Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Incident Response

Malware Analysts Say Breaches Are Not Being Disclosed by Their Employers

According to a recent study from ThreatTrack Security, nearly 6 in 10 malware analysts at U.S. enterprises have investigated or addressed a data breach that was never disclosed by their company.

According to a recent study from ThreatTrack Security, nearly 6 in 10 malware analysts at U.S. enterprises have investigated or addressed a data breach that was never disclosed by their company.

These results indicate that known data breaches may be significantly underreported and are putting customers and partners at risk. Moreover, according the survey, companies with more than 500 employees are even more likely to have had an unreported breach, with 66% of malware analysts with enterprises of that size reporting undisclosed data breaches.

The independent blind survey of 200 security professionals dealing with malware analysis within U.S. enterprises was conducted by Opinion Matters on behalf of ThreatTrack Security in October 2013.

Malware“While it is discouraging that so many malware analysts are aware of data breaches that enterprises have not disclosed, it is no surprise that the breaches are occurring,” said ThreatTrack CEO Julian Waits, Sr. “Every day, malware becomes more sophisticated, and U.S. enterprises are constantly targeted for cyber espionage campaigns from overseas competitors and foreign governments. This study reveals that malware analysts are acutely aware of the threats they face, and while many of them report progress in their ability to combat cyber-attacks, they also point out deficiencies in resources and tools.”

Outmanned, Outgunned and Out of Time

Not surprisingly, 40% of respondents said that one of the most difficult aspects of defending their organization’s network was the fact that they don’t have enough highly-skilled security personnel on staff.

According to the company, malware analysts often spend their time “tackling easily avoidable malware infections originating at the highest levels of their organization.”

In the survey, malware analysts revealed a device used by a member of their senior leadership team had become infected with malware due to executives:

Advertisement. Scroll to continue reading.

• Visiting a pornographic website (40%)

• Clicking on a malicious link in a phishing email (56%)

• Allowing a family member to use a company-owned device (45%)

• Installing a malicious mobile app (33%)

When asked to identify the most difficult aspects of defending their companies’ networks from advanced malware, 67% said the complexity of malware is a chief factor; 67% said the volume of malware attacks; and 58% cited the ineffectiveness of anti-malware solutions.

More than half (52%) of all malware analysts said it typically takes them more than 2 hours to analyze a new malware sample. Conversely, only 4% said they are capable of analyzing a new malware sample in less than an hour, with 35% saying they did not have access to an automated malware analysis solution.

The study asked also malware analysts for their opinions on government-sponsored cyber espionage. 37% of respondents said the U.S. is the country most adept at conducting cyber espionage. China was a close second at 33%.

Related Insights: Cloud-Based Sandboxing: An Elevated Approach to Network Security

Related InsightsI’m a Fortune 500 Company and I’ve Been Hacked

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.

Incident Response

Microsoft has rolled out a preview version of Security Copilot, a ChatGPT-powered tool to help organizations automate cybersecurity tasks.

Malware & Threats

Threat actors are increasingly abusing Microsoft OneNote documents to deliver malware in both targeted and spray-and-pray campaigns.