Ransomware piercing the anti-virus bubble

Similar documents
2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

A Simple Guide to Understanding EDR

2015 VORMETRIC INSIDER THREAT REPORT

Cybersecurity and Hospitals: A Board Perspective

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

RANSOMWARE PROTECTION. A Best Practices Approach to Securing Your Enterprise

COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE

Designated Cyber Security Protection Solution for Medical Devices

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

AND FINANCIAL CYBER FRAUD INSTITUTIONS FROM. Solution Brief PROTECTING BANKING

Building Resilience in a Digital Enterprise

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

RSA NetWitness Suite Respond in Minutes, Not Months

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

CROWDSTRIKE FALCON FOR THE PUBLIC SECTOR

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS

The State of Cybersecurity and Digital Trust 2016

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

THE CYBERSECURITY LITERACY CONFIDENCE GAP

HOSTED SECURITY SERVICES

U.S. State of Cybercrime

THE CLOUD SECURITY CHALLENGE:

with Advanced Protection

HEALTH CARE AND CYBER SECURITY:

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat

Are we breached? Deloitte's Cyber Threat Hunting

THE ACCENTURE CYBER DEFENSE SOLUTION

Samu Konttinen, CEO, F-Secure WE ARE F-SECURE. 1 F-Secure

Managed Endpoint Defense

STATE OF THE NETWORK STUDY

Combating Cyber Risk in the Supply Chain

YOUR DATA UNDER SIEGE: GUARD THE GAPS WITH PATCH MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next

HOW TO HANDLE A RANSOM- DRIVEN DDOS ATTACK

Power of the Threat Detection Trinity

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

Mastering The Endpoint

Case Study. Top Financial Services Provider Ditches Detection for Isolation

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE

Cyber fraud and its impact on the NHS: How organisations can manage the risk

Top 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)

Proofpoint, Inc.

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

The UK s National Cyber Security Strategy

3 Ways to Prevent and Protect Your Clients from a Cyber-Attack. George Anderson Product Marketing Director Business October 31 st 2017

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

CA Host-Based Intrusion Prevention System r8

CYBER RESILIENCE & INCIDENT RESPONSE

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Machine-Powered Learning for People-Centered Security

BETTER Mobile Threat Defense (BMTD)

CYBER SECURITY TAILORED FOR BUSINESS SUCCESS

Vendor Risk Management. How to Confront Third-Party Cyber Risk in Your Supply Chain

Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs

Advanced Threat Protection Buyer s Guide GUIDANCE TO ADVANCE YOUR ORGANIZATION S SECURITY POSTURE

Are you safe? Your business growth strategies are at the heart of the cyber risks your organization faces

Gujarat Forensic Sciences University

RSA INCIDENT RESPONSE SERVICES

Protecting your next investment: The importance of cybersecurity due diligence

New Zealand National Cyber Security Centre Incident Summary

T-SURE VIGILANCE CYBER SECURITY OPERATIONS CENTRE

AT&T Endpoint Security

Service Provider View of Cyber Security. July 2017

Security-as-a-Service: The Future of Security Management

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Why Machine Learning is More Likely to Cure Cancer Than to Stop Malware WHITE PAPER

The Cyber War on Small Business

The Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1

The New Era of Cognitive Security

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Executive Insights. Protecting data, securing systems

CLOSING THE 1% GAP THAT S COSTING YOU MILLIONS

accelerate your ambition Chris Jenkins

Managing EUC Threats. 3 Simple Ways To Improve Endpoint SECURITY

Building a Threat Intelligence Program

Security Awareness Training Courses

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Securing Digital Transformation

R E P O R T. Cybersecurity in healthcare: The diagnosis. 1 Report Security in Healthcare: The diagnosis

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

RSA INCIDENT RESPONSE SERVICES

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

Building Resilience to Denial-of-Service Attacks

What is Penetration Testing?

Evolving the Security Strategy for Growth. Eric Schlesinger Global Director and CISO Polaris Alpha

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

whitepaper How to Measure, Report On, and Actually Reduce Vulnerability Risk

Changing the Game: An HPR Approach to Cyber CRM007

Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses

Mapping traditional AV detection failures. October 2017

DDoS MITIGATION BEST PRACTICES

Panda Security 2010 Page 1

Cybersecurity, Trade, and Economic Development

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

Cyber Security Trends A quick guide

CYBER SOLUTIONS & THREAT INTELLIGENCE

Clarity on Cyber Security. Media conference 29 May 2018

Transcription:

CONNECT Ransomware piercing the anti-virus bubble Better prevention is needed to protect organizations from the growing threat landscape

2 The WannaCry ransomware attack that had such a widespread and damaging effect on public and private sector organizations around the world highlights the challenge IT departments face in protecting themselves against new cyber threats, which are constantly evolving and expanding. Even organizations that weren t hit directly by the ransomware felt the effects of the attack as the business operations of their impacted suppliers, distributors, or other business-related partners were halted while they coordinated remediation efforts. In the UK, 61 National Health Service (NHS) Trusts were infected by WannaCry, with medical staff left unable to access patient record systems and other critical data on a busy weekday morning. The incident led to numerous appointments and operations being cancelled or postponed, impacting patient care with potentially life or death consequences. The attack also hit Spanish telecommunications provider Telefónica, automakers Nissan and Renault, German railway operator Deutsche Bahn, FedEx, and the Russian Interior Ministry. This incident was the largest scale ransomware infection in history. European law enforcement agency Europol estimated over 200,000 computers in 150 countries were affected. Complacency creates opportunity for attack The criminal hackers that unleashed WannaCry modified a tool developed by the US National Security Agency called EternalBlue to exploit a vulnerability in Microsoft operating systems. Shortly after being notified of the vulnerability, Microsoft issued security bulletin MS17-010 on March 14, 2017, but many organizations had still not installed the updates by the time WannaCry hit on Friday May 12th, nearly two months after the patches had been made available. The issue of performing timely patch management highlights the similar challenge many IT professionals face in continually evaluating their existing security tools to ensure they are able to combat the latest threats

3 Endpoint security needs to work in the face of overburdened security operations Security solutions that require constant attention, maintenance, and tuning to maintain effectiveness are difficult, if not impossible, for organizations to sustain. For example, legacy AV solutions that must always be connected to the internet to receive updates to ensure protection or that require patches to immediately be installed or policies adjusted, fail to deliver protection that fits how today s overextended security operations function. The scale of the cyber security management overhead is a common theme across different industries and geographies. The IDG Connect survey found that between 69 and 71 percent of US organizations spend over ten hours a week deploying security patches and upgrades, and also identifying networking, application and system vulnerabilities before they are exploited. Yet despite all the time and effort being spent on threat prevention, attacks are still getting through. More ransomware attacks on the way Ransomware is a growing menace, with tools easily leased as on-demand, cloud-hosted malwareas-a-service kits, enabling attacks to be conducted by enthusiastic amateurs with very little technical skills. In its 2017 Data Breach Incident Report (DBIR), Verizon documents over 42,000 cyber security incidents and 1,900 data breaches experienced by 65 organizations in 84 countries, and calculates that ransomware incidents specifically surged 50 percent in 2016 compared to the previous year. That growth in the volume and sophistication of ransomware attacks is widely expected to continue in 2017 and 2018. Malwarebytes predicts that while ransomware attacks today are launched indiscriminately against as many organizations as possible to maximize financial gains, that is likely to change. Attacks will become increasingly targeted and personalized as hackers identify vulnerable business and consumer users and find new avenues of extortion by not only encrypting files but threatening to expose personal data or individually sensitive information.

4 Existing approaches need to critically analyze With so many high profile incidents of ransomware and other data security breaches generating news headlines around the world (often to the detriment of the affected organization s reputation and revenue), it is no surprise that companies are starting to change their approach to securing their endpoints. In a report Market Insight: Security Market Transformation Disrupted by the Emergence of Smart, Pervasive and Efficient Security published earlier this year, research company Gartner noted a shift in cyber security investment which sees organizations putting more money into new approaches to threat prevention, detection and response. CISOs are reevaluating where to invest their cybersecurity funds due to the pressing growth and success of effective ransomware and advanced fileless attacks. Legacy all-in-one endpoint protection platforms (EPP) that include nonmalware detection features, such as port control and data protection, are being deprioritized in favor of investments in threat detection layers that deliver cyber resiliency against unknown malware attacks. To get a sense of the investment shift, Gartner forecasts that global spending on information security will exceed $90bn in 2017, and reflect a balance between risk and resilience as companies seek to improve threat prevention and blocking as well as damage limitation. The market for endpoint protection solutions is forecasted to grow from US$4.8bn to US$5.8bn between 2017 and 2020 (Radicati Group). IDC predicts that large organizations will invest heavily in upgrading existing endpoint protection solutions over the next couple of years, with spending on corporate endpoint security worth $4.2bn this year set to grow at a compound annual growth rate (CAGR) of 5.2%. Research conducted by IDG Connect on behalf of Malwarebytes published earlier this year confirms that existing cyber security defenses fail frequently. The survey of 200 senior IT staff working for US organizations carried out by the company revealed that 64 percent had been impacted by a ransomware attack in 2016. The consistent, predictable failures by the traditional AV solutions have forced security practioners to re-evaluate their endpoint strategy. The increased expenditure is largely targeted towards new malware detection techniques to detect what their existing solutions are missing.

5 Best practices for endpoint security In light of successful ransomware and multi-vector attacks, organizations should initiate some key planning to manage the risk associated with threats to the endpoint: 1. Investigate the types of threats facing your organization Review the threat intelligence reports from your security operations center and categorize the endpiont remediations by the attack s tactics, techniques and procedures (TTPs). What attacks are getting through and why? 3. Deprioritize the features that don t align with the malicious attacks you re seeing today Based on the attacks on the endpoint, an organization s endpoint protection platform features should focus on protecting the enterprise from malicious adversaries. Therefore, reevaluate the need for your endpoint security to incorporate periphery market capabilities, such as disk encryption and USB device controls and mobile device management (MDM). 2. Prioritize endpoint protection featueres that align to those threats If your data shapes a picture like most organizations, the majority of attacks are unknown malware. Many dynamic detection capabilities exist to secure the endpoint against these attacks. Nonsignature-based methods that apply techniques like behavioral analysis and anomaly detection are proactive in their prevention capabilities and provide higher threat coverage to protect against the majority of cyberattacks before they execute and cause damage.

6 Conclusion Every indication is that the scale and sophistication of ransomware attacks and other types of malware will increase as different groups criminal hackers, amateur enthusiasts, and even statesponsored attackers find new ways of exploiting security vulnerabilities, extracting cash, and causing commercial disruption on a massive scale. The large number of organizations impacted by WannaCry demonstrates the extent to which existing defenses often fail to protect data and systems from new strains of attack, and will continue to fall short unless IT departments can identify fresh approaches to cyber security that minimize their risk of being caught out. In the face of overburdened security operations, organizations should assume that allocating more resource time to endpoint security management will not provide a short or longterm fix to the growing tide of complex, multi-vector attacks. Instead, organizations should reevaluate if their endpoint protection is providing the right security-focused capabilities and make the necessary shifts in investment for detection techniques that provide the highest efficacy for ransomware and unknown malware.