📜 ⬆️ ⬇️

Report of the Information Security Monitoring Center for the II quarter of 2017

In the report, we collected summary statistics on information security events and incidents recorded by our corporate Monitoring Center recorded in the second quarter of 2017.

For three months, sensors recorded and analyzed 254,453,172 information security events and identified 144 incidents.

In the previous quarter of 2017, the Monitoring Center recorded 137,873,416 IS events and 98 incidents .
')

Monitoring results


In the period from April 1 to June 30, 2017, employees of the Monitoring Center monitored the information systems of several organizations with a total number of connected nodes of about 15,500 (workstations, web, mail, file storages, VPN, etc.).

image

We see a significant increase in the number of recorded events (+ 85%) and incidents (+ 47%). At the same time, the number of nodes on the monitoring grew more slowly, the increase for the II quarter. 2017 was about 30%.

As will be seen in one of the graphs below, the number of attempts to exploit vulnerabilities has greatly increased (for example, EternalBlue used in the ransomware attacks of WannaCry and Petya ).

image

Event Type Descriptions
“Informational event” - informational events that may be useful in the analysis of an incident.

“Violation of the IS policy” - events that indicate actions that allegedly violate the requirements of the IS Policy of a controlled organization.

“Attack or exploitation” - events that indicate attempts to remotely execute a code or exploit vulnerabilities in controlled resources.

"Scan" - events that indicate the study of the network before attempting an attack.
“Password Selection” - events that indicate attempts to gain access to monitored resources by selecting authentication data.

"Trojans and viruses" - events that indicate the fact of infection of controlled resources with viruses or malware activity.

“DDoS” - events that indicate attempts to carry out distributed denial of service attacks.

“Other” - events which by their nature cannot be attributed to one of the classes listed above.

Among the 144 incidents identified:
Class
incident
High criticality
Average criticality
Low criticality
Total incidents
Share of incidents
Malicious software
eight
21
14
43
thirty%
Attack
four
five
3
12
eight%
Password Selection
eleven
eight
four
23
sixteen%
Violation of information security policy
2
6
13
21
15%
Vulnerability Exploitation
12
21
7
40
28%
DDoS
3
2
five
3%
Total:
40
63
41
144
100.0%


image

In I quarter. In 2017, the situation was a bit different:

image

The ratio of types of reported IS incidents during the year changed as follows:
The share of incidents,%
Incident classQ3 2016IV quarter 2016I quarter 2017Q2 2017
Malicious software42,85152thirty
DDoS14.31.933
Violation of information security policy14.313.2915
Password Selection23.813.214sixteen
Attack11.3sixteeneight
Vulnerability Exploitation4.89.4628

The recent publication of vulnerabilities discovered by foreign government agencies and their exploits did not go unnoticed in our Monitoring Center. We saw a distinct increase in attempts at exploitation. Fortunately, by the time of the large-scale attacks, we had already written signatures for network defenses and “caught” these attacks at an early stage, so we managed to avoid most of the VERY serious consequences.

In the first quarter of 2017, we saw attempts by some employees of organizations connected to the Monitoring Center to mine cryptocurrencies on corporate IT resources. Unfortunately, the high rate of bitcoin and ethereum provokes to continue to try to do it. Such incidents fell into the "Violation of the policy."

Distribution of information security incidents relative to the days of the week in Q2 2017:

image

Distribution of information security incidents in the second quarter of 2017:

image

This time we observe a fairly even picture, without sharp peaks.

TOP sources


The sources of attacks in this case are IP-addresses that were participants in the network interaction with controlled addresses.

The graph shows the location of the first hundred IP addresses by the number of registered events. Most of these addresses are located in Russia, the Netherlands and Germany, although, of course, it cannot be argued that the attackers were from these countries.

image

TOP incident-prone segments


The situation on the objectives of the attacks has changed slightly compared with the previous period. In I quarter. In 2017, more than half of all attacks were directed to user jobs.

image

In the reporting period, web segments were also often subjected to attacks, as well as user workstations. We associate this with the composition of the monitoring nodes. There was no particular malicious activity.

image

The most frequently used techniques for influencing systems that caused the IS incident


ThreatImpact Technique
Password SelectionAttempts to select authentication information for access to services and resources of controlled organizations - RDP, SSH, SMB, DB, Web.
Violation of the IS policyViolation by users / administrators of monitored resources of the requirements of IS policies regarding the use of outdated versions or untrusted software. This software can be used by an attacker to attack by exploiting a vulnerability. Also use the resources of the company for their own benefits (mining bitcoin / ethereum). Using torrent trackers.
Malicious softwareInfecting the final system, spreading the virus over the local network, shutting down / blocking services that prevent the spread of the virus, attempting other attacks within the network to obtain critical information and transmitting to command servers.
Attempts to exploit vulnerabilitiesThe use of deficiencies in the system for the violation of KCD and the impact on the correct operation of the system. Vulnerability can be the result of programming errors, deficiencies in the design of the system, configuration errors, lack of updates. Some vulnerabilities are known only theoretically, while others are actively used and have known exploits.

The print version of the report on the site amonitoring.ru .

Report for the I quarter. 2017

Thanks to Baymaxx for helping me prepare my report. Yes, you can believe him if he answers you in the comments.

Source: https://habr.com/ru/post/333810/


All Articles