Application Security

8/21/2018
05:45 PM
50%
50%

How Threats Increase in Internet Time

Cybercrime incidents and costs increase with each passing minute on the Internet.

A famous song from the musical Rent pointed out that there are 525,600 minutes in a year. A new report looks at just how much Internet evil can fit into each minute of the year, and it's definitely not all about love.

It's about the numbers inside the $1,138,888 dollars of cybercrime cost each minute that add up to $600 billion in damage each year, according to a February, 2018 McAfee report on the impact of cybercrime. And the details of those numbers tell a story of growing risk due to a growing computer footprint, detailed in The Evil Internet Minute, a new infographic generated by researchers at RiskIQ.

"Some of it [the data] is based on reports from companies like McAfee and Gartner, but the research comes from our own systems," says Yonathan Klijnsma, threat researcher at RiskIQ. He explains that RiskIQ builds large databases from information found in global data crawling and used portions of that data to draw conclusions on individuals threats and trends.

Those conclusions involve numbers that become almost mesmerizing as the time scales and dollar amounts change: For example, RiskIQ reports that four potential vulnerable Web components are discovered each minute. That works out to more than two million such discoveries every year.

Klijnsma worries more, however, about active criminal activities like the .07 incidents of Magecart (36,792 per year) that RiskIQ found. "People thought the Ticketmaster breach was a one-off based on Magecart, but it's a credit-card skimming group," Klijnsma says, referring to the June incident. Instead, he says, the group has taken the "classic" credit card skimmer attack and moved it from the gas pump and ATM to e-commerce sites.

The lesson for organizations from reports such as this? "You want it to be more expensive for the bad guys," he says. "You need to keep your stuff updated. People tend to install things and forget about them," Klijnsma says.

"Whatever's online immediately starts to go out of date. If you leave it on the Internet, it will be out of date in a few months," he says. 

Beyond up-to-date software, he says, "One golden rule is limiting exposure. Nothing goes accessible online until it really has to."

Related Content:

Learn from the industry's most knowledgeable CISOs and IT security experts in a setting that is conducive to interaction and conversation. Early bird rate ends August 31. Click for more info

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
'PowerSnitch' Hacks Androids via Power Banks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/8/2018
The Case for a Human Security Officer
Ira Winkler, CISSP, President, Secure Mentem,  12/5/2018
Windows 10 Security Questions Prove Easy for Attackers to Exploit
Kelly Sheridan, Staff Editor, Dark Reading,  12/5/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-8651
PUBLISHED: 2018-12-12
A cross site scripting vulnerability exists when Microsoft Dynamics NAV does not properly sanitize a specially crafted web request to an affected Dynamics NAV server, aka "Microsoft Dynamics NAV Cross Site Scripting Vulnerability." This affects Microsoft Dynamics NAV.
CVE-2018-8652
PUBLISHED: 2018-12-12
A Cross-site Scripting (XSS) vulnerability exists when Windows Azure Pack does not properly sanitize user-provided input, aka "Windows Azure Pack Cross Site Scripting Vulnerability." This affects Windows Azure Pack Rollup 13.1.
CVE-2018-8617
PUBLISHED: 2018-12-12
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8583, CVE-2018-8...
CVE-2018-8618
PUBLISHED: 2018-12-12
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8583, CVE-2018-8...
CVE-2018-8619
PUBLISHED: 2018-12-12
A remote code execution vulnerability exists when the Internet Explorer VBScript execution policy does not properly restrict VBScript under specific conditions, aka "Internet Explorer Remote Code Execution Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Exp...