Story image

Hackers speak out: New study turns security stats on their head

27 Feb 2017

Nuix has released its inaugural Black Report - one that takes the flipside approach to the mass of cybersecurity reports by looking at the hackers themselves.

66% of hackers and penetration testers like the challenge of hacking vulnerable systems, 23% do it for fun and profit, 9% do it for the money and 3% are ‘idealogues’. 29% of hackers work for medium size businesses of between 500 to 4999 people.

88% of hackers said they could get through security systems and compromise a target in fewer than 12 hours. 81% said they could both identify and take valuable data within another 12 hours. 

The study also confirms suspicions that attack methods are becoming ever more unique, with 50% of hackers changing their attack methods for every target. These limit the protection capabilities of solutions that only use known files and attack methods for their defence systems. 

What’s more, IT security teams are shown to be inefficient at catching attackers, with 69% of hackers stating that security teams almost never caught them in the act, while almost one third of respondents never detected attacks at all.

“Data breaches take an average of 250–300 days to detect—if they’re detected at all—but most attackers tell us they can break in and steal the target data within 24 hours. Organisations need to get much better at detecting and remediating breaches using a combination of people and technology,” comments Chris Pogue, Nuix CISO and Black Report co-author.

75% of organisations conduct limited remediation after a penetration tests, only fixing critical issues but ignoring all others.

Hackers have also confirmed that traditional security solutions such as firewalls and antivirus rarely slowed hacking progress, but endpoint security technologies are much more effective at stopping attacks. 

“If your defensive countermeasures are less flexible than the people trying to get around them, they have little to no chance of being effective; you will be protecting against an attack pattern that is no longer relevant. This underscores the importance of incorporating realistic, goal-oriented penetration testing into your security program. Only by continuously evaluating and enhancing your security countermeasures can you follow constantly shifting attack strategies,” the report says.

Nuix conducted the confidential study at DEFCON, the world’s largest hacking and security conference.    

WhatsApp users warned to change voicemail PINs
Attackers are allegedly gaining access to users’ WhatsApp accounts by using the default voicemail PIN to access voice authentication codes.
Swiss Post asks public to hack its e-voting system
Switzerland’s postal service Swiss Post is inviting keen-eyed security experts and white hats to hack its e-voting system.
Spoofs, forgeries, and impersonations plague inboxes
It pays to double check any email that lands in your inbox, because phishing attacks are so advanced that they can now literally originate from a genuine sender’s account – but those emails are far from genuine.
Flashpoint signs on emt Distribution as APAC partner
"Key use cases that we see greatly benefiting the region are bolstering cybersecurity, combating insider threats, confronting fraud, and addressing supply chain risk, to name a few."
The attack surface: 2019's biggest security threat
As businesses expand, so does their attack surface – and that may be the biggest cybersecurity risk of them all, according to Aon’s 2019 Cyber Security Risk Report.
Opinion: Cybersecurity as a service answer to urgent change
Alan Calder believes a CSaaS model can enable a company to build a cyber resilience strategy in a coherent and consistent manner.
Why SD-WAN is key for expanding businesses - SonicWall
One cost every organisation cannot compromise on is reliable and quick internet connection.
New threat rears its head in new malware report
Check Point’s researchers view Speakup as a significant threat, as it can be used to download and spread any malware.