Modernizing Authentication — What It Takes to Transform Secure Access
According to FireEye's 2H 2012 Advanced Threat Report, most enterprises currently experience a malware event once every three minutes.
Due to their high concentration of intellectual property, tech companies far exceed the average, experiencing malware events as often as once a minute.
The report states that spear phishing is the most common method of initiating malware attacks, using common business terms such as "UPS" to trick victims into opening attachments. In fully 92 percent of such attacks, the malware is delivered as a ZIP file.
"Tactically, the fact that 92 percent of attachments in email attacks are ZIP files should encourage serious debate on how to filter such files in corporate networks," FireEye researcher Rob Rachwald wrote in a blog post.https://o1.qnsr.com/log/p.gif?;n=203;c=204634421;s=15939;x=7936;f=201702151714490;u=j;z=TIMESTAMP;a=20304455;e=i
The report also examines methods used to avoid detection, such as malware that executes only when the user moves a mouse.
"Today, malware writers spend enormous effort on developing evasion techniques that bypass legacy security systems," FireEye senior director of research Zheng Bu said in a statement. "Unless enterprises take steps to modernize their security strategy, most organizations are sitting ducks."