Cybercriminals today are increasingly leveraging malware, bots and other forms of sophisticated threats to attack organizations for various reasons - from financial gain and disruption of business operations to data theft or attacks driven by political agendas. Regardless of motivation, new variants of malware are being generated on a daily basis, often targeting multiple sites and organizations to increase the likelihood of an attack’s initial success and the potential for threats to spread quietly throughout an organization.
“Cybercriminals are no longer isolated amateurs. They belong to well-structured organizations, often employing highly-skilled hackers to execute targeted attacks, many of whom receive significant amounts of money depending on the region and nature of the attack,” said Tomer Teller, security evangelist and researcher at Check Point Software Technologies. “Cybercrime has become a business. With bot toolkits for hackers selling today for the mere price of $500, it gives people insight into how big the problem has become, and the importance of implementing preemptive protections to safeguard critical assets.”
According to the survey, SQL injections were cited as the most serious types of attacks organizations had experienced in the last two years, and more than one third of respondents had each experienced APTs, botnet infections and DoS attacks. Following investigations of targeted threats, respondents reported the biggest consequences were a disruption to their business and the loss of sensitive data and intellectual property.
“For the most part, the goal of attackers is to obtain valuable information. These days, credit card data shares space on the shelves of virtual hacking stores with items such as employee records and Facebook or email log-ins, as well as zero-day exploits that can be stolen and sold on the black market ranging anywhere from $10,000 to $500,000,” added Teller. “Unfortunately, the rate of cybercrime seems to be climbing as businesses experience a surge in Web 2.0 use and mobile computing in corporate environments -- giving hackers more channels of communication and vulnerable entry points into the network.”
“Companies are constantly facing new and costly security risks from both internal and external sources that can jeopardize the business,” said Dr. Larry Ponemon, chairman and founder, Ponemon Institute. “While the types of threats and level of concern companies have may vary across regions, the good news is that security awareness is rising. Across the board, C-level executives reported high levels of concern about targeted attacks and planned to implement security precautions, technology and training to mitigate the risk of targeted attacks.”
Key Findings from the Report: · Primary Motivations of Targeted Threats - Following investigations of cyber-attacks within organizations surveyed, the majority of respondents reported financial fraud (65%) as the cybercriminal’s primary motivation, followed by intent to disrupt business operations (45%) and stealing customer data (45%). Approximately 5% of security attacks were estimated to have been driven by political or ideological agendas.
· Cybercrime comes in all shapes and forms – On average, respondents reported SQL Injections as the most serious security attacks experienced in the last two years, and more than one third of respondents said they experienced APTs (35%), botnet Infections (33%) and DoS attacks (32%).
· Targeted attacks continue to be costly – Survey participants estimated a single, successful targeted attack costing an average of $214,000 USD. In Germany, respondents reported a higher average estimate of $300,000 per incident, and Brazil with a lower average of $100,000 per incident. Estimates include variables such as forensic investigation, investments in technology and brand recovery costs.
· Most Common Threat Vectors – When asked to rank employee activities that pose the greatest risk, all regions unanimously cited the use of mobile devices - including smartphones and tablet PCs - as the biggest concern, followed by social networks and removable media devices such as USB sticks.
· Current technology investments -- While the majority of companies have important security building blocks in place, such as Firewall and Intrusion Prevention solutions, less than half of companies surveyed have advanced protections to fight botnets and APTs. However, the majority of organizations in Germany and the US are beginning to deploy solutions more specific to addressing cyber-risk such as anti-bot, application control and threat intelligence systems.
· Security Training and Awareness -- Only 64% of companies say they have current training and awareness programs in place to prevent targeted attacks. Cybercriminals are focused on valuable data that is worth the time and risk; therefore, it has become imperative for enterprises to focus their security efforts there as well. Businesses should start by identifying critical data and assets and enforce multi-layered threat prevention. While thousands of companies have already been targets of bots and advanced threats, businesses have the responsibility to stop it from spreading. For more information about how Check Point helps customers mitigate the risk of cybercrime, visit: http://www.checkpoint.com/campaigns/r75.40/index.html.
The report, The Impact of Cybercrime on Businesses, surveyed 2,618 C-level executives and IT security administrators in the US, United Kingdom, Germany, Hong Kong and Brazil. The survey sample represents organizations of all sizes and across multiple industries, including financial, industrial, defense, retail, healthcare and education. For more information and to view the full report, visit: http://www.checkpoint.com/products/downloads/whitepapers/ponemon-cybercrime-2012.pdf.
About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.