Search This Blog

Hackers adopting new tactics, techniques and procedures

NTT security published a report focusing on how organizations need to have better penetration testing to reduce the continual changes in hackers’ tactics, techniques, and procedures (TTPs).

“Our Q3 2016 report confirms that hackers are relentless and constantly employing new means to penetrate networks to steal confidential data,” said Rob Kraus, Director, Security Research and Strategy, NTT Security. “Organizations’ first line of defense is to determine where and how these attacks are taking place so they can deploy the most efficient and appropriate network security solutions to minimize their exposure and liabilities.”

According to the report, there are many  cities have seen in the gradual  increase in the type of attacks during Q3 ’16, which have affected every type of industries with finance being the most , followed by retail and manufacturing.

Main Observations


  • Finance was the most attacked industry in Q3 ‘16, with 23 percent of all attacks. Others in the top five industries were retail (19 percent), manufacturing (18 percent), technology (12 percent) and healthcare (11 percent).
  • 43 percent of attacks against finance were web application attacks, with SQL injection as the most common attack method.
  • There have been widespread increases in brute force attacks, highlighted by a 4,800 percent increase in brute force attacks in the retail industry.
  • 73 percent of malware delivered to the healthcare industry was from spam email with malicious attachments.
  • NTT Security detected a 17 percent increase in ransomware infections in the healthcare industry from Q2 ’16 to Q3 ’16.
  • Analysts have observed a shift in TTPs, from selling stolen data to more “direct cash back” revenue models like ransomware and Business Email Compromise (BEC) attacks.
  • Researchers detected an increase in attacks actively targeting a 2014 vulnerability in the Netcore/Netis router from almost 9,000 unique IP addresses spanning 1,427 businesses in over 110 countries.


“Comprehensive and customized MSS platforms will play an increasingly important role in leveling the cybersecurity playing field. The first step in implementing an effective MSS solution is to determine where the problems exist so they can be resolved,” Kraus emphasizes.
Share it: