EE, TalkTalk and other recent outages remind us of the pressure telecoms and their networks are beginning to face due to the rise of edge computing, mobile app usage and on-demand videos to name a few.
The findings from new EfficientIP research on the global telecoms industry shows how much access into DNS Server is valued by cyber criminals. A successful cyber breach on a telecoms organisation could lead to a loss of revenue for businesses due to slower internet connections and no landline telephone services. The research found three key themes:
Global and industry-specific trends on DNS attacks
- DNS-based attacks cost organizations globally 1.7 million on average every year across several industries.
- 76% of all organizations globally were subjected to a DNS attack in the past twelve months, and 28% suffered data theft.
- 42% of all respondents in the UK spent an entire business day (six hours) to restore their systems.
- Top five security threats for Telecoms organizations are: DDoS (42%), Malware (36%), DNS Tunnelling (31%),
- Cache Poisoning (28%) and Zero-Day Exploits (20%).
Telecoms targeted most by DNS attacks and pay the most to fix cyber breaches
- Telecoms have suffered more attacks than any other surveyed. Telecoms organisations admitted to having faced four attacks on average over the last twelve months.
- The average cost to fix a single attack is 460,000 in the telecoms sector, highest in the survey. To put that into perspective, the average cost for the healthcare sector is 210,000. Furthermore 5% of telecoms organizations surveyed admitted an attack cost them more than 3.75 million.
- A quarter of telecoms organisations (25%) admitted they have lost sensitive customer information as a result of a DNS attack. This is higher than any other sector surveyed.
- For 42% of telecoms companies surveyed, attacks resulted in in-house application downtime, which causes poor customer experience online. This number is the highest in the survey, tied with education (42%) and services (42%), followed closely by manufacturing (39%) and retail (37%), the lowest number going to the public sector (28%).
Telecom companies unprepared and slow to fix DNS cyber attacks
As recent cyber-attacks showed how crucial patching was to avoid easy exploits, telecoms have only applied an average of four patches out of the 11 critical patches recommended by ISC in 2016.
It took longer for telecoms organisations to mitigate the attack. 40% of telecoms organisations admitted it took them six hours (almost a full working day) to mitigate a DNS attack. In contrast, over half of retailers only took one hour to fix the issue.
EfficientIPs CEO, David Williamson, points out that recent news makes it more urgent than ever Telecoms organizations protect their networks from DNS-based attacks and improve their network management tools. He said: Telecoms organizations need to adapt to the new surge of cyber-attacks and cannot use yesterdays security technology for todays problems, otherwise short and long term costs could strike a severe blow to company revenues. He added: To face recent industry challenges and customers high performance expectations, the communications sector needs to change their approach to network management and incorporate automation as quickly as possible.