Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

[Infographic] M-Trends 2016


Published on

M-Trends 2016 provides trends, statistics and case studies to illustrate how advanced threat actors have evolved over the past year. The annual report was compiled by consultants at Mandiant and is based on hundreds of incident response investigations in more than 30 industry sectors. View the infographic to get the latest cover attacker trends and industry targets. For more information on Mandiant consulting services, visit

Published in: Technology
  • Be the first to comment

  • Be the first to like this

[Infographic] M-Trends 2016

  1. 1. 2015 was the year of more. More breaches became public than in any prior year, and more cyber threat groups were at work around the world with a wider array of motives. The groups infiltrated and destroyed systems, stole personal information and targeted networking devices. This resulted in more stress for those who had to deal with the loss of data and reputation, more time and money spent in recovering from an attack and more reasons for organizations to strengthen their security posture. BY THE NUMBERS THREAT LANDSCAPE: MANDIANT CONSULTING / M-TRENDS 2016 ENERGY 1% AGRICULTURE AND FORESTRY 1% HIGH TECH 13% GOVERNMENT AND INTERNATIONAL ORGANIZATIONS 3% LEGAL SERVICES 3% TRANSPORTATION 3% BUSINESS AND PROFESSIONAL SERVICES 11% MEDIA AND ENTERTAINMENT 11% FINANCIAL SERVICES AND INSURANCE 10% RETAIL 10% EDUCATION 8% BIOTECHNOLOGY AND PHARMACEUTICALS 7% CONSTRUCTION AND ENGINEERING 6% HEALTHCARE 5% AEROSPACE AND DEFENSE 5% TELECOMMUNICATIONS 2% ORGANIZATIONS MORE VIGILANT ABOUT DISCOVERY In 2015, the median time from compromise to discovery was cut by 59 days, down from 205 days. TIME FROM COMPROMISE TO DISCOVERY MEDIAN EXTERNAL NOTIFICATION INTERNAL DISCOVERY 146DAYS 320DAYS 56DAYS MORE LESSONS LEARNED A year of disruptive breaches resulted in new lessons regarding defense and response. 1 Confirm there is a breach. 6 Engage experts before a breach for forensic, legal and PR support. 2 Remember: you’re dealing with human adversaries. They can be unpredictable. 7 Consider all options when asked to pay a ransom. There are no guarantees. 3 Timing is critical — validate and scope the breach, fast. 8 Ensure strong segmentation and controls over your backups. 4 Stay focused — you’re racing against time. 9 After an incident has been handled, focus on broader security improvements. 5 Carefully evaluate whether to confront an attacker (see lesson 2). 10 If you kick the attackers out, be prepared: they may come back. LEARN MORE Get the M-Trends 2016 special report at FireEye, Inc. 1440 McCarthy Blvd. Milpitas, CA 95035 408.321.6300 / 877.FIREEYE (347.3393) / © 2016 FireEye, Inc. All rights reserved. FireEye is a registered trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners. INFO.MTRENDS.EN-US.032016 Disrupting business Stealing personally identifiable information Attacking routers and switches THREE NEW TRENDS APPEARED IN 2015: Using persistence mechanisms Targeting outsourced service providers TWO OLD TRENDS CONTINUED: THE YEAR IN ATTACKS 47% 53% External Notification Internal Discovery MORE BREACHES DISCOVERED INTERNALLY Compared to 2014, the percentage of victims discovering a breach internally rose 16%. 16% INDUSTRIES WHERE MANDIANT INVESTIGATED Percentage of total attacks by industry. MORE AND LESS Some industries saw an increase in attacks compared to 2014. Some saw a decrease. HIGH TECH BUSINESS AND PROFESSIONAL SERVICES 6%6%