sb-au logo
Story image

Using layered security to stay safe over the holidays

18 Dec 2018

Holidays are a particularly active time for cybercriminals as large volumes of transactions are conducted online.

The days leading up to the festive season are prime time for attackers to build malware, ransomware, and phishing campaigns to prey on holiday shoppers.

SonicWall found that at a macro level, malware attacks dipped in 2018, while ransomware, phishing and cryptojacking attacks all increased significantly.

Over the nine-day Thanksgiving holiday shopping window from November 19 to 27,  it found that its customers faced:

  • 91 million malware attacks (34% decrease over 2017)
  • 889,933 ransomware attacks (432% increase over 2017)
  • 45% increase in phishing attacks compared to the average day in 2018

As online shopping becomes increasingly convenient and accessible, more and more consumers are doing their Black Friday shopping online instead of in brick-and-mortar stores.

According to Reuters, online sales surpassed $6 billion on Black Friday in the US — a 23% jump over last year.

At the same time, SonicWall’s Capture Labs threat researchers recorded 28 times more ransomware attacks on Black Friday compared to last year.

As cyber criminals become more aggressive, organisations need to seriously consider taking a layered approach to cybersecurity in order to keep themselves safe.

How layered security protects the enterprise

A layered approach means having different levels of security measure that systematically filters out different types of threat as information is accessed by the user

SonicWall CEO Bill Conner and CTO John Gmuender explain how layered security works, from the firewall to real-time deep memory inspection.

Conner says that most of SonicWall’s competitors fail on not putting the firewall on non-standard ports which, malware writers take advantage of.

“If your firewall doesn't analyse non-standard ports, it's a huge gap.”

He adds that many of them don't turn them on more ports because performance goes down when they do.

DPI-SSL 

In 2017, there were over 1000 encrypted threats per SonicWall customer.

The second layer of security is Deep Packet Inspection of Secure Socket Layer (DPI-SSL).

Gmuender says, “If you have a connection using SSL, it's encrypted. If malware is utilising a connection like that, you don't get visibility into the connection without DPI-SSL."

“Nothing else will help if it's still encrypted,” Conner adds.

Email Security 

Conner says that email is the number one way attackers infiltrate an organisation, with over 3000 phishing attacks being found per customer.

“They come in through either phishing, whale phishing or plain email; through pdfs, and through Microsoft Office applications.

Gmuender adds that SonicWall’s email security has integrated capture, meaning all the analysis happens locally in the solution.

Capture ATP Sandbox 

The next layer of security is the sandbox.

“Just on the traditional sandbox engine, virtualisation, hypervisor and emulation, we're up to a 1000 threats identified a day, and it's doubled in a year,” Conner says.  

The sandbox also contains the two percent of malicious files that get through the first three security layers.

Real-time deep memory inspection (RTDMI)

“I've spent a lot of time with governments and enterprises behind the curtain on what this is finding, and there are three key findings,” Conner says.  

The first finding is that the largest three items, in terms of vulnerabilities that aren't being seen by traditional sandboxing, are Microsoft Office applications, pdfs, and increasingly now, side-channel attacks – such as the fourth iteration of a side-channel on an Intel chip.

“So, you've heard of Meltdown, you've heard of Spectre, you've heard of Foreshadow, the last one just came - RTDMI is going to be the most important thing for small-to-medium businesses, enterprises, governments.”

Conner says in the next two years, these unknown malware attacks through pdf, Microsoft Office, and side channels are going to be dramatically increasing, and they're going to be extremely dangerous.

“And that's why we placed this capability behind every solution we have.”

Find out more in SonicWall's 2018 Cyber Threat Report.

Link image
Webinar: How to navigate an increasingly crowded field of security solutions
Tools need to be organised and managed, issues need to be explored and resolved and all of this takes money and time. Find out more in this immersive webinar.More
Story image
Proofpoint and CyberArk extend partnership to further safeguard high-risk users
“Our CyberArk partnership extension provides security teams with increased detection and enhanced adaptive controls to help prevent today’s most severe threats."More
Story image
Malware and email scams targeting employees spread rapidly in Q2
"Businesses must stay alert and should employ defense-in-depth tactics and equip themselves with multilayered security mechanisms, including high-sensor spam filters and a VPN connection, which would prevent malicious pages from opening."More
Link image
Why metrics should always be front of mind for CTOs
Metrics can help businesses collaborate effectively with other senior stakeholders and act on large volumes of business and system performance data.More
Story image
Fortinet’s ‘zero trust’ approach redefining security
Cornelius Mare, Fortinet A/NZ Director, Security Solutions, explains why taking a ‘zero trust network access’ approach to cybersecurity requires fully-integrated and comprehensive security services and policies.More
Story image
Cryptomining trojan malware discovered by ESET researchers
The malware, primarily targeting victims in Czechia and Slovakia, prioritises subterfuge through deployment of multiple techniques to avoid detection, and leans heavily on the Tor network and BitTorrent protocol to achieve its goals.More