Q1. What specific issue does Symantec's recently launched Targeted Attack Analytics (TAA) technology help enterprises to address and how?
Targeted attacks are one of the most dangerous threats to enterprise security today. Currently, there are 140 targeted attack groups known to Symantec with an average of 29 new groups appearing each year over the past three years.
We recently introduced Targeted Attack Analytics (TAA), a major advancement in cyber security innovation that helps enterprises combat adversaries who have evolved their attack techniques to avoid the latest threat detection and machine learning tools. TAA is a joint-effort between Symantec's Attack Investigation Team – responsible for uncovering some of the most notable cyber attacks in history, including Stuxnet, WannaCry and Bayrob – and a team of security experts and data scientists leading the industry in machine learning research and applications for security.
Unlike what's offered on the market today, TAA combines the human intelligence of Symantec's Attack Investigation Team with advanced machine learning to automate the discovery of these dangerous targeted attacks. The technology available in TAA is comprised of the same tools Symantec used to uncover Dragonfly 2.0, which targeted dozens of energy companies and gained access to operational networks. Since its internal inception, TAA has already uncovered attacks for more than 1,300 customers per month.
Further, by codifying the knowledge of the world's leading security experts into artificial intelligence, Symantec will deliver world-class expertise to millions of companies, both reducing the costs and the need to hire security experts that are a scarce resource in today's labor market.
Q2. What did Symantec's 2018 Internet Security Threat Report reveal about the effectiveness of current security tools to deal with modern cyber threats? Where exactly are the biggest gaps?
One of the biggest discoveries in our 2018 Internet Security Threat Report is about how cryptojacking attacks exploded by 8,500 percent. This is a newer type of attack with a low barrier to entry—only requiring a couple of lines of code to operate—in which cyber criminals can harness stolen processing power and cloud CPU usage from consumers and enterprises to mine cryptocurrency. Coin miners can slow devices, overheat batteries, and in some cases, render devices unusable. For enterprise organizations, coin miners can put corporate networks at risk of shutdown and inflate cloud CPU usage, adding cost.
We also identified a 200 percent increase in attackers injecting malware into the software supply chain last year. Hijacking software updates provides attackers with an entry point for compromising well-guarded networks. The Petya outbreak was a particularly destructive example. After using Ukrainian accounting software as a point of entry, Petya used a variety of methods to spread laterally across corporate networks to deploy its malicious payload.
Mobile threats also continue to grow year-over-year. We blocked an average of 24,000 malicious mobile applications each day last year. As older versions of mobile operating systems continue to be in use, this problem is exacerbated. In the ISTR, we noted that only 20 percent of Android devices were running its latest operating system, and only 2.3 percent were on the latest minor release. Mobile users also face privacy risks from grayware apps that aren't completely malicious but can be troublesome. We found that 63 percent of grayware apps leak the phone number from the device. With grayware increasing by 20 percent in 2017, this isn't a problem that's going away.
Q3. Symantec has a broad portfolio of security products and services. What is your main technology messaging going to be at Black Hat USA 2018?
Today's businesses have complex technology infrastructures that combine on-premises, cloud-based and virtual machine technology. Employees access corporate networks and data from a myriad of devices, and download apps using public Wi-Fi. This digital transformation means that simply setting up a perimeter or running anti-virus software on a machine is no longer an effective way to protect a company's sensitive data.
In the Cloud Generation, nearly everyone depends on cloud apps and services for nearly everything, at work and in their personal lives. Our identities and personas are spread across dozens of different services and platforms. Information flows freely across an ever-growing number and variety of devices, some of which are company-owned, most of which are not. The Cloud Generation is changing everything.
Our main message at Black Hat 2018 is around securing the cloud generation and how CISOs must future-proof their technology infrastructure to ensure they're protected against the rapidly evolving threat landscape. Our dedication to innovation means not only building new products and acquiring new technologies, but also seamlessly integrating these products to provide our customers with consistent and comprehensive protection.
With more than 500 security researchers around the globe, our team is always looking for new organized attack groups, studying how they work and predicting their next steps. We use that knowledge to power our technology, harden endpoints, isolate threats, control data access, beat the adversaries at their own game and ultimately better protect our customers.
At Symantec, our technology unifies cloud and on-premises security to provide advanced threat protection and holistic information protection across all endpoints, networks, email and cloud applications. Our Integrated Cyber Defense platform is powered by the largest civilian threat intelligence network, robust point-to-point integrations and a broad technology ecosystem, working together to improve visibility, enhance controls, accelerate response, and reduce ownership costs for more than 350,000 businesses worldwide.