CenturyLink Threat Report Reveals Top Attacks and How to Protect Your Network
MONROE, Louisana, Sept. 12, 2019 /PRNewswire/ -- Cyberthreats are escalating faster than many organizations can identify, block and mitigate them. Visibility into the expanding threat landscape is imperative, but according to a new threat report released by CenturyLink, Inc. , it is even more essential to act.
Experience the interactive Multichannel News Release here:
Read the 2019 Threat Report:
"As companies focus on digital innovation, they are entering a world of unprecedented threat and risk," said Mike Benjamin, head of CenturyLink's threat research and operations division, Black Lotus Labs [https://c212.net/c/link/?t=0&l=en&o=2572935-1&h=2868750878&u=https%3A%2F%2Fc212.net%2Fc%2Flink%2F%3Ft%3D0%26l%3Den%26o%3D2572935-1%26h%3D841727781%26u%3Dhttps%253A%252F%252Fwww.centurylink.com%252Fbusiness%252Fsecurity%252Fblack-lotus-labs.html%26a%3DBlack%2BLotus%2BLabs&a=Black+Lotus+Labs]. "Threats continue to evolve, as do bad actors. Well-financed nation-states and focused criminal groups have replaced the lone-wolf troublemaker and less sophisticated attackers motivated by chatroom fame. Thankfully, through our actionable insights, we can defend our network and those of our customers against these evolving threats."
-- Botnets: These rogue networks of infected computers continue to be
successful because of the ease with which they compromise their targets
and their ability to be operated remotely and covertly. Botnets like
Necurs, Emotet and TheMoon have demonstrated evolutions in both
complexity and resiliency. Malware families like Gafgyt and Mirai are
also ongoing concerns given their target of IoT devices.
-- DNS: Domain Name Server (DNS) is often overlooked as a potential attack
vector. However, we have seen a rise in DNS-based attacks, such as DNS
tunneling. A DNS tunneling attack can be used to encode data in the sub
domains of a DNS query or response, allowing unabated network access to
extract data, subvert security controls or send arbitrary traffic. Over
one recent multi-week period, Black Lotus Labs detected an average of
250 domains per day being abused, representing over 70,000 lookups to
-- DDoS: Distributed Denial of Service (DDoS) attacks continue to cause
service delays and take businesses offline. While we observed ongoing
progressions in attack sizes, we also detected an increase in burst
attacks, lasting a minute or less. Over the first half of the year,
CenturyLink's Security Operations Center (SOC) mitigated over 14,000
DDoS attacks against customers. A point of interest to note, of the top
100 largest attacks, in the first half of the year, 89 percent were
-- Geography: Geographies with growing IT networks and infrastructure
continue to be the primary source for cybercriminal activity. The top
five countries most under attack in the first half of 2019 were: The
United States, China, India, Russia and Vietnam. While the United
States, China and Russia have appeared on the list year-over-year, India
and Vietnam are new to the top five. Most C2 attacks in the first half
of 2019 targeted the United States, China, Russia, Netherlands and
Mexico. Netherlands and Mexico are new additions to the top five.
Daily, over 139 billion NetFlow sessions and 771 million DNS queries are ingested by various machine learning threat intelligence models developed by Black Lotus Labs. From January to June 2019, Black Lotus Labs:
-- Monitored for 1.2 million unique threats daily, representing 15 million
distinct malicious hosts.
-- Validated 4,120 new C2s, which equates to about 686 C2s per month.
-- Tracked 3.8 million unique threats per month. These threats are
correlated against CenturyLink NetFlow and DNS metadata to alert
customers to a potential compromise.
CenturyLink is serious about doing its part to help protect the internet, including disrupting the work of bad actors and providing insights and recommendations for enterprise defenders to safeguard their networks. Here are some things to consider:
-- Embed security directly into network layers to help create more agile
-- Identify the right solution for your business, taking into consideration
where you can expertly architect security controls and where you need an
-- Close the gap, collaborate on ways to build security into every product
and solution so security is not an afterthought.
-- Evaluate what constitutes a trusted network environment and practice
good cyber hygiene.
CenturyLink is a technology leader delivering hybrid networking, cloud connectivity, and security solutions to customers around the world. Through its extensive global fiber network, CenturyLink provides secure and reliable services to meet the growing digital demands of businesses and consumers. CenturyLink strives to be the trusted connection to the networked world and is focused on delivering technology that enhances the customer experience. Learn more at http://news.centurylink.com/ [https://c212.net/c/link/?t=0&l=en&o=2572935-1&h=2447974487&u=https%3A%2F%2Fc212.net%2Fc%2Flink%2F%3Ft%3D0%26l%3Den%26o%3D2572935-1%26h%3D266799522%26u%3Dhttp%253A%252F%252Fnews.centurylink.com%252F%26a%3Dhttp%253A%252F%252Fnews.centurylink.com%252F&a=http%3A%2F%2Fnews.centurylink.com%2F].
Logo - https://mma.prnewswire.com/media/134213/centurylink_logo.jpg [https://c212.net/c/link/?t=0&l=en&o=2572935-1&h=1588394246&u=https%3A%2F%2Fmma.prnewswire.com%2Fmedia%2F134213%2Fcenturylink_logo.jpg&a=https%3A%2F%2Fmma.prnewswire.com%2Fmedia%2F134213%2Fcenturylink_logo.jpg]
CONTACT: Media Contact: D. Nikki Wheeler, Nikki.Wheeler@CenturyLink.com, +1 720-888-0560; Investor Contact: Mark Stoutenberg, Mark.Stoutenberg@CenturyLink.com, +1 720-888-1662
Web site: http://www.centurylink.com/