
BlackFog collected threat statistics on a global basis for the first 6 months of 2019. What follows is a summary of the data exfiltration across all endpoints across Windows, Mac, Android and iOS devices.
Dark Web
BlackFog saw some trends from Q1 with a significant increase in Dark Web exfiltration representing 5.67% of traffic, a 40% increase from Q1. BlackFog also saw a 44% decrease in Powershell attacks over the same period moving from 6.34% to 3.51% of all threats. This is most likely due to the changes implemented by Microsoft in recent Windows updates to eliminate some of the known execution vulnerabilities with PowerShell.
Geographic Data Exfiltration
BlackFog also saw the most dramatic changes this quarter in the amount of data exfiltrated to Russia which has now risen by more than 26% from 15.22 to 19.22% of all traffic. Interestingly, this peaked in April and May at 20.81 and 21.69% respectively before settling down at 15.16% in June. During the same period we saw a significant decrease in exfiltration to China from 4.58 to 2.65% a decrease of approximately 42% from Q1.
Direct IP’s and Spyware
No significant changes were found with other core statistics. Spyware represented 2.39%, and the use of direct IP’s for communicating with servers represented 43.26% of all attacks.
Major Threat Vectors
Related Posts
Data Backup and Data Recovery: What Every Business Needs to Know
Understand these critical data backup and data recovery steps to reduce the risk of lengthy downtime following data loss.
DNS Exfiltration: How Hackers Use Your Network to Steal Data Without Detection
Learn how DNS exfiltration works and why this method of data theft often goes undetected.
How Do You Protect Yourself From Hackers? Proactive Strategies for Business Data Security
Follow these advanced data protection strategies to help protect your firm from hackers in an increasingly challenging environment.
5 Steps to a Disaster Recovery Plan That Protects Your Business
Follow these key steps to develop a data backup and recovery plan fit for the digital-first world.
Data Protection Management: Building a Resilient Data Security Framework
Keep these six key principles in mind to ensure your data protection management solutions are as effective as possible.
Data Leakage Demystified: Risks and Mitigation Strategies
Learn everything you need to know about common data leakage risks and how to mitigate them.