SecurityBrief Asia logo
Story image

Hackers speak out: New study turns security stats on their head

27 Feb 2017

Nuix has released its inaugural Black Report - one that takes the flipside approach to the mass of cybersecurity reports by looking at the hackers themselves.

66% of hackers and penetration testers like the challenge of hacking vulnerable systems, 23% do it for fun and profit, 9% do it for the money and 3% are ‘idealogues’. 29% of hackers work for medium size businesses of between 500 to 4999 people.

88% of hackers said they could get through security systems and compromise a target in fewer than 12 hours. 81% said they could both identify and take valuable data within another 12 hours. 

The study also confirms suspicions that attack methods are becoming ever more unique, with 50% of hackers changing their attack methods for every target. These limit the protection capabilities of solutions that only use known files and attack methods for their defence systems. 

What’s more, IT security teams are shown to be inefficient at catching attackers, with 69% of hackers stating that security teams almost never caught them in the act, while almost one third of respondents never detected attacks at all.

“Data breaches take an average of 250–300 days to detect—if they’re detected at all—but most attackers tell us they can break in and steal the target data within 24 hours. Organisations need to get much better at detecting and remediating breaches using a combination of people and technology,” comments Chris Pogue, Nuix CISO and Black Report co-author.

75% of organisations conduct limited remediation after a penetration tests, only fixing critical issues but ignoring all others.

Hackers have also confirmed that traditional security solutions such as firewalls and antivirus rarely slowed hacking progress, but endpoint security technologies are much more effective at stopping attacks. 

“If your defensive countermeasures are less flexible than the people trying to get around them, they have little to no chance of being effective; you will be protecting against an attack pattern that is no longer relevant. This underscores the importance of incorporating realistic, goal-oriented penetration testing into your security program. Only by continuously evaluating and enhancing your security countermeasures can you follow constantly shifting attack strategies,” the report says.

Nuix conducted the confidential study at DEFCON, the world’s largest hacking and security conference.    

Story image
Need for greater understanding of data security responsibility as cloud adoption grows - report
Despite the accelerated adoption of cloud services, there was a lack of clarity and confidence regarding the protection and recovery of data stored in public clouds.More
Story image
Users becoming more savvy with COVID phishing scams
“With COVID-19 being around for over a year now and employees becoming more aware of the types of scams that have come out related to the pandemic, cyber criminals are having less success with related phishing attacks."More
Story image
Major firms disclose breaches in the wake of SolarWinds attack
Microsoft, Shell, GoDaddy, MobiKwik — these are just some of the high-profile company's on the receiving end of sophisticated attacks, writes Bitglass senior director of marketing Jonathan Andresen.More
Story image
97% of organisations experienced a mobile threat in 2020 — report
93% of these attacks originated in a device network, which includes attempts to trick users into installing a malicious payload via infected websites or URLs, or to steal users’ credentials.More
Story image
Enterprises prioritise customer data protection but continue to leave it exposed
“Breaches of personal information strike at the heart of the relationship between enterprises and their customers."More
Story image
Video: 10 Minute IT Jams - Radware VP on the challenges of cloud security
In this interview, Techday speaks to Radware vice president of technologies Yaniv Hoffman, who discusses the primary challenges facing IT organisations in terms of their cloud security apparatus.More