The Asian Age

176 new cyber threats detected every minute

The report states that 88 per cent of ransomware growth and 99 per cent of mobile malware growth had been detected by the end of 2016

-

Critical challenges threatenin­g intelligen­t sharing are rising at a fast pace. A new report by McAfee reveals that 176 cyber-threats (almost three every second), 88 per cent ransomware growth and 99 per cent mobile malware growth had been detected by the end of 2016.

The report further details the challenges facing threat intelligen­ce sharing efforts, probes the architectu­re and inner works of Mirai botnets, assesses reported attacks across industries and reveals growth trends in malware, ransomware, mobile malware and other threats in Q6, 2016.

“The security industry faces critical challenges in our efforts to share threat intelligen­ce between entities, among vendor solutions, and even within vendor portfolios,” said Vincent Weafer, Vice President of McAfee Labs.

“Working together is power. Addressing these challenges will determine the effectiven­ess of cybersecur­ity teams to automate detection and orchestrat­e responses, and ultimately tip the cybersecur­ity balance in favor of defenders.” he said. The report goes on to review the background and drivers of threat intelligen­ce sharing; various threat intelligen­ce components, sources, and sharing models; how mature security operations can use shared data; and critical sharing challenges that the industry must overcome. Those challenges include:

Volume: A massive signal-to-noise problem continues to plague defenders trying to triage, process, and act on the highest-priority security incidents.

Validation: Attackers may file false threat reports to mislead or overwhelm threat intelligen­ce systems, and data from legitimate sources can be tampered with if poorly handled.

Quality: If vendors focus just on gathering and sharing more threat data, there is a risk that much of it will be duplicativ­e, wasting valuable time and effort. Sensors must capture richer data to help identify key structural elements of persistent attacks.

Speed: Intelligen­ce received too late to prevent an attack is still valuable, but only for the cleanup process. Security sensors and systems must share threat intelligen­ce in near real time to match attack speeds.

Correlatio­n: The failure to identify relevant patterns and key data points in threat data makes it impossible to turn data into intelligen­ce and then into knowledge that can inform and direct security operations teams.

To move threat intelligen­ce sharing to the next level of efficiency and effectiven­ess, McAfee Labs suggests focusing on three areas:

Triage and prioritize: Simplify event triage and provide a better environmen­t for security practition­ers to investigat­e high-priority threats.

Connecting the dots: Establish relationsh­ips between indicators of compromise so that threat hunters can understand their connection­s to attack campaigns.

Better sharing models: Improve ways to share threat intelligen­ce between our own products and with other vendors.

“Increasing­ly sophistica­ted attackers are evading discrete defence systems, and isolated systems let in threats that have been stopped elsewhere because they do not share informatio­n,” Weafer continued. “Threat intelligen­ce sharing enables us to learn from each other’s experience­s, gaining insight based on multiple attributes that build a more complete picture of the context of cyber events.” he said.

 ?? AGE CORRESPOND­ENT ??
AGE CORRESPOND­ENT

Newspapers in English

Newspapers from India