Story image

NTT survey finds phishing methods are the hottest ways of delivering ransomware

08 May 2017

NTT Security has echoed the growing number of report that show email phishing is now one of the most widely-used methods of distributing ransomware, but organisations should not fear the statistics.

The company’s 2017 Global Threat Intelligence report found that Phishing attacks have been distributing the bulk (73%) of all malware, including ransomware.

77% of all detected ransomware is targeting four main sectors: Business and professional services (28%), government (19%), healthcare (15%) and retail (15%).

56% of all incidents in finance organisations were related to malware, and 50% of all incidents in healthcare organisations were related to ransomware. 

However, NTT Security says that organisations should not be fearful of the statistics; as it is a chance for everyone to be educated about the issues.

"Our end goal is not to create fear, uncertainty and doubt or to overcomplicate the current state of the threat landscape, but to make cybersecurity interesting and inclusive for anyone facing the challenges of security attacks, not just security professionals,” comments Steven Bullitt, VP of Threat Intelligence and Incident Response, GTIC, at NTT Security.

“We want to ensure everyone is educated about these issues and understands that they have a personal responsibility when it comes to the protection of their organisation, and that the organisation has an obligation to help them do so.”

The survey also found that just 25 passwords account 33% of all authentication attempts towards the organisation’s honeypots in 2016. More than 76% of those attempts used passwords associated with the Mirai Botnet, which was used to carry out massive DDoS attacks.

In general, DDoS attacks accounted for 23% of all attacks from Australia and 16% of attacks from Asia, compared to a worldwide average of just 6%.

However, the report found that organisations are doing their part to protect themselves from attacks: 32% of organisations had a formal incident response plan, an increase of 11% from previous years.

"We identified more than six billion attempted attacks over the 12-month period - that's around 16 million attacks a day - and monitored threat actors using nearly every type of attack,” comments Bullitt.

The company used data from 3.5 trillion logs, honeypots and sandboxes in more than 100 different countries.

GitHub launches fund to sponsor open source developers
In addition to GitHub Sponsors, GitHub is launching the GitHub Sponsors, GitHub will match all contributions up to $5,000 during a developer’s first year in GitHub Sponsors.
Check Point announces integration with Microsoft Azure
The integration of Check Point’s advanced policy enforcement capabilities with Microsoft AIP’s file classification and protection features enables enterprises to keep their business data and IP secure, irrespective of how it is shared. 
Why AI will be procurement’s greatest ally
"AI can help identify emerging suppliers, technologies and products in specific categories."
Are AI assistants teaching girls to be servants?
Have you ever interacted with a virtual assistant that has a female-based voice or look, and wondered whether there are implicitly harmful gender biases built into its code?
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
Data#3 to exclusively provide MS licences to WA Government
The technology services provider has won two contracts with the Western Australia Government, becoming its sole Microsoft licence provider.
Why cash is no longer king in Australia
Australia is leading the way in APAC for granting credit on B2B transactions.