Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:53 PM
Connect Directly

Torrenting Still A Thorn In Enterprise Networks

A quarter of enterprises still see torrenting activity and among those, 43 percent of apps contain malicious elements.

UPDATED to include BitTorrent response, Wednesday, Dec. 23 -- Even though the typical corporate policy today forbids peer-to-peer file sharing, the reality is that many enterprises still bear the brunt of torrenting activity.  According to a new report out by security rating firm BitSight Technologies, nearly one in four firms today have P2P activity lurking on their networks. And that is bringing a lot of risk to the P2P party.

“While the sharing and downloading of copyrighted or pirated content and applications over peer-to-peer typically violates most corporate policies, the behavior continues to occur at a high rate," says Stephen Boyer, co-founder and CTO of BitSight.

Across the more than 30,000 corporate networks that BitSight observes for security soundness, 23 percent of them were using the popular BitTorrent protocol for P2P file sharing.  

The high rate of enterprise P2P prevalence is disturbing if not surprising. According to a report out earlier this month from broadband management firm Sandvine, torrent traffic accounts for 29 percent of all upstream U.S. Internet traffic during peak hours. That's four times as much as Netflix, Google Cloud or YouTube upstream activity. In fact, it is more than all three put together.

Digging deeper into the issue, Bitsight found that 43 percent of torrented applications contain malicious software. This is key, considering that the currency of enterprise torrenting is software, rather than the traditional media most people associate with P2P sharing.

"Movies and games often come to mind when organizations think about P2P file sharing; however, the majority of infected applications that we uncovered were either Adobe Photoshop, Microsoft Office or various versions of the Microsoft Windows operating system,” Boyer says.

Unsurprisingly, given the high rate of infections carried out through torrented applications, BitSight also found that a higher rate of botnet activity correlated directly to the detection of P2P use on a given network. Machines on networks exhibiting P2P use are far more likely to suffer from botnet infections.

"The high malware infection rates suggest that organizations with file sharing activity are more susceptible to machine takeover," Boyer says. "File sharing activity can serve as one of many key risk indicators and should be considered not only internally, but also when assessing vendor risk, conducting M&A due diligence, and underwriting cyber insurance.”


A BitTorrent representative responded to the BitSight report. Christian Averill, vice-president of marketing for BitTorrent told Dark Reading:

“BitTorrent is an Internet protocol. An HTTP replacement, a better way for file transfer. It is the most efficient way to do the heavy lifting. As such is used by just about every core platform on the Internet. This includes companies such as Facebook, Twitter, and Wikipedia for server updates; the BBC, Amazon, and Blizzard Entertainment for moving content; scientists working on the Large Hadron Collider, the Human Genome Project, and Cancer research for moving massive data sets.

"There are hundreds more examples which have nothing to do with malware, botnets and other bogeys BitSight asserts is caused by BitTorrent. My guess is that those don’t help sell the new products they are promoting. ...

"We work with many corporations and have products designed for their needs. This overgeneralization of distributed technology and BitTorrent only creates fear and confusion when accurate information is needed."

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Ninja
12/23/2015 | 1:31:30 PM
Web Security
Most Web Security Products have the ability to block P2P.

What are some business cases that would require P2P to be utilized?
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/17/2020
Cybersecurity Bounces Back, but Talent Still Absent
Simone Petrella, Chief Executive Officer, CyberVista,  9/16/2020
Meet the Computer Scientist Who Helped Push for Paper Ballots
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/16/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-09-19
An issue was discovered in Tiny Tiny RSS (aka tt-rss) before 2020-09-16. The cached_url feature mishandles JavaScript inside an SVG document.
PUBLISHED: 2020-09-19
** DISPUTED ** Typesetter CMS 5.x through 5.1 allows admins to upload and execute arbitrary PHP code via a .php file inside a ZIP archive. NOTE: the vendor disputes the significance of this report because "admins are considered trustworthy"; however, the behavior "contradicts our secu...
PUBLISHED: 2020-09-19
An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with unit().
PUBLISHED: 2020-09-19
An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with pair().
PUBLISHED: 2020-09-19
An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with From<InlineArray<A, T>>.