IBM X-Force Threat Intelligence Index 2017

IBM X-Force Threat Intelligence Index 2017

IBM X-Force Threat Intelligence Index 2017 IBM X-Force Threat Intelligence Index 2017 The year of the mega breach IBM Security March 2017 IBM X-Force Threat Intelligence Index 2017 TABLE OF CONTENTS Executive overview 3 Top-targeted industries 15 Methodology 4 Financial services 16 The shifting world of breaches 5 Information and communications 16 World-changing leaks 5 Manufacturing 17 A history of incidents 6 Retail 17 High-volume hijacks 8 Healthcare 18 When things go rogue 9 Where are the “bad guys”? 19 Notable attack vectors 10 Insiders versus outsiders 19 Distributing malware through spam 10 External attackers: Focus on organized cybercrime 20 Record numbers of vulnerability disclosures 11 Slow and steady wins the race 21 Prevalent methods of attack in monitored clients 11 Cyber gangs sharpen the focus on business accounts 23 Inject unexpected items 12 Commercial malware making the rounds 24 Manipulate data structures 12 Venturing into additional cybercrime realms 25 Collect and analyze information 13 2017 and beyond 26 Indicator 13 Contributors 26 Employ probabilistic techniques 13 About X-Force 26 Manipulate system resources 13 Footnotes 27 Subvert access control 14 Glossary 29 Abuse existing functionality 14 Engage in deceptive interaction 14 IBM X-Force Threat Intelligence Index 2017 TABLE OF CONTENTS EXECUTIVE OVERVIEW Executive overview With Internet-shattering distributed-denial-of-service (DDoS) In our monitored client environments, IBM® X-Force® saw Methodology attacks, troves of records leaked through data breaches, and that the average client organization experienced more than 54 The shifting world of breaches Notable attack vectors a renewed focus by organized cybercrime on business targets, million security events in 2016—only three percent more events 2016 was a defining year for security. Indeed, in 2016 more than than 2015. At the same time, client organizations monitored by Top-targeted industries 4 billion records were leaked, more than the combined total X-Force experienced an average 12 percent decrease in attacks Where are the “bad guys”? from the two previous years, redefining the meaning of the term in 2016 compared to 2015 (1,019 attacks in 2016 compared to 2017 and beyond “mega breach.” In one case, a single source leaked more than 1,157 attacks in 2015). Contributors 1.5 billion records.1 About X-Force Most notably, the average monitored client was found to have Footnotes experienced 93 security incidents in 2016, down 48 percent Definitions of terms Glossary from the 178 discovered in 2015. Does this reduction in attacks and incidents reflect a safer security environment in 2016? Perhaps. That would be Security Security event Attack incident Breach wonderful news to report. However, the reduction in attacks could mean attackers are relying more and more on proven Activity on a system A security event that An attack or security An incident that or network detected has been identified by event that has been results in the attacks, thus requiring fewer attempts. Additionally, the by a security device correlation and reviewed by IBM exfiltration of data. In combination of massive record leaks and a record year or application. analytics tools as security analysts and this report, “breach malicious activity that deemed worthy of data” is a sampling of of vulnerability disclosures also paints a different picture. is attempting to deeper investigation. notable publicly collect, disrupt, deny, disclosed incidents, Regardless of the total number of attempted attacks or degrade or destroy not monitored incidents, it takes only one successful compromise for an information system security client resources or the incidents. organization to end up as front page news and facing millions information itself. of dollars in data breach costs.2 Figure 1: Denitions of terms. -3- IBM X-Force Threat Intelligence Index 2017 TABLE OF CONTENTS METHODOLOGY Executive overview To better understand the security threat landscape, X-Force Methodology uses both data from monitored security clients and data The shifting world of breaches Notable attack vectors derived from non-customer assets such as spam sensors and honeynets. X-Force runs spam traps around the world and Top-targeted industries monitors more than eight million spam and phishing attacks Where are the “bad guys”? daily. It has analyzed more than 37 billion web pages and 2017 and beyond images. Contributors About X-Force IBM Security Services monitors billions of events per year from more than 8,000 client devices in more than 100 countries. This Footnotes Glossary report includes data IBM collected between 1 January 2016 and 31 December 2016. In this year’s report, IBM X-Force Threat Research adopted the MITRE Corporation’s Common Attack Pattern Enumeration and Classification (CAPEC) standard for attack categorization. The top five attacked industries were determined based on data from a representative set of sensors from each industry. The sensors chosen for the index had to have event data collected throughout the entire year of 2016. The insider/outsider identification utilized in this report includes all source and destination IP addresses identified in the attacks and security incidents targeting the representative set of sensors. A single attack may involve one or many attackers. -4- IBM X-Force Threat Intelligence Index 2017 TABLE OF CONTENTS THE SHIFTING WORLD OF BREACHES Executive overview Methodology The year 2016 was notable for the way in which cyber attacks 79 countries,6 the disclosure led to anti-government protests in 7 8 The shifting world of breaches had a discernible impact on real-world events and infrastructure. several countries including Pakistan and the UK. In April 2016, 9 World-changing leaks Beginning in December 2015, for example, reports appeared of the Prime Minister of Iceland stepped down in the aftermath of a malware-caused power outage in Ukraine,3 leaving hundreds the leak. A history of incidents of thousands of people without electricity for several hours in High-volume hijacks the middle of winter. Nearly a year later, a smaller but similar In the US, data leaks were a central topic of the presidential When things go rogue Ukrainian power outage surfaced, also attributed to a cyber election. Several leaks from the Democratic National Notable attack vectors attack.4 These two events bookended the year and served as Committee (DNC) provided an inside look into private email Top-targeted industries heralds of the widespread impact of security incidents on the conversations and strategies, and could have potentially physical world, even to those who don’t regularly monitor the swayed the opinion of some voters for one candidate over Where are the “bad guys”? security landscape. another. In both the Panama Papers and DNC leaks, it is 2017 and beyond Contributors reported that attackers used simple techniques such as SQL World-changing leaks injection (SQLi)10 and phishing to exploit these influential About X-Force targets. The fact that vulnerability to fundamental security flaws Footnotes This impact was most prominently registered through a number could have such far-reaching impact is notable. Glossary of high-profile data leaks that had a direct influence on global politics. In April 2016, 11.5 million leaked documents from the In past years, data breaches were often in the form of a fixed set Panamanian law firm Mossack Fonseca5 exposed offshore of structured information such as credit card data, passwords, accounting of thousands of prominent people from around the national ID numbers, personal health information (PHI) data world. The “Panama Papers,” as they were dubbed, showed or key documents. In recent years, X-Force has observed the insider financials of several current and former heads of release of much larger caches of unstructured data, such as state, their friends and family, as well as businesspeople and the contents of emails, as well. In 2016, there were many notable celebrities. While offshore accounts are not illegal per se, they examples of leaks involving hundreds of gigabytes of email often raise suspicion because they can be used for tax evasion archives, documents, intellectual property and source code, and money laundering. In addition to criminal investigations in exposing companies’ complete digital footprints to the public. Phishing: The act of tricking a user into providing personal or financial information by falsely -5- claiming to be a legitimate entity. IBM X-Force Threat Intelligence Index 2017 TABLE OF CONTENTS Click image to enlarge map. Click again for original size. A history of incidents Notable 2016 global leaks of unstructured data Executive overview Methodology X-Force has been tracking and reporting on publicly disclosed Canada 5 GB data stolen from a Turkey security incidents and data breaches since 2011. Figure 3 casino chain† including The shifting world of breaches 17 GB archive of files from national ID numbers, photo Germany/Europe a Turkish police server§ ID copies and other 1.9 TB of insider information Philippines (next page) illustrates a sampling of security incidents and personally identifiable about European football World-changing leaks information (PII) players,‡ their salaries 300 GB of Filipino voter and contracts data†† (Comelec) consisting of half the country’s voters attack techniques during 2014, 2015 and 2016. In 2016, X-Force A history of incidents and including fingerprints and passport scans Poland observed several record-breaking metrics such as the number High-volume

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    30 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us