Over one-third of all security incidents start with phishing emails or malicious attachments sent to company employees, according to a new report published by global cyber security company F-Secure (www.f-secure.com).
F-Secure’s new Incident Response Report summarizes findings from the firm’s incident response investigations and provides insights into how real hackers attack organizations. The single most common source of breaches analyzed in the report was attackers exploiting vulnerabilities in an organization’s internet facing services, which accounted for about 21% of security incidents investigated by F-Secure’s incident responders.
However, phishing and emails with malicious attachments together accounted for about 34 % of breaches. F-Secure Principal Security Consultant Tom Van de Wiele sayid this make attacks arriving via email a much bigger pain point for organizations.
“Exploiting software vulnerabilities in drive-by scenarios is typical in opportunistic attacks, but breaching companies via email is actually far more common. There’s a lot of different ways different attackers can use email, and these attacks are popular because almost every company relies on email for communication,” he said. “People need to think before they click on attachments and links, but the pressures of many jobs overrides this logic, which attackers understand and exploit.”
Other findings in the report include:
° Organizations were hit by targeted and opportunistic attacks in nearly equal proportion to one another.
° Insider threats accounted for one-fifth of security incidents.
° Incident responders were contacted after the security perimeter was breached in nearly 80% of cases.
° The most common post-breach action taken by attackers was spreading malware (mostly for financial gain, but also for espionage or maintaining access for future purposes).
° Thirteen percent of investigations turned out to be false alarms.
According to Van de Wiele, the number of false alarms reported as security incidents is surprising, and shows that too many organizations struggle with accurately detecting cyber attacks.
“We’re often called in to investigate ‘suspicious activity,’ which tells me that a lot of organizations don’t have accurate incident detection capabilities,” he said. “Sometimes we’ll even investigate and discover an IT problem rather than an attack, which drains resources and distracts everyone from dealing with the real issue.”
F-Secure recommends companies improve their incident detection and response capabilities, such as by investing in an endpoint detection and response solution or service.