Poor cybersecurity hygiene and risky application usage enables destructive worm-like attacks to take advantage of hot exploits at record speed, says a latest report.
Fortinet, the global leader in high-performance cybersecurity solutions, has released the report – Global Threat Landscape Report.
Ransomworms on the Rise
Both WannaCry and NotPetya targeted a vulnerability that only had a patch available for a couple of months. Organisations, who were spared from these attacks, had either deployed security tools that had been updated to detect attacks targeting this vulnerability, and/or they applied the patch when it became available.
Critical-severity of Attacks
According to report, more than two-thirds of firms experienced high or critical exploits in Q2 2017.
Active During Downtime
Nearly 44% of all exploit attempts occurred on either Saturday or Sunday. The average daily volume on weekends was twice that of weekdays.
“Cybercriminals aren’t breaking into systems using new zero day attacks. They are primarily exploiting already discovered vulnerabilities. This means they can spend more of their resources on technical innovations making their exploits difficult to detect. Newer worm-like capabilities spread infections at a rapid pace and can scale more easily across platforms or vectors, “ said Rajesh Maurya, Regional Vice President, India & SAARC, Fortinet.
He added, “Intent-based security approaches that leverage the power of automation and integration are critical to combat this new ‘normal’.”
The Fortinet Global Threat Landscape report covers global, regional, industry sector, and organisational perspectives.