There were 1,573 press releases posted in the last 24 hours and 398,545 in the last 365 days.

Solutionary SERT Q4 Threat Report: 236 Percent Increase in Viruses, Worms Points to Increase in Compromised Enterprise Networks

Jump in Year-End Web Application Attacks Foreshadowed by Decline in Reconnaissance Activity From Q2 - Q4, 2015


/EINPresswire.com/ -- OMAHA, NE -- (Marketwired) -- 01/28/16 -- Solutionary, an NTT Group security company (NYSE: NTT) and the next-generation managed security services provider (MSSP), today announced the results of its Security Engineering Research Team (SERT) Quarterly Threat Report for Q4 2015. Solutionary SERT performed a broad analysis of the threat landscape, which uncovered several key findings. One of the most compelling finding links the rapid growth (236 percent) in viruses and worms from Q3-Q4 -- which often indicates successfully compromised enterprise networks -- to the free fall (88 percent decrease) in reconnaissance activity between Q2 and Q4 of 2015. What's more, the Solutionary SERT foreshadowed an increased potential for successfully executed attacks in Q4 based on early analysis of reconnaissance activity and broad-spectrum attacks.

Reconnaissance activity plummeted over 77 percent from levels in Q3 '15. When combined with the drop seen in Q3, this is nearly an 88 percent drop in reconnaissance activity from levels in Q2 '15.


"Threat intelligence is a term that is used loosely today, but one thing the security industry can do to be more effective as a whole, is to better understand and leverage the information that is already at our fingertips," said Rob Kraus, director of research, Security Engineering Research Team, Solutionary. "Shellshock was one of the most pervasive vulnerabilities of the digital era and to this day we continue to find payloads such as BASHLITE actively exploiting these vulnerabilities -- more than a year after the vulnerability was exposed. Until organizations begin to address the complete security lifecycle, breaches will continue to come and go and consumers' loss of faith in businesses will continue to negatively affect brand reputation."

Key Findings:

  • Reconnaissance activity plummeted over 77 percent from levels in Q3 '15. When combined with the drop seen in Q3, this is nearly an 88 percent drop in reconnaissance activity from levels in Q2 '15.
  • Observed viruses and worms jumped 236 percent during Q4 '15. This type of malware is often indicative that an organization may have been otherwise compromised and infected with a virus or worm to maintain persistence and laterally expand within the targeted environment.
  • Shellshock is actively being exploited in 2015, a year and a half after it was exposed. Moreover, over 77 percent of application-specific attacks observed by Solutionary in Q4 targeted the Shellshock vulnerability.
  • During 2015, the 130 Android vulnerabilities recorded were more than the previous six years combined. This is cause for concern as more than 76 percent of Android devices are running outdated versions of Android, and nearly 37 percent of all Android devices are running a version of the Android operating system which is more than 26 months old.
  • While the total volume of detected malware rose only slightly from Q3 '15, malware from the top five sources (the U.S., China, France, Italy and the U.K.) combined to produce 25 percent more malware than they had during Q3 '15, and accounted for almost 95 percent of malware detected during Q4 '15.
  • India entered the top 10 sources of malware with a 221 percent increase in detection. Malware from India included a wide variety of types of malware and targets, including a jump in detections of the MyDoom malware focusing on South Korea and the U.S.
  • After the Joomla! vulnerability was announced on December 14, Joomla! exploit attempts were the single most common web application attack for the remainder of Q4 '15.
  • Web application attacks retained the top "type of attack" with 41 percent of all attacks during Q4 '15.

To read more key findings from Q4 2015 and to download the full report, please visit: https://www.solutionary.com/threat-intelligence/threat-reports/quarterly-threat-reports/sert-threat-report-q4-2015/

Readers will find several sections in the report providing timely, actionable information that can be used to help protect against today's most malicious attack tactics and vectors.

About Solutionary
Solutionary, an NTT Group Security Company (NYSE: NTT), is the next generation managed security services provider (MSSP), focused on delivering managed security services, professional security services and global threat intelligence. Comprehensive Solutionary security monitoring and security device management services protect traditional and virtual IT infrastructures, cloud environments and mobile data. Solutionary clients are able to optimize current security programs, make informed security decisions, achieve regulatory compliance and reduce costs. The patented, cloud-based ActiveGuard® service platform uses multiple detection technologies and advanced analytics to protect against advanced threats. The Solutionary Security Engineering Research Team (SERT) researches the global threat landscape, providing actionable threat intelligence, enhanced threat detection and mitigating controls. Experienced, certified Solutionary security experts act as an extension of clients' internal teams, providing industry-leading client service to global enterprise and mid-market clients in a wide range of industries, including financial services, health care, retail and government. Services are delivered 24/7 through multiple state-of-the-art Security Operations Centers (SOCs).

Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2956172

Press Contact:
Edward Fernandez
10Fold for Solutionary
(949) 285-6032
Email Contact


Legal Disclaimer:

EIN Presswire provides this news content "as is" without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the author above.