Two Thirds Of Organisations Are Not Equipped To Deal With Cyber Threats

Web malware (47 per cent) and ransomware (42 per cent) top the list of security threats that organisations are most concerned about. Yet ,despite the growing risks, less than a third (27 per cent) have advanced threat protection in place on every endpoint device that can access corporate applications and resources. 

This is according to new research ‘The state of threat prevention: evasive threats take centre stage’, published by  cloud security specialst firm Menlo Security, who questioned 505 IT decision makers in the US and Britain in February.

The Menlo Labs research team have been analysing Highly Evasive Adaptive Threats (HEAT) which bypass traditional security defences including firewalls, Secure Web Gateways, sandbox analysis, URL Reputation, and phishing detection. The Menlo Labs team have seen a 224% increase in HEAT attacks in the second half of 2021.

Used to deliver malware or to compromise credentials, which in many cases leads to ransomware payloads, HEAT attacks include at least one of four evasion techniques:   

  • Evades Both Static and Dynamic Content Inspection 
  • Evades Malicious Link Analysis 
  • Evades Offline Categorisation and Threat Detection 
  • Evades HTTP Traffic Inspection 

As employees spend more time working in the browser and accessing cloud-based applications, the risk of HEAT attacks increases. Almost two-thirds of organisations have had a device compromised by a browser-based attack in the last 12 months. 

The report suggests that organisations are not being proactive enough in mitigating the risk of these threats, with 45 per cent failing to add strength to their network security stack over the past year. 

There are also conflicting views on the most effective place to deploy security to prevent advanced threats, with 43 per cent citing the network, and 37 per cent the cloud. “Threat actors seek to exploit gaps in traditional security defences and the fact that security capabilities haven’t really changed over the past decade.

One of the areas of focus for attackers is using web threats and we’re seeing more and more of them successfully deployed using HEAT techniques. “Last year we saw Nobelium use HTML smuggling, a HEAT tactic to avoid static and dynamic content analysis, to deliver malware and ransomware attacks. The fact that these are successful means their usage will increase, which could have devastating consequences for companies of all sizes,” explains Mark Guntrip, Director of Cybersecurity Strategy, Menlo Security.  “Working practices have changed and companies must stop relying on traditional tools and strategies that just don’t cut it anymore... Adopting a prevention-driven approach to security is the only way to achieve this and using isolation-powered security to do so stops the browser from having any direct interaction with the website and content and ensures that HEAT attacks don’t stand a chance.” Guntrip said.

Competing Security Priorities 

According to the research among 500+ IT decision makers in the UK and US, hybrid/remote working (28 per cent) is the biggest challenge organisations expect to face this year when it comes to protecting their corporate network from advanced threats. This is followed by budget restrictions (15 per cent), the presence of unmanaged devices (14 per cent), and outdated security solutions (13 per cent). 

There are also a number of competing priorities for IT professionals when it comes to improving their security posture in 2022. Training staff tops the list (61 per cent), followed by technology investment to protect the corporate network (60 per cent), adapting to new ways of working (50 per cent), and investing in skilled security members at 45 per cent. 

Additional Research Findings 

  •  Although 55 per cent of respondents have invested in their security stack over the past year and 27 per cent have advanced threat protection in place, it is not having the desired effect as attacks are still successfully penetrating their defence lines.  
  • Half of respondents believe that firewalls are an effective way of mitigating HEAT attacks and 31 per cent favour VPNs.   
  • Organisations believe that the threat of a cyber attack is a case of ‘when’ not ‘if’, regardless of size, consequently IT decision makers are most concerned about the reputational damage (62 per cent) and financial loss (57 per cent) that a security breach could have on their business.  

According to Guntrip: “Organisations need to prioritise a review of their network security solution stack. HEAT attacks target web browsers as the attack vector and employ techniques to evade detection by multiple layers in current security stacks, including firewalls, Secure Web Gateways, sandbox analysis, URL Reputation, and phishing detection, so clearly a new strategy is needed.” 

Menlo Security

You Might Also Read: 

Credentials Phishing Attacks:

 

« Georgia Must Bolster Resilience To Information Warfare
US Moves Cyber Defences To High Alert »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

UZCERT

UZCERT

UZCERT is the national Computer Emergency Response Team for Uzbekistan.

Morphus Information Security

Morphus Information Security

Morphus is an information security company providing Red Team, Blue Team and GRC services as well as conducting research in cybersecurity and threat analysis.

Incopro

Incopro

Incopro is an online IP and brand protection software provider that arms brand owners with actionable intelligence to combat online and offline intellectual property and copyright infringements.

Research Institute in Secure Hardware and Embedded Systems (RISE)

Research Institute in Secure Hardware and Embedded Systems (RISE)

The UK Research Institute in Secure Hardware and Embedded Systems (RISE) seeks to identify and address key issues that underpin our understanding of Hardware Security.

Hyperion Gray

Hyperion Gray

Hyperion Gray are a small research and development team focused on innovative work in a variety of areas including Software & Security Research, Penetration Testing, Incident Response, and Red Teaming

CerraCap Ventures

CerraCap Ventures

CerraCap Ventures invest globally into early-stage B2B companies in Healthcare, Enterprise AI and Cyber Security.

Symmetry Systems

Symmetry Systems

Symmetry Systems is a provider of data store and object-level security (DSOS) solutions that give organizations visibility into, and unified access control of, their most valuable data assets.

UncommonX

UncommonX

UncommonX offers enterprise-class cybersecurity protection for mid-size organizations by combining adaptive threat and intelligence software with 24/7 industry experts.

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center of Vietnam has a central monitoring function and is a technical focal point for monitoring and supporting information security for people, businesses and systems.

SecurityGen

SecurityGen

SecurityGen is a global cybersecurity start-up focused on telecom security, with a focus on 5G networks.

Network Perception

Network Perception

Network Perception proactively and continuously assures the security of critical OT assets with intuitive network segmentation verification and visualization.

Persistent Systems

Persistent Systems

Persistent Systems are a trusted Digital Engineering and Enterprise Modernization partner, combining deep technical expertise and industry experience to help our clients.

Hook Security

Hook Security

Setting a new standard in security awareness. Hook Security is a people-first company that uses psychological security training to help companies create security-aware culture.

Cybersecurity Dubai

Cybersecurity Dubai

Protect your business from cyber-attacks with Cybersecurity Dubai, your partner in online security solutions.

Kong

Kong

Kong - powering the API world. Increase developer productivity, security, and performance at scale with the unified platform for API management, service mesh, and ingress controller.

Tracer

Tracer

Tracer (formerly Appdetex) is a next-generation brand protection solution. It constantly finds, analyzes, and stops brand abuse across Web2 and Web3 digital channels.