Akamai's State of the Internet / Security: Carrier Insight Report Highlights the Importance of Information Sharing in Battle Against Cyber Threats(13:30 Hrs. IST)
CAMBRIDGE, Mass., April 17, 2018 /PRNewswire/ -- Akamai Technologies, Inc. (NASDAQ: AKAM), the world's largest and most trusted cloud delivery platform, today announced the availability of the State of the Internet / Security: Carrier Insights Report for Spring 2018, which shows that sharing information is an important factor in helping to defend against cyber threats. The report analyzes data from more than 14 trillion DNS queries collected by Akamai between September 2017 and February 2018 from communications service provider (CSP) networks around the world.
For more than 19 years, Nominum, acquired by Akamai in 2017, has leveraged in-depth DNS data to improve overall protection against sophisticated cyberattacks such as distributed denial of service (DDoS), ransomware, trojans, and botnets. Akamai's Carrier Insight Report builds upon the Nominum expertise and highlights the effectiveness of DNS-based security that is enriched with data coming from other security layers. This layered security approach involves gathering various security solutions to collectively protect an organization's data.
"Siloed understanding of attacks against individual systems isn't enough for defenders to prepare for today's complicated threat landscape," said Yuriy Yuzifovich, Director of Data Science, Threat Intelligence, Akamai. "Communicating with varying platforms is critical when acquiring knowledge across teams, systems and data sets. We believe that the DNS queries that our service provides act as a strategic component to arming security teams with the proper data necessary for that big picture view of the threat landscape."
Tackling the Mirai Botnet: Collaboration in Action
Collaboration between teams within Akamai played a crucial role in discovering Mirai command and control (C&C) domains to make future Mirai detection more comprehensive. The Akamai Security Intelligence and Response Team (SIRT) has been following Mirai since its inception, using honeypots to detect Mirai communications and identify its C&C servers.
In late January 2018, Akamai's SIRT and Nominum teams shared a list of over 500 suspicious Mirai C&C domains. The goal of this was to understand whether, if by using DNS data and artificial intelligence, this list of C&C could be augmented, and make future Mirai detection more comprehensive. Through several layers of analysis, the combined Akamai teams were able to augment the Mirai C&C dataset to discover a connection between Mirai botnets and distributors of the Petya ransomware.
This collaborative analysis suggested an evolution of IoT botnets, from a nearly exclusive use case of launching DDoS attacks to more sophisticated activities such as ransomware distribution and crypto-mining. IoT botnets are difficult to detect because there are very few indicators of compromise for most usersand yet, the collaborative research by these teams created the chance to find and block dozens of new C&C domains to control the activity of the botnet.
The exponential rise in public consumption of cryptocurrency adoption has been reflected in a sharp, observable increase in the number of crypto-mining malware strains, and the number of devices infected with them.
Akamai observed two distinct business models for large-scale crypto-mining. The first model uses infected devices' processing power to mine cryptocurrency tokens. The second model uses code embedded into content sites that make devices that visit the site work for the cryptominer. Akamai conducted extensive analysis on this second business model, as it poses a new security challenge for users and website owners alike. After analyzing the cryptominer domains, Akamai was able to estimate the cost, in terms of both computer power and monetary gains, from this activity. An interesting implication of this research shows that cryptomining could become a viable alternative to ad revenue to fund websites.
Changing Threats: Malware and Exploits Repurposed
Cybersecurity is not a static industry. Researchers have observed hackers leveraging old techniques to reuse in today's current digital landscape. Over the six months that Akamai collected this data, a few prominent malware campaigns and exploits show notable changes in their operating procedure, including:
To learn more about the report, please visit the Akamai booth #N3625 in Moscone Center North during the RSA Conference on Thursday, April 19 at 10:30am when Akamai's Principal Security Researcher Yohai Einav will present on the research process itself and the specific findings.
A complimentary copy of the State of the Internet / Security Carrier Insights Report Spring 2018 is available for download at: www.akamai.com/us/en/multimedia/documents/state-of-the-internet/spring-2018-state-of-the-internet-security-report.pdf.
Akamai Security Research analyzes daily, weekly and quarterly data sets to predict the next moves cybercriminals will take. The goal is to detect attack signals in the sea of DNS data, and validate known attack types while simultaneously detecting new, unknown and unnamed malicious activity. In addition to using commercial and public data sources, the team analyzes 100 billion queries daily from Akamai customers. Akamai works with more than 130 service providers in over 40 countries, resolving 1.7 trillion queries daily. This sample represents approximately three percent of total global DNS traffic generated by consumers and businesses worldwide.
As the world's largest and most trusted cloud delivery platform, Akamai makes it easier for its customers to provide the best and most secure digital experiences on any device, anytime, anywhere. Akamai's massively distributed platform is unparalleled in scale with over 200,000 servers across 130 countries, giving customers superior performance and threat protection. Akamai's portfolio of web and mobile performance, cloud security, enterprise access, and video delivery solutions are supported by exceptional customer service and 24/7 monitoring. To learn why the top financial institutions, e-commerce leaders, media & entertainment providers, and government organizations trust Akamai please visit www.akamai.com, blogs.akamai.com, or @Akamai on Twitter.
View original content with multimedia:www.prnewswire.com/news-releases/akamais-state-of-the-internet--security-carrier-insight-report-highlights-the-importance-of-information-sharing-in-battle-against-cyber-threats-300630702.html
SOURCE Akamai Technologies, Inc.