Cyber Security

Unveiling the Dark Side: Half of Cyber Attacks Linked to Malware Concealed in Encrypted Data

Alert: Attempt to access property “post_title” on null in /home/defensea/english.defensearabia.com/wp-content/themes/mh-magazine/includes/core/Custom-Functions.php on line 275

Alert: Attempt to access property “post_parent” on null in /home/defensea/english.defensearabia.com/wp-includes/link-template.php on line 479

Alert: Attempt to access property “post_name” on null in /home/defensea/english.defensearabia.com/wp-includes/link-template.php on line 517

Deprecated: rtrim(): Passing null to parameter #1 ($string) of type string is deprecated in /home/defensea/english.defensearabia.com/wp-includes/formatting.php on line 2829

Alert: Attempt to access property “ID” on null in /home/defensea/english.defensearabia.com/wp-includes/link-template.php on line 534

Alert: Attempt to access property “post_excerpt” on null in /home/defensea/english.defensearabia.com/wp-content/themes/mh-magazine/includes/core/Custom-Functions.php on line 281


Alert: Trying to access array offset on value of type bool in /home/defensea/english.defensearabia.com/wp-content/themes/mh-magazine/includes/core/Custom-Functions.php on line 283

Deprecated: ltrim(): Passing null to parameter #1 ($string) of type string is deprecated in /home/defensea/english.defensearabia.com/wp-includes/formatting.php on line 4486

Alert: Attempt to access property “post_title” on null in /home/defensea/english.defensearabia.com/wp-content/themes/mh-magazine/includes/core/Custom-Functions.php on line 283

DUBAI, UAE, 1st September, 2016 – An unexpected result of the rising adoption of encryption technology is a surge in cyber attacks, as per a recent report by A10 Networks (NYSE: ATEN), a frontrunner in application networking and security solutions. Executed in collaboration with Ponemon Institute, the network security analysis, titled Hidden Threats in Encrypted Traffic: A Study of North America & EMEA, surveyed 1,023 IT and cybersecurity professionals across North America and Europe, revealing the significant challenges these experts encounter in safeguarding against and uncovering attacks on encrypted data traveling in and out of their organizations’ infrastructures.

An increasing number of enterprises are resorting to encryption technology to secure their network information. Nevertheless, for numerous security directors, the burden of analyzing this escalating volume of encrypted data results in deteriorated network performance – often a miscalculated presumption influenced by the specific technology and solution choices, which can result in costly repercussions. The dilemma lies in the fact that SSL encryption not only conceals data traffic from potential intruders, but also from standard security tools. The encryption technology pivotal for protecting sensitive data in transit, such as web transactions, emails, and mobile applications, may permit malware hidden within that encrypted traffic to evade examination within an organization’s security infrastructure.

Almost half of surveyed individuals (47 percent) indicated the absence of enabling security tools as the foremost reason for not inspecting decrypted web traffic—closely followed by inadequate resources and compromise of network performance (both 45 percent). Yet, 80 percent of participants state their organizations experienced a cyber attack or malicious insider incident within the past year. Almost half also noted that the attackers utilized encryption to elude discovery.

Although 75 percent of survey participants recognize that their networks are at risk from malware concealed within encrypted traffic, approximately two-thirds concede that their organization is ill-equipped to identify harmful SSL traffic, which leaves them exposed to hazardous data breaches and potential loss of intellectual property. Among the IT professionals contributing to the survey, the largest proportion operates within financial services, followed by healthcare and the public sector – three sectors that are most in dire need of safeguarding sensitive information.

Furthermore, the threat is anticipated to escalate as the volume of encrypted data traffic continues to increase, with a majority of respondents forecasting that cyber attackers will enhance their utilization of encryption in the upcoming year to escape detection and circumvent controls. Many organizations may find themselves unprepared, as their security measures struggle against the weight of significant SSL vulnerabilities.

“IT decision-makers must adopt a more strategic approach,” remarked Dr. Chase Cunningham, director of cyber operations at A10 Networks. “The adversaries are seeking ROI much like the defenders, and they prefer not to exert excessive effort to attain it. Rather than striving for perfection by doing everything right every time, IT leaders can achieve greater effectiveness by focusing on a few initiatives very thoughtfully using the best technology at their disposal. It’s akin to the cybersecurity version of a zombie marathon — as long as you manage to avoid being the slowest in eluding the zombies, you minimize risk.”

“The Hidden Threats in Encrypted Traffic study illuminates crucial insights regarding the malicious risks lurking within today’s corporate frameworks,” stated Dr. Larry Ponemon, chairman and founder of Ponemon Institute. “Our objective is to aid organizations in enhancing their understanding of the threats to effectively address vulnerabilities in their systems.”

 

Related Articles

Back to top button