Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

12/22/2015
04:53 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Torrenting Still A Thorn In Enterprise Networks

A quarter of enterprises still see torrenting activity and among those, 43 percent of apps contain malicious elements.

UPDATED to include BitTorrent response, Wednesday, Dec. 23 -- Even though the typical corporate policy today forbids peer-to-peer file sharing, the reality is that many enterprises still bear the brunt of torrenting activity.  According to a new report out by security rating firm BitSight Technologies, nearly one in four firms today have P2P activity lurking on their networks. And that is bringing a lot of risk to the P2P party.

“While the sharing and downloading of copyrighted or pirated content and applications over peer-to-peer typically violates most corporate policies, the behavior continues to occur at a high rate," says Stephen Boyer, co-founder and CTO of BitSight.

Across the more than 30,000 corporate networks that BitSight observes for security soundness, 23 percent of them were using the popular BitTorrent protocol for P2P file sharing.  

The high rate of enterprise P2P prevalence is disturbing if not surprising. According to a report out earlier this month from broadband management firm Sandvine, torrent traffic accounts for 29 percent of all upstream U.S. Internet traffic during peak hours. That's four times as much as Netflix, Google Cloud or YouTube upstream activity. In fact, it is more than all three put together.

Digging deeper into the issue, Bitsight found that 43 percent of torrented applications contain malicious software. This is key, considering that the currency of enterprise torrenting is software, rather than the traditional media most people associate with P2P sharing.

"Movies and games often come to mind when organizations think about P2P file sharing; however, the majority of infected applications that we uncovered were either Adobe Photoshop, Microsoft Office or various versions of the Microsoft Windows operating system,” Boyer says.

Unsurprisingly, given the high rate of infections carried out through torrented applications, BitSight also found that a higher rate of botnet activity correlated directly to the detection of P2P use on a given network. Machines on networks exhibiting P2P use are far more likely to suffer from botnet infections.

"The high malware infection rates suggest that organizations with file sharing activity are more susceptible to machine takeover," Boyer says. "File sharing activity can serve as one of many key risk indicators and should be considered not only internally, but also when assessing vendor risk, conducting M&A due diligence, and underwriting cyber insurance.”

UPDATE:

A BitTorrent representative responded to the BitSight report. Christian Averill, vice-president of marketing for BitTorrent told Dark Reading:

“BitTorrent is an Internet protocol. An HTTP replacement, a better way for file transfer. It is the most efficient way to do the heavy lifting. As such is used by just about every core platform on the Internet. This includes companies such as Facebook, Twitter, and Wikipedia for server updates; the BBC, Amazon, and Blizzard Entertainment for moving content; scientists working on the Large Hadron Collider, the Human Genome Project, and Cancer research for moving massive data sets.

"There are hundreds more examples which have nothing to do with malware, botnets and other bogeys BitSight asserts is caused by BitTorrent. My guess is that those don’t help sell the new products they are promoting. ...

"We work with many corporations and have products designed for their needs. This overgeneralization of distributed technology and BitTorrent only creates fear and confusion when accurate information is needed."

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
12/23/2015 | 1:31:30 PM
Web Security
Most Web Security Products have the ability to block P2P.

What are some business cases that would require P2P to be utilized?
US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
MITRE Releases 2019 List of Top 25 Software Weaknesses
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2019
Preventing PTSD and Burnout for Cybersecurity Professionals
Craig Hinkley, CEO, WhiteHat Security,  9/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-14994
PUBLISHED: 2019-09-19
The Customer Context Filter in Atlassian Jira Service Desk Server and Jira Service Desk Data Center before version 3.9.16, from version 3.10.0 before version 3.16.8, from version 4.0.0 before version 4.1.3, from version 4.2.0 before version 4.2.5, from version 4.3.0 before version 4.3.4, and version...
CVE-2019-15000
PUBLISHED: 2019-09-19
The commit diff rest endpoint in Bitbucket Server and Data Center before 5.16.10 (the fixed version for 5.16.x ), from 6.0.0 before 6.0.10 (the fixed version for 6.0.x), from 6.1.0 before 6.1.8 (the fixed version for 6.1.x), from 6.2.0 before 6.2.6 (the fixed version for 6.2.x), from 6.3.0 before 6....
CVE-2019-15001
PUBLISHED: 2019-09-19
The Jira Importers Plugin in Atlassian Jira Server and Data Cente from version with 7.0.10 before 7.6.16, from 7.7.0 before 7.13.8, from 8.1.0 before 8.1.3, from 8.2.0 before 8.2.5, from 8.3.0 before 8.3.4 and from 8.4.0 before 8.4.1 allows remote attackers with Administrator permissions to gain rem...
CVE-2019-16398
PUBLISHED: 2019-09-19
On Keeper K5 20.1.0.25 and 20.1.0.63 devices, remote code execution can occur by inserting an SD card containing a file named zskj_script_run.sh that executes a reverse shell.
CVE-2019-11779
PUBLISHED: 2019-09-19
In Eclipse Mosquitto 1.5.0 to 1.6.5 inclusive, if a malicious MQTT client sends a SUBSCRIBE packet containing a topic that consists of approximately 65400 or more '/' characters, i.e. the topic hierarchy separator, then a stack overflow will occur.