Subscribe
About
  • Home
  • /
  • Security
  • /
  • OT risk gets serious, new backdoor samples soar and volume of medium-severity vulnerabilities increases

OT risk gets serious, new backdoor samples soar and volume of medium-severity vulnerabilities increases

Skybox Security’s 2020 Vulnerability and Threat Trends Report analyses what shaped the threat landscape over 2019 and what it means for the year ahead.

Skybox Security, a global leader in cyber security management, today announced the release of its latest Vulnerability and Threat Trends Report, which analyses the vulnerabilities, exploits and threats in play over last year.

The report, compiled by the team of security analysts at the Skybox Research Lab, aims to help organisations align their security strategy with the reality of the current threat landscape.

Key findings from the report include:

  • New backdoor samples quadrupled;
  • OT advisories grew by over 50%; and
  • The number of new crypto-mining samples halved between 2018 and 2019.

Compared to 2018’s figures, vulnerabilities within Microsoft OSs increased by 66% in 2019.

Ron Davidson, VP of R&D and CTO for Skybox Security, commented on the increase in new OT advisories: “The need for greater protections within OT networks is clearer than ever: not only has a record number of new OT advisories been disclosed by ICS-CERT, the technology is also increasingly exposed to IT vulnerabilities as it becomes unavoidably linked with more Internet-connected devices and applications. In order to combat this increasing threat, security teams need to find ways to passively discover vulnerabilities within OT networks and find alternatives to patching when patching isn’t an option.”

The decline in creation of new crypto-mining samples is also notable. Last year, crypto-miners became criminals’ malware of choice. This year, owing in large part to a global decline in the value of crypto-currency, the creation of new miners has declined. More traditional forms of malware fill the gap left by crypto-miners, with new backdoor samples becoming 2019’s top malware family, followed by ransomware (with new samples increasing by 116%) and botnets (with an increase of 83%).

Another takeaway from the report is that the volume of vulnerabilities with medium-severity Common Vulnerability Scoring System (CVSS) scores is increasing: while the total number of new vulnerability reports appears to be stabilising – this year there was a modest rise of 3.8% to 17 220 new flaws – the share of medium-severity instances increased from 34% in 2018 to 40% in 2019. This increase comes at the expense of high-severity vulnerabilities, which declined by around 5%.

“Just because a vulnerability is classified as having medium severity, it doesn’t mean that it carries a medium risk,” said Sivan Nir, Threat Intelligence Team Leader at Skybox Security. “What matters is how each vulnerability relates to the security environment that it sits in. Security teams need to stop being blinded by CVSS scores. While they’re distracted by remediating all of their critical- and high-severity vulnerabilities, they could be ignoring an exposed medium-severity vulnerability. In order to better protect their infrastructure, the CISO needs to find smarter ways of working. This starts with gaining full network visibility and enforcing exposure-based remediation strategies.”

Whether protecting against backdoors and ransomware, threats to the OT network or simply trying to keep up with what vulnerability to fix next, incorporating accurate, up-to-date threat intelligence in vulnerability management programs will give organisations the edge they need to counter a dynamic threat landscape. Skybox’s approach formalises this into a systematic process where vulnerabilities are discovered regularly and on demand; prioritised in the context of the network, assets and threats; and remediated or mitigated in accordance with the risk they pose. Such an approach is vital to being proactive against today’s threats and adaptive to those yet to come.

To read the full 2019 Vulnerability and Threat Trends Report, click here.

Please click here to download the OT security management Whitepaper.

Share

Skybox Research Lab 

The Skybox Research Lab is a team of security analysts who daily scour data from dozens of security feeds and sources as well as investigate sites in the dark web. The Research Lab validates and enhances data through automated as well as manual analysis, with analysts adding their knowledge of attack trends, cyber events and the tactics, techniques and procedures (TTPs) of today’s attackers. Their ongoing investigations determine which vulnerabilities are being exploited in the wild and used in distributed crimeware such as ransomware, malware, exploit kits and other attacks exploiting client– and server–side vulnerabilities.

For more information on the methodology behind the Skybox Research Lab and to keep up with the latest vulnerability and threat intelligence, visit www.vulnerabilitycenter.com.

Tweet This: Medium-severity vulnerabilities now make up 40% of all new CVSS reports. But medium-severity doesn’t = medium risk. Learn about the new dangers facing organizations in the 2020 Vulnerability and Threat Trends Report: http://bit.ly/2w4vONS

© 2020 Skybox Security, Inc. All rights reserved. Skybox Security and the Skybox Security logo are either registered trademarks or trademarks of Skybox Security, Inc., in the United States and/or other countries. All other trademarks are the property of their respective owners. Product specifications subject to change at any time without prior notice.

Skybox Security

Skybox provides the industry’s broadest cybersecurity management platform to address security challenges within large, complex networks. By integrating with more than 140 networking and security technologies, the Skybox® Security Suite provides comprehensive attack surface visibility and the context needed for informed action. Our analytics, automation and intelligence improve the efficiency and performance of security operations in vulnerability and threat management and firewall and security policy management for the world’s largest organizations.

Editorial contacts