Endpoint
5/8/2014
03:00 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Bot Born Every 24 Hours

Nearly 85 percent of enterprises are harboring malware, and a new bot emerges each day, new Check Point report says.

Nearly three-fourths of enterprises have at least one bot-infected endpoint living in their corporate networks, and every three minutes a bot communicates with its command and control server.

New data from Check Point Software Technologies highlights the botnet and malware infestation within the enterprise, with 84 percent of organizations found infected with malware, and 2.2 pieces of unknown malware hitting them once every hour. Less than 10 percent of antivirus products had detected unknown malware, and the number of organizations found with bots jumped from 63 percent in 2012 to 73 percent in 2013.

An enterprise computer is infected with bot malware every 24 hours, according to the report.

"The prevalence of bot infections within enterprises is staggering," says Kellman Meghu, head of security engineering at Check Point. "Check Point also found that 77 percent of bots were active within enterprises for more than four weeks. With all of this in mind, it is important for organizations to deploy threat prevention technologies to identify and contain the spread of malware, as well as even prevent initial infection."

Meanwhile, some 88 percent of organizations suffered a data loss incident at least once last year, versus 54 percent in 2012. Around one-third of financial institutions had credit card information leaked, and one-fourth of healthcare and insurance companies leaked HIPAA-protected information, according to the Check Point "2014 Security Report," based on analysis of network event data gathered from 10,000 organizations worldwide.

CheckPoint also boiled down some of its data into some telling stats about security woes in the enterprise:

  • Every 49 minutes, sensitive data is sent outside an organization
  • Every minute, a host visits a malicious website
  • Every nine minutes, a high-risk application is being used (think BitTorrent)
  • Every 27 minutes, unknown malware is downloaded

In nearly 60 percent of organizations, an end-user downloads malware every two hours or less. That's a major jump from 2012, when it was 14 percent. And some 33 percent of organizations have downloaded at least one file with unknown malware, 35 percent of which were PDF files. EXE (33 percent) and archive (27 percent) also were the top formats for unknown malware.

Risky applications are on the rise in enterprises, too. Some 63 percent say they found BitTorrent use among users, versus 40 percent  in 2012.

Regular patching of endpoints is still not practiced in some organizations, either: 14 percent of enterprise endpoints were not running the most recent Windows service packs, and 33 percent of endpoints were running out-of-date versions of Adobe Reader, Flash Player, Java, and Internet Explorer.

Adding to the vulnerability of endpoints: Some organizations aren't using built-in security features or best-practices. "Clients are often left vulner­able by important protection capabilities that have been disabled," the report says. "For example, almost one quarter (23 per­cent) of enterprise endpoints analyzed by Check Point did not have a desktop firewall enabled, and more than half (53 percent) had enabled Bluetooth, expos­ing them to wireless attacks in public spaces."

The full report is available here for download.

Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
securityaffairs
50%
50%
securityaffairs,
User Rank: Ninja
5/12/2014 | 5:33:28 PM
Re: Reality Check:
Hi Marilyn, I consider these data alarming. I'm not focused on the numbers, but on the problems they describe. We have enterprises that lack of patch management and employees that ignore security best practices... in this condition figures like the ones presented are realistic. 
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
5/12/2014 | 3:30:55 PM
Reality Check:
"Some organizations aren't using built-in security features or best-practices." If the survey data is to be believed, the assertion that one quarter of enterpriises don't have a desktop firewall enables and more than half enable bluetooth, it's suprisisig that there aren't more bots born ever day.  

Do these numbers seem realistic?
securityaffairs
50%
50%
securityaffairs,
User Rank: Ninja
5/12/2014 | 3:28:32 AM
Re: Bot Born every 24 Hours
The report is very interesting and once again shows the ineffectiveness of the response to the threat of yet many companies. Lack of efficient Patch management, wrong habits and failure to detect new malware are root causes.

Let me highligh this statements that is essential to better understand the report and its insights:

 

It is important to distinguish between unknown malware and what are often referred to as "zeroday" exploits. Zero-day malware exploits a previously unknown and unreported vulnerability for which there is no patch.Unknown malware refers to malicious code that exploits a known vulnerability or weakness, but cannot be detected at the time of its discovery even by up-to-date antivirus, anti-bot or Intrusion Prevention System (IPS) solutions. The window of effectiveness for an unknown malware is often only 2–3 days, because its existence in the wild gives antivirus vendors time to detect it on their global networks and build signatures for it.
Randy Naramore
50%
50%
Randy Naramore,
User Rank: Ninja
5/8/2014 | 3:49:17 PM
Bot Born every 24 Hours
Looks like we may need to go to the wyse devices and do away with the pc's, just kidding, but there does need to be some thing done to prevent this activity from happening. If you were to lockdown the pc's to the extent that they are not a threat then are essentially bricks..
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-6651
Published: 2014-07-31
Multiple directory traversal vulnerabilities in the Vitamin plugin before 1.1.0 for WordPress allow remote attackers to access arbitrary files via a .. (dot dot) in the path parameter to (1) add_headers.php or (2) minify.php.

CVE-2014-2970
Published: 2014-07-31
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-5139. Reason: This candidate is a duplicate of CVE-2014-5139, and has also been used to refer to an unrelated topic that is currently outside the scope of CVE. This unrelated topic is a LibreSSL code change adding functionality ...

CVE-2014-3488
Published: 2014-07-31
The SslHandler in Netty before 3.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message.

CVE-2014-3554
Published: 2014-07-31
Buffer overflow in the ndp_msg_opt_dnssl_domain function in libndp allows remote routers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS Search List (DNSSL) in an IPv6 router advertisement.

CVE-2014-5171
Published: 2014-07-31
SAP HANA Extend Application Services (XS) does not encrypt transmissions for applications that enable form based authentication using SSL, which allows remote attackers to obtain credentials and other sensitive information by sniffing the network.

Best of the Web
Dark Reading Radio