Vulnerabilities targeted in exploit kits
Healthcare 24%
Business & professional services 15%
Manufacturing 6%
Government 8%
Retail 3%
Finance 4%
Other 5%
Education 35%
2015 Global Threat
Intelligence Report
An analysis of global security trends
• over 6 billion attacks
• trillions of logs
• over 18,000 clients
56% of attacks
originate from IP
addresses within
the US but
attackers could
be anywhere in
the world
• Finance sector still #1 target
with 18% of all detected attacks
Attacks have shifted
from application
to user
7 / 10 vulnerabilities
relate to end-user systems
Users connected
to public network
using personal,
and often more
vulnerable devices
End-user exploits
spike after weekends
/ holidays when
users reconnect
End-user systems
often have unpatched
vulnerabilities
• 76% of vulnerabilities
+ 2 years old
• 9% of those +10 years old
Data gathered from NTT security
companies and NTT’s live Global
Threat Intelligence Platform
Attack analysis
Attack sources
Attacks by sector
Malware attacks by sector
35% of all detected malware events hit education sector
The user is the perimeter
7/10
Software exploit kits sold in hacking forums 	 hackers take advantage
of unpatched flaws	 install malicious software on vulnerable devices
Cybercrime is
Changing profile of cybercriminals
Organised crime groups with
considerable resources and expertise
Attacks motivated by:
• profit
• botnet infrastructure
• extortion
• fame/notoriety
• hacktivism
Incident response & threat intelligence
Threat intelligence defined
• Incident response capabilities
maturing at a slow pace.
• 74% of organisations have no
formal incident response plan.
Average incident
response time
Organisations
with no
vulnerability
management
programme take
nearly 200 days to
patch vulnerabilities
with CVSS score
of 4.0 or more
The threat
intelligence cycle
Our approach to
successful threat
intelligence helps
numerous enterprises
stay protected
2. Raw information
collected based on
requirements
3. Information
processed  exploited
4. Intelligence
analysis
 production
1.Consumer needs,
planning, requirements
 direction
5. Dissemination
of product
to consumer
Finance
0%
2%
4%
8%
10%
12%
14%
16%
18%
6%
Business
professional
Manufacturing
Retail
Healthcare
Technology
Education
Government
Pharmaceuticals
Insurance
Transport
distribution
Gaming
Media
Hospitality,leisure
entertainment
Non-profit
Other
• Reconnaissance activity from 4% to 10%
• Crafted attacks on targeted victims more common
Java
Adobe Acrobat
Internet Explorer
Adobe Flash
Firefox
Windows
Silverlight
Others
Increased focus on Adobe Flash since security on Java
and Internet Explorer improved in 2014.
2013 2014110
100
90
80
70
60
50
40
30
20
10
0
dimensiondata.com/globalthreatreport #GlobalThreatReport
US
56% China
9%
France
2%
India
1.5%
Germany
2%
Netherlands
2%
Denmark
1.1%
Russia
2%
Ukraine
1.3%
Canada
0.9%
Australia
9%
Rest 9%
• Attacks on business  professional
services up from 9% to 15% - easier,
but high-value targets for attackers
$$ $
Other 5%
Known Bad Source 3%
Evasion Attempts 3%
DoS / DDoS 5%
Application
Specific Attack 7%
Reconaissance 10%
Anomalous Activity 20%
Network Manipulation 18%
Web Application Attack 15%
Service Specific Attack 14%
Attacks by type
UK
3%

2015 Global Threat Intelligence Report - an analysis of global security trends

  • 1.
    Vulnerabilities targeted inexploit kits Healthcare 24% Business & professional services 15% Manufacturing 6% Government 8% Retail 3% Finance 4% Other 5% Education 35% 2015 Global Threat Intelligence Report An analysis of global security trends • over 6 billion attacks • trillions of logs • over 18,000 clients 56% of attacks originate from IP addresses within the US but attackers could be anywhere in the world • Finance sector still #1 target with 18% of all detected attacks Attacks have shifted from application to user 7 / 10 vulnerabilities relate to end-user systems Users connected to public network using personal, and often more vulnerable devices End-user exploits spike after weekends / holidays when users reconnect End-user systems often have unpatched vulnerabilities • 76% of vulnerabilities + 2 years old • 9% of those +10 years old Data gathered from NTT security companies and NTT’s live Global Threat Intelligence Platform Attack analysis Attack sources Attacks by sector Malware attacks by sector 35% of all detected malware events hit education sector The user is the perimeter 7/10 Software exploit kits sold in hacking forums hackers take advantage of unpatched flaws install malicious software on vulnerable devices Cybercrime is Changing profile of cybercriminals Organised crime groups with considerable resources and expertise Attacks motivated by: • profit • botnet infrastructure • extortion • fame/notoriety • hacktivism Incident response & threat intelligence Threat intelligence defined • Incident response capabilities maturing at a slow pace. • 74% of organisations have no formal incident response plan. Average incident response time Organisations with no vulnerability management programme take nearly 200 days to patch vulnerabilities with CVSS score of 4.0 or more The threat intelligence cycle Our approach to successful threat intelligence helps numerous enterprises stay protected 2. Raw information collected based on requirements 3. Information processed exploited 4. Intelligence analysis production 1.Consumer needs, planning, requirements direction 5. Dissemination of product to consumer Finance 0% 2% 4% 8% 10% 12% 14% 16% 18% 6% Business professional Manufacturing Retail Healthcare Technology Education Government Pharmaceuticals Insurance Transport distribution Gaming Media Hospitality,leisure entertainment Non-profit Other • Reconnaissance activity from 4% to 10% • Crafted attacks on targeted victims more common Java Adobe Acrobat Internet Explorer Adobe Flash Firefox Windows Silverlight Others Increased focus on Adobe Flash since security on Java and Internet Explorer improved in 2014. 2013 2014110 100 90 80 70 60 50 40 30 20 10 0 dimensiondata.com/globalthreatreport #GlobalThreatReport US 56% China 9% France 2% India 1.5% Germany 2% Netherlands 2% Denmark 1.1% Russia 2% Ukraine 1.3% Canada 0.9% Australia 9% Rest 9% • Attacks on business professional services up from 9% to 15% - easier, but high-value targets for attackers $$ $ Other 5% Known Bad Source 3% Evasion Attempts 3% DoS / DDoS 5% Application Specific Attack 7% Reconaissance 10% Anomalous Activity 20% Network Manipulation 18% Web Application Attack 15% Service Specific Attack 14% Attacks by type UK 3%