Analysis of 300 incidents spots an elephant in the room Large numbers of data breaches are being initiated by targeted malware that antivirus software simply can’t detect, an analysis of 300 real-world incidents from 2011 has suggested.Trustwave’s 2012 Global Security Report studied 300 incidents across 18 countries where the company’s SpiderLabs division was called into investigate what had gone wrong.In 100 percent of the incidents, malware undetectable by a representative sample of antivirus products must have been the root cause of what had happened, typically entering an organisation via an employee’s PC.Specifically, 88 percent of the malware isolated by Trustwave was able to evade detection by all antivirus products used in the test, while the remaining 12 percent that did flag malware were only able to do so retrospectively, possibly months after being used in an attack. In other words, the malware had won the battle on every occasion. “We have anti-virus, shouldn’t we be protected?” is often heard during Trustwave investigations,” the report found. “The historical perception of antivirus and the sometimes blind faith in its ability to detect and stop malware is one of the reasons attackers are so successful in what they do.” The net effect of this invisibility was that 84 percent of the affected organisations only realised they had suffered a data breach when alerted by an external body such as law enforcement, a regulatory body, a partner or even the public. By that time, the breach had been active on the network for a startling average of 173 days, with some appearing to go back years.“Antivirus has a role but many organisations make that a large role,” said Trustwave SpiderLabs head, Nicholas J. Percoco. “The reality is that antivirus vendors only know about what they know about.”“The criminals go to great lengths to develop new malware that they do not throw out,” said Percoco. Antivirus software couldn’t detect it because its targeted nature meant that vendors might never see it until it had been used in a successful attack.A common factor in three quarters of the breaches was that some aspect of the IT had been outsourced to a third party, he said.The most commonly stolen data were customer records, responsible for 89 percent of lost data, with more than a third of the detected breaches happening in franchised businesses. The food and beverage industry accounted for 44 percent of breach incidents.In addition to an over-reliance on antivirus, the commonest security weaknesses included poor or non-existent logging and passwords being shared between systems; the favourite password found was ‘password1’. Trustwave also found a decided lack of enthusiasm for data breach disclosure. Related content news Okta launches Cybersecurity Workforce Development Initiative New philanthropic and educational grants aim to advance inclusive pathways into cybersecurity and technology careers. By Michael Hill Oct 04, 2023 3 mins IT Skills IT Skills IT Skills news New critical AI vulnerabilities in TorchServe put thousands of AI models at risk The vulnerabilities can completely compromise the AI infrastructure of the world’s biggest businesses, Oligo Security said. By Shweta Sharma Oct 04, 2023 4 mins Vulnerabilities news ChatGPT “not a reliable” tool for detecting vulnerabilities in developed code NCC Group report claims machine learning models show strong promise in detecting novel zero-day attacks. By Michael Hill Oct 04, 2023 3 mins DevSecOps Generative AI Vulnerabilities news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe