AP NEWS

Rising Nation State Cyber Attacks from…Lebanon and the Netherlands? Optiv Security Cyber-Intelligence Report Reveals State of the Cyber-Threat Landscape

May 15, 2018

DENVER--(BUSINESS WIRE)--May 15, 2018--Optiv Security, the world’s leading security solutions integrator, has published its 2018 Cyber Threat Intelligence Estimate (CTIE), which details the current state of the cyber-threat landscape and uses estimative intelligence to predict how that landscape stands to change in the future. This report is generated to provide Optiv’s clients with a global view of security threats and trends, so they can effectively adapt their strategic plans to mitigate anticipated enterprise risk.

Among the key findings in the report:

The Rise of the Netherlands and Lebanon. Seemingly benign nation states such as Lebanon and the Netherlands are rising in the ranks of nation-sponsored attackers. The motivations for this rise are unclear, although both countries made headlines this year with cyberattacks: Lebanon for spying on thousands of people across 20 countries via an Android malware campaign; and the Netherlands for penetrating Russia’s Cozy Bear organization and uncovering the hack of the Democratic National Committee during the 2016 presidential election in the U.S. Cyber-Social is the Next Front for Nation States. Nation-state-sponsored attacks are expanding from “cyber-physical,” where the objective is to compromise data or critical infrastructure, to “cyber-social,” where the goal is to use social media to influence the opinions and actions of large populations of people. Russian cyber-social exploitation of European and American elections showed how relatively easy and cost-effective these can be, which dramatically increases the likelihood that this class of exploit will be exploited by a growing number of nation states, hacktivists and other groups in the future. Critical Infrastructure has been Breached. The utilities and energy industries experienced high indicators of exploit activity without any high-profile breaches. This suggests that attackers have access to critical infrastructure but are waiting to exploit this access in response to events such as war, or attacks on their own infrastructure. Healthcare IoT is Vulnerable. The Internet of Things (IoT) continues to suffer from weak security fundamentals and unmitigated vulnerabilities. The healthcare IoT is particularly problematic due to the increasing numbers of networked medical devices and the potential damage that could occur should those devices become compromised. Phishing Remains the Delivery Vehicle of Choice. Despite years of technology countermeasures, publicity and education campaigns, phishing remains the number one malware delivery mechanism. Additionally, while modern email security solutions can detect and stop emails with malicious attachments, they are still largely impotent against detecting hyperlinks to malicious websites. Protecting the Brand Rises in Importance. Brand security threats were the second most common source of alerts for Optiv during the year – behind phishing attacks, but ahead of typical security concerns such as data leakage and web vulnerabilities. These alerts were generated in response to the presence of “phony, misleading or malicious sites,” raising the importance of brand risk in the hierarchy of enterprise security concerns.

If you are a member of the media interested in further analysis on any of the issues addressed in Optiv’s 2018 Cyber Threat Intelligence Estimate, please contact Jason Cook at Jason.Cook@optiv.com or (816) 701-3374.

Follow Optiv Twitter: www.twitter.com/optiv LinkedIn: www.linkedin.com/company/optiv-inc Facebook: www.facebook.com/optivinc YouTube: https://www.youtube.com/c/OptivInc Blog: www.optiv.com/resources/blog Newsletter: www.optiv.com/optiv-advisor

About Optiv Security

Optiv helps clients plan, build and run successful cyber security programs that achieve business objectives through our depth and breadth of cyber security offerings, extensive capabilities and proven expertise in cyber security strategy, managed security services, incident response, risk and compliance, security consulting, training and support, integration and architecture services, and security technology. Optiv maintains premium partnerships with more than 350 of the leading security technology manufacturers. For more information, visit www.optiv.com.

View source version on businesswire.com:https://www.businesswire.com/news/home/20180515006297/en/

CONTACT: Optiv Security

Jason Cook, 816-701-3374

Jason.cook@optiv.com

or

Susan Vaillancourt, 603-459-8906

susan.vaillancourt@optiv.com

KEYWORD: UNITED STATES NORTH AMERICA CANADA COLORADO

INDUSTRY KEYWORD: ENERGY UTILITIES TECHNOLOGY DATA MANAGEMENT INTERNET NETWORKS SOFTWARE SECURITY HEALTH MOBILE/WIRELESS SOCIAL MEDIA COMMUNICATIONS GENERAL HEALTH

SOURCE: Optiv Security

Copyright Business Wire 2018.

PUB: 05/15/2018 11:49 AM/DISC: 05/15/2018 11:49 AM

http://www.businesswire.com/news/home/20180515006297/en

AP RADIO
Update hourly