Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

Ransomware Rocks Endpoint Security Concerns

Meanwhile, threat detection technologies are evolving that can help security teams spot incidents more efficiently.

INTEROP ITX - Las Vegas - The WannaCry attack campaign was top of mind here this week as industry experts and enterprises say that was only the beginning of ransomware threats yet to come.

"Ransomware is one of my biggest concerns and my users' knowledge about opening bad attachments," says Dan Tarnowski, IT manager at CCMA LLC. 

Tarnowski noted that while ransomware is one of his biggest concerns, his organization has been fortunate to have avoided this threat so far.

The high-profile WannaCry ransomware attack was the largest such attack to date, infecting hundreds of thousands of machines in some 150 countries. 

Last year, ransomware was a major driver of endpoint sales for the $9.5 billion market that includes several hundred endpoint security vendors from startups to major players like Symantec, McAfee, and Trend Micro, says Rob Westervelt, a security research manager at IDC.

"CIOs would say, 'why were we hit with ransomware and it wasn't detected,'" says Westervelt.

Westervelt and other security experts expect ransomware will continue to loom large as a threat to endpoint machines. Indeed, the FBI is forecasting ransomware could cost victims $1 billion a year, according to a CNN report.

Other major threats landing on the endpoint that will loom large in the future include more advanced persistent threat (APT) attacks, where an attacker gains access to the network and lays low and undetected for a long stretch of time to pilfer data. APTs are typically associated with nation-state threat groups.

APT attacks tend to target large organizations and often use social engineering in emails to lure the user to provide access via clicking on a link or downloading an attachment, says Michael Canavan, senior vice president of Kaspersky Lab North America.

"They may spoof an email that looks like a LinkedIn connection request, and the user will download malicious code onto their system and the user will not even know an APT is now on their system," Canavan says.

Not only are ransomware and other advanced threats a growing issue for the endpoint, but the rate of new iterations of these attacks and others hitting the endpoint has vastly accelerated, says Michael Spanbauer, vice president of security test and advisory for NSS Labs.

"Over the last ten years, the pace has accelerated immensely. It's like going from a Model T to driving a McLaren at 200 mph," Spanbauer says. "But the good news is innovation and security people have gotten better, too."

Threat Detection Evolution

Most ransomware attacks could be avoided with proper patching, backups, and other basic security hygeine. Meanwhile, emerging technologies for endpoint security such as machine learning could help security teams better and more quickly react to incidents and breaches, say security experts.

"We're now hearing a lot about machine learning," says IDC's Westervelt. "We're hearing about stronger threat detection engines that can improve over time with machine learning looking at files."

Machine learning is rapidly being adopted or in testing phases at organizations, with over 50% of companies big and small likely to fall into either camp in the next year, predicts Stuart McClure, CEO of Cylance, an endpoint security vendor.

Machine learning takes data sets, learns from them, and gets the visibility to detect where the threat came in from, where it is moving to, correlate with other past attacks and conduct similar action as a security analyst, for example - but much faster than a human.

Some experts consider machine learning a narrow form of artificial intelligence (AI). AI proper can determine and consider various actions it can take with the information it has gleaned, similar to the way humans think.

McClure says that roughly 80% of the companies he runs into around the world want to leverage AI in some form around the endpoint. And of this group, half of the companies want to replace traditional signature-based anti-virus technologies right away and the other half want to do it over time.

"The larger companies are strapped with so many layers of protection that it will take more time to figure out where AI fits in the stack, but mid-market to smaller enterprises with 150,000 to 200,000 nodes and below can adopt cutting-edge technology more quickly," McClure says.

IDC's Westervelt notes that although many endpoint startups have launched out of the gate with signature-free detection technology that was based more on users' behavior, many are now adding signature-based detection engines to their products.

"The vast majority of threats are known threats, so why put extra pressure on your sandbox" to test potentially malicious software based on its behavior, Westervelt says.

And in the meantime, traditional signature-based anti-virus vendors have added signature-free security software to their offerings. As a result, Westervelt says, there is less and less differentiation between new and shiny startups and the old guard.

A recent US survey of 253 small-to-mid-size IT managers and directors found that 53% noted price was the top factor in endpoint security purchase decisions, and just 21% cited ransomware in playing a role in their decision to acquire endpoint security technology, according to a survey conducted for VIPRE.

"There are a lot of good products on the street, but my issue is finding the appropriate product," says Stefan Rettig, an end-user platform consultant and attendee of Interop ITX.

"My priorities in the end-user space is threat mitigation," he says.

Related Content:

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
What the FedEx Logo Taught Me About Cybersecurity
Matt Shea, Head of Federal @ MixMode,  6/4/2021
Edge-DRsplash-10-edge-articles
A View From Inside a Deception
Sara Peters, Senior Editor at Dark Reading,  6/2/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23394
PUBLISHED: 2021-06-13
The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.
CVE-2021-34682
PUBLISHED: 2021-06-12
Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature.
CVE-2021-31811
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-31812
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-32552
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.