Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Thursday, 9 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Corporate networks infected every day by botnets

by The Gurus
May 9, 2014
in Editor's News
Share on FacebookShare on Twitter

Every three minutes, a botnet communicates with its command and control centre while every 24 hours, company networks are infected with a new botnet.
 
Research by Check Point, based on analysis of monitored security events from over 10,000 organisations found that malware is downloaded every ten minutes in 84 per cent of the respondents.
 
It also found that every ten minutes, a known malware variant is being downloaded to company networks and every 27 minutes a new, unknown malware variant is being downloaded to company networks.
 
Commenting, Ian Pratt, co-founder of Bromium, said that the statistics were shocking, but not surprising. “In an Enterprise of a hundred thousand users, just think how many emails get opened and website links are clicked on in a typical day,” he said.
 
“For a typical Enterprise, most of this malware is just noise, not particularly targeted at them or their users. The only reason security products are detecting them is that the malware authors are making no particularly attempt to be stealthy.
 
“Malware that is targeted is likely to be a lot nastier and harder to spot, intent on theft of intellectual property, bulk personal information, or creating fraudulent transactions. At best these kinds of malware are not detected until months later, if at all. Hence it’s even possible the situation may be even worse than revealed in the report. Only the bad guys know.”
 
Tom Cross, director of security research at Lancope, said: “Check Point’s study provides a quantitative account of the reality that information security professionals know that they are contending with – their networks are compromised on a regular basis by threat actors who are able to evade the perimeter defences that they have in place. Once these sophisticated malware samples get a foothold on your network, you’ve got to do more than detect them, you’ve got to piece together what they’ve been doing on your network in order to understand whether the infection was benign or malignant.
 
“Some threat actors have a long term interest in stealing data from your organization, and will pivot from an initial infection point to compromise multiple machines in your network with different malware samples that have different characteristics, so that if you clean up one sample family, there are others that the attacker can use to maintain control of your network.
 
“Therefore, information security programs need to balance investments in preventative technologies with robust incident response and investigative capabilities. The nature of incident response is changing from a clean-up task that happens after a breach has occurred into a constant business process in which you are hunting for infections on your network all the time, attempting to understand them, and applying that understanding to better protecting the organisation from future attacks.”
 
In terms of the botnet infections, Check Point found that a host was infected by a bot every 24 hours while in 2013, at least one bot was detected in 73 per cent of organisations, an increase from 63 per cent in 2012. Organisations also struggled with containing bots, as 77 per cent of bots are active for more than four weeks.

FacebookTweetLinkedIn
Tags: BotnetMalware
ShareTweetShare
Previous Post

Anti-virus is dead, long live protection

Next Post

Many websites remain vulnerable to Heartbleed, a month after patch was released

Recent News

Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato SASE Cloud Named “Leader” and “Outperformer” in GigaOm Radar Report for SD-WAN

February 7, 2023
AT&T Cybersecurity grows SASE offering by adding Palo Alto Networks

UK second most targeted nation behind America for Ransomware

February 7, 2023
safe

Will Emphasising App Security Lead to More App Installs?

February 6, 2023
Phone with app store open

$400,000 Fine for Stalkerware App Developer

February 6, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information