Story image

Cryptojacking and failure to patch still major threats - Ixia

16 Apr 2019

Keysight has announced the third annual Security Report from Ixia, its cybersecurity and visibility business. 

The 2019 report analyses the biggest security findings over the past year from Ixia’s Application and Threat Intelligence (ATI) Research Center resulting from historic unpatched vulnerabilities, along with growing network and application complexity.

Key findings from the 2019 Security Report include:

  • Humans are the weakest link: In 2018, Ixia detected 662,618 phishing pages in the wild, and 8,546,295 pages hosting or infected by malware – so a successful attack requires only a single errant click on an email or link. A well-crafted and timed phishing attempt can encourage even savvy users to click on compromised links.  Successful defence depends on a combination of proactive user education, blocking phishing attacks and malware that cross the network edge, and detecting and blocking lateral movement in a network.
     
  • Cryptojacking activity continues to grow: This threat reached new peaks in 2018, with hackers combining multiple classic attacks to deliver nearly autonomous malware. Ixia honeypots captured several new exploits that run an EternalBlue scan, and when successful, deposit a cryptominer on the network.
     
  • Software security flaws caused the majority of product vulnerabilities: Ixia observed more new devices joining networks than ever before, but also more devices designed and deployed without proper measures to stop or even limit threats. Well-understood SQL injections and cross-site scripting vulnerabilities were used by bad actors to target web applications. Code sharing posed a risk despite efforts by the open source community to standardise controls and measures in web development.
     
  • Security vulnerability disclosures are a double-edged sword: Both hackers and vendors benefit when vulnerabilities are announced, particularly zero-day exploits. Mirai, Drupalgeddon and the D-Link DSL-2750B remote code execution vulnerability are examples where hackers were able to move faster than vendors and IT teams.
     
  • Cyber hygiene is at an all-time low: IT vendors created code or configurations that led to many successful security breaches in 2018, but IT operations and security personnel also shared the blame. Well-known attacks and attack vectors remained successful because security personnel did not address vulnerabilities and apply patches. This was successful primarily due to two factors: ignorance of the latest patches and challenges in deploying patches in a timely manner.

“Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018. Misconfigured security and access policies also were a major source of data breaches in 2018,” says Keysight Technologies Ixia application and threat intelligence senior director Steve McGregory.

“Network and application complexity pose serious security threats and create new vulnerabilities every day. Hackers continue to leverage the complexity as well as existing vulnerabilities and misconfigurations to their advantage.

“It has never been more important for organisations to take a proactive approach to identify and mitigate such flaws as thoroughly as possible.” 

Security Watchlist for 2019

Based upon Ixia-collected data and historical activity, the Ixia ATI team predicts the following six trends will pose the biggest threat to enterprises over the coming 18 months:  

  • Abuse of low-value endpoints will escalate
  • Brute-force attacks on public-facing systems and resources will increase
  • Cloud architectures create complexity that increases attack surfaces
  • Phishing will continue to evolve
  • Multiphase attacks that use lateral movement and internal traffic will increase
  • Cryptomining/ cryptojacking attacks will increase
Tech Data to distribute Nutanix backup solution in A/NZ
Tech Data will distribute HYCU Data Protection for Nutanix backup and recovery software to their network of partners across Australia and New Zealand.
Veeam releases v3 of its MS Office backup solution
One of Veeam’s most popular solutions, Backup for Office 365, has been upgraded again with greater speed, security and analytics.
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Tenable is hedging all of its security bets on the power of predictive, as the company announced general available of its Predictive Prioritisation solution within Tenable.io.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
WatchGuard announces A/NZ partners awards
Four Australian companies were named partner award winners at the WatchGuard conference in Vietnam.
Telstra’s 2019 cybersecurity report
Cybersecurity remains a top business priority as the estimated number of undetected security breaches grows.
Why AI and behaviour analytics should be essential to enterprises
Cyber threats continue to increase in number and severity, prompting cybersecurity experts to seek new ways to stop malicious actors.