DNS-based Attacks Cost Businesses Over $2 million Annually

New research reveals global organisations gamble their business future on poorly designed network security solutions

Photo Credit : http://www.paymentscardsandmobile.com/,

EfficientIP, a leading provider of network services, announced the results of its 2017 Global DNS Threat Survey Report.

It explored the technical and behavioural causes for the rise in DNS threats and their potential effects to businesses across the world. Major issues highlighted by the study in its third year, include a lack of awareness as to the variety of attacks, a failure to adapt security solutions to protect DNS and poor responses to vulnerability notifications.

These concerns will not only be subject to regulatory changes, but also create a higher risk of data loss, downtime or compromised public image.

According to the report, carried out among 1,000 respondents across APAC, Europe and North America, 94 percent of respondents claim DNS security is critical for this business. Yet, 76 percent of organisations have been subjected to a DNS attack in last 12 months and 28 percent suffered data theft.

The Global DNS Threat Survey Report also estimates the yearly average costs of the damages caused by DNS attacks to be $2.236 million (for organisations with 3,000+ employees). The leading causes were: Malware (35 percent), DDoS (32 percent), Cache Poisoning (23 percent), DNS Tunnelling (22 percent) or Zero-Day Exploits (19 percent).

“The results once again highlight that despite the evolving threat landscape and the increase in cyber-attacks, organisations across the globe and their IT departments still don’t fully appreciate the risks from DNS-based attacks,” said David Williamson, CEO at EfficientIP.

“In less than a year, GDPR will come into effect, so organisations really need to start rethinking their security in order to manage today’s threats and save their business from fines of up to £20 million or 4 percent of global revenue."

Globally, the results varied widely. 39 percent of respondents from the UK and US demonstrated more awareness of the top five DNS-based attacks than Spain (38 percent), Australia (36 percent), Germany (32 percent) and France (27 percent), but less than India (50 percent) and Singapore (47 percent).

In the UK, the attacks organisations are the most aware of include: DNS-based Malware (52 percent), DDoS (43 percent), DNS Tunnelling (39 percent), Cache Poisoning (34 percent) and Zero-Day Exploits (28 percent).

Other key UK findings:
* A quarter of organisations have been subjected to DDoS (26%) with 41 percent of those over 5Gb/sec, Cache Poisoning (25 percent) or Zero-Day attacks (25 percent) in the past year while almost a third have been vulnerable to Phishing (32 percent) or DNS-based Malware (29 percent) attacks.

* Almost a third (29 percent) of organisations surveyed experienced Data Exfiltration via DNS. Of those, 16 percent had sensitive customer information stolen and 15 percent intellectual property stolen. This could be social security numbers, job assignments or even bank details.

* A third (34 percent) stated they have experienced more than five attacks in the last 12 months.

* By taking the measure of closing down affected applications to mitigate an attack, 38 percent of organisations achieved what the attacker intended to do.

* For 50 percent of those who experienced a DNS attack, it took more than six hours, almost a full business day to mitigate it, requiring more than four members of staff in 34 percent of cases, which for many organisations may be their entire network security team.

* Most worryingly, many believe they are protected, but they are not. Almost all organisations (99 percent) in the UK did not apply the necessary security patches, compare to 83 percent globally.

Recommendations from the report
The following steps can be taken by organisations to ensure continuity of service and data protection for them, their users and clients:

* Replace useless firewall and load balancers with purpose-built DNS security technology.
* Keep their DNS security up to date by patching DNS servers more often.
* Enhance their threat visibility by using deep DNS transaction analysis.



Advertisement

Around The World