Rudimentary Attacks Pose Greatest Risk to Midsized Organizations According to New Threat Report

eSentire SOC Analyzes Nearly 5 Million Attacks Across Hundreds of Midmarket Organizations in 2016

Rudimentary Attacks Pose Greatest Risk to Midsized Organizations According to New Threat Report


eSentire SOC Analyzes Nearly 5 Million Attacks Across Hundreds of Midmarket Organizations in 2016

CAMBRIDGE, ONTARIO - May 4, 2017 - Rudimentary attacks, such as intrusion attempts, information gathering, and policy violations pose the greatest risk to midsized organizations, according to a recent cyber threat report by eSentire, Inc., the largest pure-play Managed Detection and Response (MDR) provider.

Produced by eSentire's Threat Intelligence team, the "2016 Midmarket Threat Summary Report" provides an overview of the cyber threats investigated by the eSentire Security Operations Center (SOC) in 2016. The report addresses three key areas: threat types, threat volume, and attack types. The analytical assessment includes visual data analysis, written analytical evaluations, practical recommendations, and key analytical assumptions, providing threat perspective for business leaders in small and midsize enterprises, and actionable takeaways to help leaders strategically reduce the risk of cyber attacks.

"In 2016, the eSentire SOC detected almost 5 million attacks across hundreds of primarily small to medium organizations, spanning multiple industries," said Viktors Engelbrehts, director of threat intelligence at eSentire. "Cybercriminals are attracted to easy targets because they are low risk, high reward, and require little effort to execute. However, available evidence suggests that the majority of opportunistic cyber-attacks against mid-sized businesses can be prevented by applying basic best practice security principles."

Key Findings

• March to April and September to October were the most intense periods of threat events throughout the year, with March being the most active month, and June to July being the least active.
• The most often observed threat categories were Intrusion Attempts, Information Gathering, and Policy Violations, representing 63% of all observed attacks.
• Intrusions Attempts (primarily web attacks) was the top-ranking threat category, representing almost 30% of all observed events.
• The top attack methods in the Intrusion Attempts category involve exploiting a Shellshock vulnerability (CVE-2014-6271), representing approximately 60% of all intrusion attempts.
• OpenVAS remains the most prominent tool used for information gathering purposes, with 62% of all events attributed to this category. Attacks against the Secure Shell (SSH) protocol remain the second highest threat in this category, with 21% of all events attributed to attempts to guess or brute force passwords.
• Web-based attacks and network scanning continue to increase as widely adapted automated tools allow a hands-off approach by threat actors.

Key Takeaways

• Rudimentary attacks pose the greatest risk - cybercriminals are moving away from sophisticated malicious code attacks, with the majority of attackers preferring inexpensive and automated methods of intrusions, exploiting ‘low hanging fruit' (representing almost 30% of all observed events). This trend is expected to continue so long as these techniques are successful.
• Every organization is a target - with easier access than ever before to simple and automated tools, cybercriminals can quickly and easily stage attacks against every business. Attacks, such as ransomware, can reap financial gains without the painstaking effort required to identify and extract high value information from an organization's network.
• Detecting and disrupting the common methods and tools used will make attacks less effective, directly impacting cybercriminal rationale when choosing attack targets. This includes steps to minimize the attack surface and tailoring of security controls.
• Organizations can use seasonal threat trends to align security efforts to their advantage. For example, security awareness training is most effective when applied between December to March, ahead of the busiest time for threat activity, which is March to April.

Methodology

The eSentire Threat Intelligence team used data gathered from 1,500+ proprietary network and host-based detection sensors distributed globally across multiple industries. Raw data was normalized and aggregated using automated machine-based processing methods. Processed data was reviewed by a visual data analyst applying quantitative analysis methods. Quantitative intelligence analysis results were further processed by a qualitative intelligence analyst resulting in a written analytical product.

"Defending against evolving threats has never been more important for midsized organizations working to guard against financial and reputation-based risk. By addressing the recommendations listed in eSentire's 2016 Midmarket Threat Summary Report, business leaders will be equipped to disrupt threat opportunities, as opposed to remediating financial damage caused by attacks," said Mark McArdle, eSentire CTO.

Access eSentire's complete threat summary report here: "eSentire 2016 Midmarket Threat Summary".

About eSentire:
eSentire® is the largest pure-play Managed Detection and Response (MDR) service provider, keeping organizations safe from constantly evolving cyber-attacks that technology alone cannot prevent. Its 24x7 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business disrupting events. Protecting more than $3 trillion in corporate assets, eSentire absorbs the complexity of cybersecurity, delivering enterprise-grade protection and the ability to comply with growing regulatory requirements. For more information, visit www.esentire.com and follow @eSentire.

Products, service names, and company logos mentioned herein may be the registered trademarks of their respective owners. All rights reserved.

PR Contacts:
Angela Tuzzo
MRB Public Relations for eSentire
+1 732.758.1100, x. 105
atuzzo@mrb-pr.com

Mandy Bachus
eSentire Corporate Communications
+1 226.338.7135
mandy.bachus@esentire.com

###

Featured Product

IntraSonic Technology - I2000 Music Distribution and Intercom System

IntraSonic Technology - I2000 Music Distribution and Intercom System

Get wired for sound throughout your home with a new state-of-the-art communications and entertainment system! The I2000 Music Distribution and Intercom Systems provide a wide variety of features at an affordable price so you can enjoy the luxury of music throughout every room in your home without moving a muscle. Interested in wireless music streaming? See our optional Bluetooth Receiver