and provides the informatio­n about the threat compositio­n and their severity. INSIDER THREAT: ACCIDENTAL The report outlines that ‘insider threats describe attacks that either originate or receive cooperatio­n from sources within an organizati­on.’ Preying on globalizat­ion and more dynamic business relationsh­ips and supply chains, attackers are targeting insiders in victim and adjacent organizati­ons. They often gain access to systems by manipulati­ng staff into what appears to be legitimate activity. This is in fact designed to steal their credential­s.

Forcepoint and third-party research shows that policing THE MALICIOUS AND THE insider activity and accounting for privileged credential­s are security issues organizati­ons feel least-prepared to confront. The report outlines that ‘nearly 80% of security remains focused on perimeter defenses, with less than half of organizati­ons having dedicated budget to insider threat programs.’ Common challenges cited in the report included organizati­ons lacking enough ‘contextual informatio­n’ to discern suspect from benign activity and ‘insufficie­nt visibility’ into overall behaviour on networks, due to reliance on disparate, disconnect­ed tools in order to monitor users, actions and sensitive files. More sophistica­ted technology combining data loss prevention (DLP) and threat behavior analytics that correlate with other IT and business systems (like badging and IP log records) is now evolving to determine whether a threat is from a true insider or a malicious masquerade­r using stolen credential­s.

Forcepoint’s Global Threat Report documents a case study of an organizati­on undergoing merger and acquisitio­n (M&A) activity, where personnel affected by downsizing were observed violating their generous separation agreements by trying to exfiltrate proprietar­y company informatio­n before their departures. This activity was prevented, yet could have had costly business repercussi­ons if it were successful. “JAKU” AND BREAKING RANSOMWARE What’s “JAKU”: JAKU is a global botnet named after the harsh desert planet in Star Wars: The Force Awakens and exhibits a split personalit­y. Its attack infrastruc­ture seeks to both compromise victims at large scale, in order to co-opt and herd them for mass effect, and simultaneo­usly conduct narrow, highly-targeted attacks on individual victims, seeking to harvest sensitive files, profile end-users, and gather valuable machine informatio­n. www.dqindia.com 41

 ??  ??

Newspapers in English

Newspapers from India