2015 Global Threat
Intelligence Report
An analysis of security trends in the
Financial Services industry
• over 6 billion attacks
• trillions of logs
• over 18,000 clients
• 28% Financial Services
industry respondents
Data gathered from NTT security
companies and NTT’s live Global
Threat Intelligence Platform
56% of attacks
originate from
IP addresses
within the US
but attackers
could be
anywhere in
the world
Attack analysis
Attack sources
US
56% China
9%
France
2%
India
1.5%
Germany
2%
Netherlands
2%
Denmark
1.1%
Russia
2%
Ukraine
1.3%
Canada
0.9%
Australia
9%
Rest 9%
UK
3%
Attacks by sector
• Finance sector still #1 target
with 18% of all detected attacks
Finance
0%
2%
4%
8%
10%
12%
14%
16%
18%
6%
Business
&professional
Manufacturing
Retail
Healthcare
Technology
Education
Government
Pharmaceuticals
Insurance
Transport&
distribution
Gaming
Media
Hospitality,leisure
&entertainment
Non-profit
Other
• However, this is a slight decrease of
2% from the previous year
Attacks and incident response
• Reconnaissance activity from 4% to 10%
• Crafted attacks on targeted victims more common
Other 5%
Known Bad Source 3%
Evasion Attempts 3%
DoS / DDoS 5%
Application
Specific Attack 7%
Reconaissance 10%
Anomalous Activity 20%
Network Manipulation 18%
Web Application Attack 15%
Service Specific Attack 14%
Attacks by type
6% 32%of all Malware attacks are in the
Financial Services sector
Malware attacks have reduced 2%
year-on-year in this sector
The Financial Services sector has one
of the lowest Malware attack rates.
of Incident Response Engagements came
from the Financial Services industry.
The sector’s sensitivity to attacks has
driven the prevalence of formal incident
response processes and procedures.
The sector’s response rate is twice that 	
of the next most active sector, 		
Business Services (16%)
dimensiondata.com/globalthreatreport #GlobalThreatReport
Threat intelligence defined
2. Raw information
collected based on
requirements
3. Information
processed  exploited
4. Intelligence
analysis
 production
1.Consumer needs,
planning, requirements
 direction
5. Dissemination
of product
to consumer
Attacks have shifted
from application
to user
7 / 10 vulnerabilities
relate to end-user systems
Users connected
to public network
using personal,
and often more
vulnerable devices
End-user exploits
spike after weekends
/ holidays when
users reconnect
End-user systems
often have unpatched
vulnerabilities
• 76% of vulnerabilities
+ 2 years old
• 9% of those +10 years old
The user is the perimeter
7/10
Vulnerabilities targeted in exploit kits
Cybercrime is
$$ $ $$ $Software exploit kits sold in hacking forums 	 hackers take advantage
of unpatched flaws install malicious software on vulnerable devices
Increased focus on Adobe Flash since security on Java and Internet Explorer improved in 2014.
Java
Adobe Acrobat
Internet Explorer
Adobe Flash
Firefox
Windows
Silverlight
Others
2013 2014
110
100
90
80
70
60
50
40
30
20
10
0
Changing profile of cybercriminals
Organised crime groups
with considerable resources
and expertise
Attacks motivated by:
• profit
• botnet infrastructure
• extortion
• fame/notoriety
• hacktivism
Incident response  threat intelligence
• Incident response 	
capabilities maturing 		
at a slow pace.
• 74% of organisations
have no formal incident
response plan.
Average incident
response time
Organisations
with no
vulnerability
management
programme take
nearly 200 days to
patch vulnerabilities
with CVSS score
of 4.0 or more
The threat
intelligence cycle
Our approach to
successful threat
intelligence helps
numerous enterprises
stay protected

More Related Content

PPTX
Velocis Presentations
PDF
End-User Computing Insights: A study of digital maturity
PPTX
Key Trends and Opportunities in Business Mobility and Enterprise Communications
PDF
2015 Global Contact Centre Benchmarking Report key findings
PDF
Importance of Enterprise Mobility Solution in Healthcare
PPTX
Financial Impact of BYOD Programs
PDF
IT Security Trends in 2012
PDF
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
Velocis Presentations
End-User Computing Insights: A study of digital maturity
Key Trends and Opportunities in Business Mobility and Enterprise Communications
2015 Global Contact Centre Benchmarking Report key findings
Importance of Enterprise Mobility Solution in Healthcare
Financial Impact of BYOD Programs
IT Security Trends in 2012
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS

What's hot (20)

PDF
Mobile Workspaces Go Where You Go [Infographic]
PDF
7 Best Practices to Protect Critical Business Information [Infographic]
PDF
IDC: Top Five Considerations for Cloud-Based Security
PPTX
7 steps to developing a mobile device policy
PPT
Extending applications securely to wireless health workers.
PPT
Changing Your Enterprise Architecture - Mobile is Not an Add-On
PDF
PDF
Resilience Engineering as an IT Cultural Discipline
PDF
Wireless survey-report-saa-2016
PDF
Top 3 Reasons to Deliver Web Apps with Application Virtualization
PDF
There's No Such Thing As "Downtime" In a Hospital
PDF
Choosing the right network management solution: Increase network visibility t...
PPT
Enterprise Mobility Strategy
PDF
Cloud Insights from 110 Projects
PDF
10 Reasons to Strengthen Security with App & Desktop Virtualization
PDF
Shadow IT
PDF
Windows Apps on Chromebooks: Deliver a Seamless Experience
PDF
Best practices for mobile enterprise security and the importance of endpoint ...
PDF
12 Game Changing Ways to Mobilize Teaching and Learning
PDF
Mobile Workspaces Go Where You Go [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]
IDC: Top Five Considerations for Cloud-Based Security
7 steps to developing a mobile device policy
Extending applications securely to wireless health workers.
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Resilience Engineering as an IT Cultural Discipline
Wireless survey-report-saa-2016
Top 3 Reasons to Deliver Web Apps with Application Virtualization
There's No Such Thing As "Downtime" In a Hospital
Choosing the right network management solution: Increase network visibility t...
Enterprise Mobility Strategy
Cloud Insights from 110 Projects
10 Reasons to Strengthen Security with App & Desktop Virtualization
Shadow IT
Windows Apps on Chromebooks: Deliver a Seamless Experience
Best practices for mobile enterprise security and the importance of endpoint ...
12 Game Changing Ways to Mobilize Teaching and Learning
Ad

Similar to 2015 Global Threat Intelligence Report (20)

PDF
2015 Global Threat Intelligence Report - an analysis of global security trends
PDF
Before the Breach: Using threat intelligence to stop attackers in their tracks
PDF
Managed security services for financial services firms
PDF
IBM Security Services
PPTX
The Evolution of Cybercrime
PDF
2016 trustwave global security report
PDF
The challenges of Retail Security
PDF
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
PDF
The Executive's Guide to the 2016 Global Threat Intelligence Report
PDF
IBM 2015 Cyber Security Intelligence Index
PDF
Article 1 - cyber threat.pdf
PDF
2014 Trustwave Global Security Report
PPT
Mark Arena - Cyber Threat Intelligence #uisgcon9
PPTX
Cyber Crime Threat Landscape - A Focus on the Financial Industry
PDF
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
PDF
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
PDF
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
PDF
Whitepaper 2015 industry_drilldown_finance_en
PPTX
Global threat landscape
PDF
Cyber Security index
2015 Global Threat Intelligence Report - an analysis of global security trends
Before the Breach: Using threat intelligence to stop attackers in their tracks
Managed security services for financial services firms
IBM Security Services
The Evolution of Cybercrime
2016 trustwave global security report
The challenges of Retail Security
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
The Executive's Guide to the 2016 Global Threat Intelligence Report
IBM 2015 Cyber Security Intelligence Index
Article 1 - cyber threat.pdf
2014 Trustwave Global Security Report
Mark Arena - Cyber Threat Intelligence #uisgcon9
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Whitepaper 2015 industry_drilldown_finance_en
Global threat landscape
Cyber Security index
Ad

More from DImension Data (20)

PDF
Cisco spark - reinventing collaboration
PDF
What's new at the Tour de France
PDF
Digital technology revolutionised the viewing experience of the tour de france
PDF
Creating workspaces for tomorrow at the greatest cycling event in the world
PDF
Cloud: the race to digitisation is on!
PDF
6 stages of smart data at the Tour de France
PDF
Mobility at the network’s edge
PDF
Zurich case study how to move a data centre in 8 days
PDF
Zurich case study: Reducing risk for insurance customers
PDF
Strengthening Cybersecurity at the tour de france
PDF
High-performance solutions for an international university
PDF
What's inhibiting your business productivity
PDF
Creating powerful connections
PDF
Case study: how information saves lives
PDF
How we helped Fujifilm keep its customers' special memories safe
PDF
World’s first Cloud-enabled G20 Leaders’ Summit
PDF
Dimension Data Department Prime Minister and cabinet G20 case study
PDF
Cybersecurity, a presidential mandate
PDF
Dimension Data has been recognised as one of only 5 Top Global Top Employers
PDF
Virtualisation to cloud - are we there yet?
Cisco spark - reinventing collaboration
What's new at the Tour de France
Digital technology revolutionised the viewing experience of the tour de france
Creating workspaces for tomorrow at the greatest cycling event in the world
Cloud: the race to digitisation is on!
6 stages of smart data at the Tour de France
Mobility at the network’s edge
Zurich case study how to move a data centre in 8 days
Zurich case study: Reducing risk for insurance customers
Strengthening Cybersecurity at the tour de france
High-performance solutions for an international university
What's inhibiting your business productivity
Creating powerful connections
Case study: how information saves lives
How we helped Fujifilm keep its customers' special memories safe
World’s first Cloud-enabled G20 Leaders’ Summit
Dimension Data Department Prime Minister and cabinet G20 case study
Cybersecurity, a presidential mandate
Dimension Data has been recognised as one of only 5 Top Global Top Employers
Virtualisation to cloud - are we there yet?

Recently uploaded (20)

PPT
Business Process Analysis and Quality Management (PMgt 771) with 2 Credit Housr
PDF
Field Experiments in Experiments: A Basic Introduction
PPTX
business notesxxxxxxxxxxxxxxxxxxxxxxx.pptx
PDF
epic-retirement-criteria-for-funds (1).pdf
PPTX
₹2 Lakh Personal Loan in India – Complete Guide
PPTX
_Cyber-Futuristic AI Technology Thesis Defense.pptx
PPT
Joints.ppts qxqwcesceecsxwdsxwcdewd2wsew
PDF
Private Equity in Action: Sector-Specific Investments for High Growth”
PPTX
Premium Ch 36 Six Debates over Macroeconomic Policy.pptx
PPTX
ratio analysis presentation for graduate
PPTX
Leveraging the power of data for sustainable development
PPTX
481696537-Pediatric-pharmacokinetic.pptx
PDF
Histpry of Economic thoughts _I_Chapter3.pdf
PDF
Modern Advanced Accounting in Canada, 9th Edition by Darrell Herauf, Murray H...
PPT
Chapter 3-elasacity and its applications
PPT
Managerial Accounting Chap 1. Guide to managerial accounting
PDF
Fintech as a Gateway for Rural Investment in Bangladesh
PPTX
Terms, Use and Concept of sociology.pptx
DOCX
Tiếng anh 7 Friends Plus_ Unit 3 _Final Test.docx
PDF
Rituals of Grief Across Cultures (www.kiu.ac.ug)
Business Process Analysis and Quality Management (PMgt 771) with 2 Credit Housr
Field Experiments in Experiments: A Basic Introduction
business notesxxxxxxxxxxxxxxxxxxxxxxx.pptx
epic-retirement-criteria-for-funds (1).pdf
₹2 Lakh Personal Loan in India – Complete Guide
_Cyber-Futuristic AI Technology Thesis Defense.pptx
Joints.ppts qxqwcesceecsxwdsxwcdewd2wsew
Private Equity in Action: Sector-Specific Investments for High Growth”
Premium Ch 36 Six Debates over Macroeconomic Policy.pptx
ratio analysis presentation for graduate
Leveraging the power of data for sustainable development
481696537-Pediatric-pharmacokinetic.pptx
Histpry of Economic thoughts _I_Chapter3.pdf
Modern Advanced Accounting in Canada, 9th Edition by Darrell Herauf, Murray H...
Chapter 3-elasacity and its applications
Managerial Accounting Chap 1. Guide to managerial accounting
Fintech as a Gateway for Rural Investment in Bangladesh
Terms, Use and Concept of sociology.pptx
Tiếng anh 7 Friends Plus_ Unit 3 _Final Test.docx
Rituals of Grief Across Cultures (www.kiu.ac.ug)

2015 Global Threat Intelligence Report

  • 1. 2015 Global Threat Intelligence Report An analysis of security trends in the Financial Services industry • over 6 billion attacks • trillions of logs • over 18,000 clients • 28% Financial Services industry respondents Data gathered from NTT security companies and NTT’s live Global Threat Intelligence Platform 56% of attacks originate from IP addresses within the US but attackers could be anywhere in the world Attack analysis Attack sources US 56% China 9% France 2% India 1.5% Germany 2% Netherlands 2% Denmark 1.1% Russia 2% Ukraine 1.3% Canada 0.9% Australia 9% Rest 9% UK 3% Attacks by sector • Finance sector still #1 target with 18% of all detected attacks Finance 0% 2% 4% 8% 10% 12% 14% 16% 18% 6% Business &professional Manufacturing Retail Healthcare Technology Education Government Pharmaceuticals Insurance Transport& distribution Gaming Media Hospitality,leisure &entertainment Non-profit Other • However, this is a slight decrease of 2% from the previous year Attacks and incident response • Reconnaissance activity from 4% to 10% • Crafted attacks on targeted victims more common Other 5% Known Bad Source 3% Evasion Attempts 3% DoS / DDoS 5% Application Specific Attack 7% Reconaissance 10% Anomalous Activity 20% Network Manipulation 18% Web Application Attack 15% Service Specific Attack 14% Attacks by type 6% 32%of all Malware attacks are in the Financial Services sector Malware attacks have reduced 2% year-on-year in this sector The Financial Services sector has one of the lowest Malware attack rates. of Incident Response Engagements came from the Financial Services industry. The sector’s sensitivity to attacks has driven the prevalence of formal incident response processes and procedures. The sector’s response rate is twice that of the next most active sector, Business Services (16%)
  • 2. dimensiondata.com/globalthreatreport #GlobalThreatReport Threat intelligence defined 2. Raw information collected based on requirements 3. Information processed exploited 4. Intelligence analysis production 1.Consumer needs, planning, requirements direction 5. Dissemination of product to consumer Attacks have shifted from application to user 7 / 10 vulnerabilities relate to end-user systems Users connected to public network using personal, and often more vulnerable devices End-user exploits spike after weekends / holidays when users reconnect End-user systems often have unpatched vulnerabilities • 76% of vulnerabilities + 2 years old • 9% of those +10 years old The user is the perimeter 7/10 Vulnerabilities targeted in exploit kits Cybercrime is $$ $ $$ $Software exploit kits sold in hacking forums hackers take advantage of unpatched flaws install malicious software on vulnerable devices Increased focus on Adobe Flash since security on Java and Internet Explorer improved in 2014. Java Adobe Acrobat Internet Explorer Adobe Flash Firefox Windows Silverlight Others 2013 2014 110 100 90 80 70 60 50 40 30 20 10 0 Changing profile of cybercriminals Organised crime groups with considerable resources and expertise Attacks motivated by: • profit • botnet infrastructure • extortion • fame/notoriety • hacktivism Incident response threat intelligence • Incident response capabilities maturing at a slow pace. • 74% of organisations have no formal incident response plan. Average incident response time Organisations with no vulnerability management programme take nearly 200 days to patch vulnerabilities with CVSS score of 4.0 or more The threat intelligence cycle Our approach to successful threat intelligence helps numerous enterprises stay protected