Telecoms industry and DNS attacks: Attacked the most, slowest to fix
Telecoms organisations face the most DNS-based attacks, and each attack costs companies an average of £460,000 (€513,000) to remediate. So says EfficientIP, a provider of DDI (DNS, DHCP, IPAM) solutions, in its latest report on cyber security in the global telecoms industry.
Outages experienced recently by EE, TalkTalk and others remind us of the pressure telecoms and their networks are facing due to the rise of edge computing, mobile app usage and on-demand videos to name a few.
The findings from new EfficientIP’s research on the global telecoms industry shows how much access into DNS Servers is valued by cyber criminals. A successful cyber breach on a telecoms organisation could lead to a loss of revenue for businesses due to slower internet connections and no landline telephone services. The research found three key themes:
Global and industry specific trends on DNS attacks:
- DNS-based attacks cost organisations globally £1.7 million (€1.90 million) on average every year across several industries.
- 76% of all organisations globally were subjected to a DNS attack in the past twelve months, and 28% suffered data theft.
- 42% of all respondents in the UK spent almost an entire business day (six hours) to restore their systems.
- Top five security threats for Telecoms organisations are DDoS (42%), Malware (36%), DNS Tunnelling (31%), Cache Poisoning (28%) and Zero-Day Exploits (20%).
Telecoms targeted most by DNS attacks and pay the most to fix cyber breaches:
- Telecoms have suffered more attacks than any other surveyed. Telecoms organisations admitted to having faced four attacks on average over the last twelve months.
- The average cost to fix a single attack is £460,000 (€513635.36) in the telecoms sector, highest in the survey. To put that into perspective, the average cost for the healthcare sector is £210,000 (€234485.71). Furthermore, 5% of telecoms organisations surveyed admitted an attack cost them more than £3.75 million (€4.19 million).
- A quarter of telecoms organisations (25%) admitted they have lost sensitive customer information as a result of a DNS attack. This is higher than any other sector surveyed.
- For 42% of telecoms companies surveyed, attacks resulted in in-house application downtime, which causes poor customer experience online. This number is the highest in the survey, tied with education (42%) and services (42%), followed closely by manufacturing (39%) and retail (37%), the lowest number going to the public sector (28%).
Telecom companies unprepared and slow to fix DNS cyber attacks:
- As recent cyber-attacks showed how crucial patching was to avoid easy exploits, telecoms have only applied an average of four patches out of the 11 critical patches recommended by ISC in 2016.
- It took longer for telecoms organisations to mitigate the attack. 40% of telecoms organisations admitted it took them six hours (almost a full working day) to mitigate a DNS attack. In contrast, over half of retailers only took one hour to fix the issue.
EfficientIP’s CEO, David Williamson, points out that recent news makes it more urgent than ever for telecoms organisations to protect their networks from DNS-based attacks and improve their network management tools. He says: “Telecoms organisations need to adapt to the new surge of cyber-attacks and cannot use yesterday’s security technology for today’s problems, otherwise short and long-term costs could strike a severe blow to company revenues.”
He added: “To face recent industry challenges and customers’ high performance expectations, the communications sector needs to change their approach to network management and incorporate automation as quickly as possible.”