Attacks/Breaches
7/24/2013
02:20 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

New Study Shows Enterprises NOT Prepared For Cyberattacks

Respondents say they have seen an uptick in more sophisticated and targeted malware attacks over the past 24 months

San Jose, Calif. – July 24, 2013 – Malwarebytes, a leading provider of anti-malware technology, today highlighted results of the recent Enterprise Strategy Group (ESG) research study focused on advanced malware protection and detection. The study revealed that enterprise organizations are seeing an increase in more sophisticated malware and are making it a strategic priority to add new layers of endpoint security to protect their organizations against advanced zero-day and polymorphic threats commonly used for targeted attacks.

Based on its survey of 315 North American-based IT security professionals working at enterprise-class organizations (1,000 employees or more), ESG found the majority of respondents have seen an uptick in more sophisticated and targeted malware attacks over the last 24 months. However, 62% of organizations surveyed said endpoint security software is not effective for detecting zero-day and/or polymorphic malware, which leaves them vulnerable to these attacks.

"As cyber-attacks become more sophisticated, IT security professionals are realizing that relying on only one layer of endpoint security isn't enough. Each endpoint needs multiple layers of malware detection to ensure complete protection," said Marcin Kleczynski, CEO of Malwarebytes. "The reality is, most anti-virus products will miss nine out of ten zero-day malware threats, and having a layered approach blocks advanced threats that traditional antivirus scanners may fail to detect."

Moreover, the study found that the most likely avenue for a malware attack, and cause for successful malware attacks, was lack of user knowledge about cyber security risks. IT security professionals surveyed believe an employee clicking on an infected URL posted within an e-mail was the most likely vector for malware to infiltrate their organizations. Other likely avenues for malware to compromise an organization's system included employees opening an infected e-mail attachment and unwittingly clicking on an infected URL while surfing the web.

"When it comes to managing malware risk, enterprises would be best served by implementing a layered approach using proactive and reactive lines of defense through their networks. Antivirus software plays a key role in protecting organizations, but it should not be the only method used to deter malware attacks," said Jon Oltsik, senior principal analyst at ESG. "Additionally, sometimes the biggest vulnerability in an organization is the computer users. Because employee actions can greatly impact computer security, educating employees on potential threats and how to avoid them should be made a priority."

In addition to uncovering these findings, the study also showed that:

29% of respondent organizations that have suffered a successful malware attack believe the increasing use of social networks is responsible for those attacks

On average, it takes 57% of respondents hours to detect a that an IT asset has been compromised by malware and 19% days

74% of enterprises have increased their security budget over the past 24 months in direct response to more sophisticated malware threats

62% of respondents believe their host-based security software is not effective for detecting zero day and/or polymorphic threats

85% of IT security professionals, given everything they know about cyber security, are concerned about some type of massive cyber-attack that could impact critical infrastructure, the economy, and/or national security

66% of U.S.-based respondents do not believe the U.S. Federal Government is doing enough to help the private sector cope with the current cyber security and threat landscape.

For more information on this survey, see the Malwarebytes blog or the survey brief by ESG here.

About Malwarebytes

Malwarebytes provides software designed to protect consumers and businesses against malicious threats that consistently escape detection by other antivirus solutions. Malwarebytes Anti-Malware Pro, the company's flagship product, employs a highly advanced behavior-based detection engine that has removed over five billion malicious threats from computers worldwide. Founded in 2008, the self-funded company is headquartered in California, operates offices in Europe, and employs a global team of researchers and experts. For more information, please visit us at www.malwarebytes.org.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
MROBINSON000
50%
50%
MROBINSON000,
User Rank: Apprentice
7/26/2013 | 6:40:19 AM
re: New Study Shows Enterprises NOT Prepared For Cyberattacks
Great findings, itGÇÖs still a realistic truth enterprises are NOT prepared for cyberattacks ! We posted an article on our blog discussing and trying to understand the behavior and unknown vulnerabilities in mobile and social environments, not only for people (a security soft spot) but also for companies http://blog.securityinnovation...
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0485
Published: 2014-09-02
S3QL 1.18.1 and earlier uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object in (1) common.py or (2) local.py in backends/.

CVE-2014-3861
Published: 2014-09-02
Cross-site scripting (XSS) vulnerability in CDA.xsl in HL7 C-CDA 1.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted reference element within a nonXMLBody element.

CVE-2014-3862
Published: 2014-09-02
CDA.xsl in HL7 C-CDA 1.1 and earlier allows remote attackers to discover potentially sensitive URLs via a crafted reference element that triggers creation of an IMG element with an arbitrary URL in its SRC attribute, leading to information disclosure in a Referer log.

CVE-2014-5076
Published: 2014-09-02
The La Banque Postale application before 3.2.6 for Android does not prevent the launching of an activity by a component of another application, which allows attackers to obtain sensitive cached banking information via crafted intents, as demonstrated by the drozer framework.

CVE-2014-5136
Published: 2014-09-02
Cross-site scripting (XSS) vulnerability in Innovative Interfaces Sierra Library Services Platform 1.2_3 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.