NTT Security intelligence report finds organizational attacks becoming more sophisticated

Jan. 25, 2017
Addresses the evolving science of Cyber Forensics to identify cyber-attack sources

Omaha, NE --January 26, 2017 – NTT Security has issued its quarterly Threat Intelligence Report, which underscores the need for more advanced tools to protect organizations’ data and networks from the evolving tactics, techniques and procedures (TTPs) used by cyber-attackers. A topic of considerable public attention is the ability to determine the source of cyber-attacks to determine their credibility and motivation.

 “In compiling our latest Threat Intelligence Report, NTT Security analysts observed a 35 percent decrease in the number of cybersecurity attacks during Q4 2016, which is certainly a positive trend; however, it is imperative that organizations not be lulled into a false sense of security,” said Rob Kraus, Director, Security Research and Strategy, NTT Security. “At the same time, the intensity and sophistication of these attacks are on the rise. Hackers are shifting their strategy from widespread attacks to a more focused effort to compromise specific targets they can leverage, opening the door for more malicious and potentially lucrative actions.”

The latest Threat Intelligence Report from NTT Security cites hackers' rampant use of “false flagging” to disguise the true source of an attack. For example, an attack may appear to have originated from a server in China or Russia when in fact the source may have actually originated from a source in the U.S. or other country. This allows attackers to cleverly disguise their motivation, which may be establishing ongoing network access, stealing financial data or withdrawing funds directly from an organization. This new Threat Intelligence Report presents timely and actionable information to help organizations better understand the evolving science of cyber forensics. This underscores the vital need to deploy advanced tools that more effectively identify where an attack originated, who is responsible and what their true motives are.

Among the top targeted vertical markets for cyber attack, the Q4 report cites the retail industry as particularly attractive to hackers and security breaches.  This is largely due to the fact that most retailers process customers’ credit and debit card information through their systems. The Threat Intelligence Report outlines numerous best practices that retail organizations can implement, such as deploying IT security tactics that are aligned with the Payment Card Industry Data Security Standard (PCI DSS), which can help increase controls around cardholder data and reduce fraud.

“Based on the findings reported in our most recent Threat Intelligence Report, it is obvious that despite progress to date, organizations must continue to mature their cybersecurity controls and processes. Comprehensive, customized MSS platforms can play a growing role in achieving this goal. From determining where potential vulnerabilities exist to preventing the attacks that leverage them, the MSS offering from NTT Security provides the proven platform, expertise and experience to help IT professionals implement the advanced cybersecurity measures necessary for today’s environment,” Kraus said.

Additional key findings of the NTT Security Q4 2016 Threat Intelligence Report include:

  • Increased client botnet activity is driven by attacks on Internet of Things (IoT) devices
  • Remote code execution (RCE) exploits in Adobe Flash were the most common, accounting for 22 percent of all application-specific attacks
  • DNS queries for domains with the new .pw TLD began to spike in November 2016, suggesting an increase in phishing and spam efforts
  • An 11 percent increase in the volume of attacks against retailers, with key loggers and spyware accounting for 68 percent of all malware across all retail clients
  • Nation-state attacks are on the rise, with evidence of state-sponsored actions identified in two-thirds of the 30 tracked industry verticals
  • Malicious traffic from Russian Federation hosts jumped from 10th place to the top 3
  • The average length of time cyber attacks go undetected is 146 days, while some state-sponsored Advanced Persistent Threat activities can go undetected for years.

To access the full report, please visit: http://go.nttsecurity.com/SERTReportQ42016

About NTT Security

NTT Security seamlessly delivers cyber resilience by enabling organizations to build high-performing and effective security and risk management programs with controls that enable the increasingly connected world and digital economy to overcome constantly changing security challenges. Through the Full Security Life Cycle, we ensure that scarce resources are used effectively by providing the right mix of integrated consulting, managed, cloud, and hybrid services – delivered by local resources and leveraging our global capabilities. NTT Security is part of the NTT Group (Nippon Telegraph and Telephone Corporation), one of the largest information and communications technology (ICT) companies in the world. For more information, visit https://www.nttsecurity.com .