F-Secure research highlights increase in attacks in 2018

F-Secure research highlights increase in attacks in 2018

F-Secure’s research highlights increase in attacks but survey data shows companies still struggle with incident detection

New research from cybersecurity provider F-Secure has reported a significant increase in attack traffic in the latter half of 2018. But while attacks are increasing, it seems many companies are struggling with incident detection.

Attack traffic observed by F-Secure’s network of decoy honeypots in 2018 increased by 32% over the previous year and increased fourfold in the latter half of 2018 compared with the first half of the year.

Recent survey data suggests that many companies may not have the visibility they need to catch attacks that make it past preventative measures like firewalls and endpoint protection. F-Secure’s survey found that 22% of companies did not detect a single attack in a 12-month period, while 20% of respondents detected a single attack during that time frame and 31% detected two to five attacks.

F-Secure’s detection and response solutions detected 15 threats in a single month at a company with 1,300 endpoints and seven threats in a single month at a company with 325 endpoints.

Roughly one third of F-Secure’s survey respondents indicated that they were using a detection and response solution or service.

None of these trends surprise F-Secure’s Vice President of Cyber Security Products Research and Development, Leszek Tasiemski.

He said: “Today’s threats are completely different from 10 or even five years ago. Preventative measures and strategies won’t stop everything anymore, so I’ve no doubt that many of the companies surveyed don’t have a full picture of what’s going on with their security.

“Many organisations don’t really value security until an incident threatens to cost them a lot of money, so I’m not completely surprised that there are companies detecting zero attacks over the course of a year.”

Additional highlights in F-Secure’s research include:

  • Telnet was the most commonly targeted TCP port, which is likely the result of increasing numbers of compromised Internet-of-things devices searching for additional vulnerable devices
  • Companies working in finance and ICT detected the most attacks, while organisations in healthcare and manufacturing detected the fewest
  • The largest source and destination of observed attack traffic were US-based IP addresses
  • Nginx was the most popular source of web-based attacks

“We find that companies running detection and response solutions tend to have a better grasp of what they’re doing right and what they’re doing wrong. Ideally, the visibility these solutions have will show companies that they’re blocking most of the standard, opportunistic attacks, like the ones our public honeypots usually attract,” added Tasiemski

“But these solutions will also pick up what preventative measures like firewalls or endpoint protection misses, which makes detection and response a pretty invaluable part of a healthy security strategy.”

Click below to share this article

Browse our latest issue

Intelligent CISO

View Magazine Archive