Story image

No such thing as perfect security, FireEye report finds

29 Feb 16

While disruptive attacks are on the rise, the time between a company being compromised and discovery of the attack is continuing to drop, according to a new FireEye report.

FireEye’s seventh annual Mandiant M-Trends report was compiled from advanced threat investigations conducted by Mandiant’s leading consultants in 2015, and details the leading cyber trends and tactics threat actors used to compromise businesses and steal data.

“In 2015, we continued to be reminded that there is no such thing as perfect security,” sys Kevin Mandia, FireEye SVP and president.

A key finding of the report was the fact that the time it takes organisations to discover compromises continues to drop. The median number of days attackers were present on a victim’s network before being discovered dropped to 146 days in 2015 from 205 days in 2014; however, breaches can go undetected for years, the report finds.

Furthermore, breaches continue to be discovered by third-party sources. Mandiant’s investigations of attacks show that external identification takes longer, with an average of 319.5 days from compromise to discovery. Internal discovery takes an average of 56 days, according to FireEye.

The report also found disruptive attacks are becoming more common. Over the past year, Mandiant responded to incidents where attackers destroyed critical business systems, leaked confidential data, held companies for ransom, and taunted executives. Some attackers were motivated by money, some claimed to be retaliating for political purposes, and others simply wanted to cause embarrassment.

“Based on the significant number of incidents that Mandiant investigated in 2015, threat actors are finding inventive and disruptive ways to skirt even the best defences, resulting in informational, financial and reputational loss,” Mandia says.

NZ’s $3.45bil IT services market fueled by competitive advantage
"With regards to cloud adoption, organisations are prioritising innovation and security over cost and scalability.”
The secret to scaling DevOps in the digital era
"Organisations around the world have learnt at a cost that while agile DevOps methodologies can result in improved outcomes within teams and projects, they have a propensity to fail miserably."
APAC FinTech network launches to encourage cross-border innovation
Nine associations formally launched the network by signing a Statement of Intent at the Asian Financial Forum event in Hong Kong.
Avaya expands AI offerings with new partnerships
The additions to the ecosystem will enable Avaya to add prioritisation and natural language processing to its UC solutions.
Hillstone CTO's 2019 security predictions
Hillstone Networks CTO Tim Liu shares what key developments could be expected in the areas of security compliance, cloud, security, AI and IoT.
Kiwis make waves in IoT World Cup
A New Zealand company, KotahiNet, has been named as a finalist in the IoT World Cup for its River Pollution Monitoring solution.
Can it be trusted? Huawei’s founder speaks out
Ren Zhengfei spoke candidly in a recent media roundtable about security, 5G, his daughter’s detainment, the USA, and the West’s perception of Huawei.
SUSE partners with Intel and SAP to accelerate IT transformation
SUSE announced support for Intel Optane DC persistent memory with SAP HANA.