Endpoint
5/8/2014
03:00 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Bot Born Every 24 Hours

Nearly 85 percent of enterprises are harboring malware, and a new bot emerges each day, new Check Point report says.

Nearly three-fourths of enterprises have at least one bot-infected endpoint living in their corporate networks, and every three minutes a bot communicates with its command and control server.

New data from Check Point Software Technologies highlights the botnet and malware infestation within the enterprise, with 84 percent of organizations found infected with malware, and 2.2 pieces of unknown malware hitting them once every hour. Less than 10 percent of antivirus products had detected unknown malware, and the number of organizations found with bots jumped from 63 percent in 2012 to 73 percent in 2013.

An enterprise computer is infected with bot malware every 24 hours, according to the report.

"The prevalence of bot infections within enterprises is staggering," says Kellman Meghu, head of security engineering at Check Point. "Check Point also found that 77 percent of bots were active within enterprises for more than four weeks. With all of this in mind, it is important for organizations to deploy threat prevention technologies to identify and contain the spread of malware, as well as even prevent initial infection."

Meanwhile, some 88 percent of organizations suffered a data loss incident at least once last year, versus 54 percent in 2012. Around one-third of financial institutions had credit card information leaked, and one-fourth of healthcare and insurance companies leaked HIPAA-protected information, according to the Check Point "2014 Security Report," based on analysis of network event data gathered from 10,000 organizations worldwide.

CheckPoint also boiled down some of its data into some telling stats about security woes in the enterprise:

  • Every 49 minutes, sensitive data is sent outside an organization
  • Every minute, a host visits a malicious website
  • Every nine minutes, a high-risk application is being used (think BitTorrent)
  • Every 27 minutes, unknown malware is downloaded

In nearly 60 percent of organizations, an end-user downloads malware every two hours or less. That's a major jump from 2012, when it was 14 percent. And some 33 percent of organizations have downloaded at least one file with unknown malware, 35 percent of which were PDF files. EXE (33 percent) and archive (27 percent) also were the top formats for unknown malware.

Risky applications are on the rise in enterprises, too. Some 63 percent say they found BitTorrent use among users, versus 40 percent  in 2012.

Regular patching of endpoints is still not practiced in some organizations, either: 14 percent of enterprise endpoints were not running the most recent Windows service packs, and 33 percent of endpoints were running out-of-date versions of Adobe Reader, Flash Player, Java, and Internet Explorer.

Adding to the vulnerability of endpoints: Some organizations aren't using built-in security features or best-practices. "Clients are often left vulner­able by important protection capabilities that have been disabled," the report says. "For example, almost one quarter (23 per­cent) of enterprise endpoints analyzed by Check Point did not have a desktop firewall enabled, and more than half (53 percent) had enabled Bluetooth, expos­ing them to wireless attacks in public spaces."

The full report is available here for download.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
securityaffairs
50%
50%
securityaffairs,
User Rank: Ninja
5/12/2014 | 5:33:28 PM
Re: Reality Check:
Hi Marilyn, I consider these data alarming. I'm not focused on the numbers, but on the problems they describe. We have enterprises that lack of patch management and employees that ignore security best practices... in this condition figures like the ones presented are realistic. 
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
5/12/2014 | 3:30:55 PM
Reality Check:
"Some organizations aren't using built-in security features or best-practices." If the survey data is to be believed, the assertion that one quarter of enterpriises don't have a desktop firewall enables and more than half enable bluetooth, it's suprisisig that there aren't more bots born ever day.  

Do these numbers seem realistic?
securityaffairs
50%
50%
securityaffairs,
User Rank: Ninja
5/12/2014 | 3:28:32 AM
Re: Bot Born every 24 Hours
The report is very interesting and once again shows the ineffectiveness of the response to the threat of yet many companies. Lack of efficient Patch management, wrong habits and failure to detect new malware are root causes.

Let me highligh this statements that is essential to better understand the report and its insights:

 

It is important to distinguish between unknown malware and what are often referred to as "zeroday" exploits. Zero-day malware exploits a previously unknown and unreported vulnerability for which there is no patch.Unknown malware refers to malicious code that exploits a known vulnerability or weakness, but cannot be detected at the time of its discovery even by up-to-date antivirus, anti-bot or Intrusion Prevention System (IPS) solutions. The window of effectiveness for an unknown malware is often only 2–3 days, because its existence in the wild gives antivirus vendors time to detect it on their global networks and build signatures for it.
Randy Naramore
50%
50%
Randy Naramore,
User Rank: Ninja
5/8/2014 | 3:49:17 PM
Bot Born every 24 Hours
Looks like we may need to go to the wyse devices and do away with the pc's, just kidding, but there does need to be some thing done to prevent this activity from happening. If you were to lockdown the pc's to the extent that they are not a threat then are essentially bricks..
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, January 2015
To find and fix exploits aimed directly at your business, stop waiting for alerts and become a proactive hunter.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7402
Published: 2014-12-17
Multiple unspecified vulnerabilities in request.c in c-icap 0.2.x allow remote attackers to cause a denial of service (crash) via a crafted ICAP request.

CVE-2014-5437
Published: 2014-12-17
Multiple cross-site request forgery (CSRF) vulnerabilities in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) enable remote management via a request to remote_management.php,...

CVE-2014-5438
Published: 2014-12-17
Cross-site scripting (XSS) vulnerability in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allows remote authenticated users to inject arbitrary web script or HTML via the computer_name parameter to connected_devices_computers_edit.php.

CVE-2014-7170
Published: 2014-12-17
Race condition in Puppet Server 0.2.0 allows local users to obtain sensitive information by accessing it in between package installation or upgrade and the start of the service.

CVE-2014-7285
Published: 2014-12-17
The management console on the Symantec Web Gateway (SWG) appliance before 5.2.2 allows remote authenticated users to execute arbitrary OS commands by injecting command strings into unspecified PHP scripts.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.