Endpoint
5/8/2014
03:00 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Bot Born Every 24 Hours

Nearly 85 percent of enterprises are harboring malware, and a new bot emerges each day, new Check Point report says.

Nearly three-fourths of enterprises have at least one bot-infected endpoint living in their corporate networks, and every three minutes a bot communicates with its command and control server.

New data from Check Point Software Technologies highlights the botnet and malware infestation within the enterprise, with 84 percent of organizations found infected with malware, and 2.2 pieces of unknown malware hitting them once every hour. Less than 10 percent of antivirus products had detected unknown malware, and the number of organizations found with bots jumped from 63 percent in 2012 to 73 percent in 2013.

An enterprise computer is infected with bot malware every 24 hours, according to the report.

"The prevalence of bot infections within enterprises is staggering," says Kellman Meghu, head of security engineering at Check Point. "Check Point also found that 77 percent of bots were active within enterprises for more than four weeks. With all of this in mind, it is important for organizations to deploy threat prevention technologies to identify and contain the spread of malware, as well as even prevent initial infection."

Meanwhile, some 88 percent of organizations suffered a data loss incident at least once last year, versus 54 percent in 2012. Around one-third of financial institutions had credit card information leaked, and one-fourth of healthcare and insurance companies leaked HIPAA-protected information, according to the Check Point "2014 Security Report," based on analysis of network event data gathered from 10,000 organizations worldwide.

CheckPoint also boiled down some of its data into some telling stats about security woes in the enterprise:

  • Every 49 minutes, sensitive data is sent outside an organization
  • Every minute, a host visits a malicious website
  • Every nine minutes, a high-risk application is being used (think BitTorrent)
  • Every 27 minutes, unknown malware is downloaded

In nearly 60 percent of organizations, an end-user downloads malware every two hours or less. That's a major jump from 2012, when it was 14 percent. And some 33 percent of organizations have downloaded at least one file with unknown malware, 35 percent of which were PDF files. EXE (33 percent) and archive (27 percent) also were the top formats for unknown malware.

Risky applications are on the rise in enterprises, too. Some 63 percent say they found BitTorrent use among users, versus 40 percent  in 2012.

Regular patching of endpoints is still not practiced in some organizations, either: 14 percent of enterprise endpoints were not running the most recent Windows service packs, and 33 percent of endpoints were running out-of-date versions of Adobe Reader, Flash Player, Java, and Internet Explorer.

Adding to the vulnerability of endpoints: Some organizations aren't using built-in security features or best-practices. "Clients are often left vulner­able by important protection capabilities that have been disabled," the report says. "For example, almost one quarter (23 per­cent) of enterprise endpoints analyzed by Check Point did not have a desktop firewall enabled, and more than half (53 percent) had enabled Bluetooth, expos­ing them to wireless attacks in public spaces."

The full report is available here for download.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
securityaffairs
50%
50%
securityaffairs,
User Rank: Ninja
5/12/2014 | 5:33:28 PM
Re: Reality Check:
Hi Marilyn, I consider these data alarming. I'm not focused on the numbers, but on the problems they describe. We have enterprises that lack of patch management and employees that ignore security best practices... in this condition figures like the ones presented are realistic. 
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
5/12/2014 | 3:30:55 PM
Reality Check:
"Some organizations aren't using built-in security features or best-practices." If the survey data is to be believed, the assertion that one quarter of enterpriises don't have a desktop firewall enables and more than half enable bluetooth, it's suprisisig that there aren't more bots born ever day.  

Do these numbers seem realistic?
securityaffairs
50%
50%
securityaffairs,
User Rank: Ninja
5/12/2014 | 3:28:32 AM
Re: Bot Born every 24 Hours
The report is very interesting and once again shows the ineffectiveness of the response to the threat of yet many companies. Lack of efficient Patch management, wrong habits and failure to detect new malware are root causes.

Let me highligh this statements that is essential to better understand the report and its insights:

 

It is important to distinguish between unknown malware and what are often referred to as "zeroday" exploits. Zero-day malware exploits a previously unknown and unreported vulnerability for which there is no patch.Unknown malware refers to malicious code that exploits a known vulnerability or weakness, but cannot be detected at the time of its discovery even by up-to-date antivirus, anti-bot or Intrusion Prevention System (IPS) solutions. The window of effectiveness for an unknown malware is often only 2–3 days, because its existence in the wild gives antivirus vendors time to detect it on their global networks and build signatures for it.
Randy Naramore
50%
50%
Randy Naramore,
User Rank: Ninja
5/8/2014 | 3:49:17 PM
Bot Born every 24 Hours
Looks like we may need to go to the wyse devices and do away with the pc's, just kidding, but there does need to be some thing done to prevent this activity from happening. If you were to lockdown the pc's to the extent that they are not a threat then are essentially bricks..
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-0334
Published: 2014-10-31
Bundler before 1.7, when multiple top-level source lines are used, allows remote attackers to install arbitrary gems by creating a gem with the same name as another gem in a different source.

CVE-2014-2334
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiAnalyzer before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336.

CVE-2014-2335
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiManager before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336.

CVE-2014-2336
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiManager before 5.0.7 and FortiAnalyzer before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2334 and CVE-2014-2335.

CVE-2014-3366
Published: 2014-10-31
SQL injection vulnerability in the administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to execute arbitrary SQL commands via a crafted response, aka Bug ID CSCup88089.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.