EfficientIP: Service Providers Most Frequent Target of DNS Attacks with 11.4 Annual Attacks Per Company

Four out of five (83%) companies in the telecommunications & media sectors experienced a DNS attack last year

According to the IDC 2020 Global DNS Threat Report, over 8% of organizations in the industry suffered costs of more than $5 million per attack

WEST CHESTER, Penn.--()--EfficientIP, a leading specialist in DNS security for service continuity, user protection and data confidentiality, today published data revealing that the telecommunications & media sector is the most frequent victim of DNS attacks. According to the IDC 2020 Global DNS Threat Report, organizations in the sector experienced an average of 11.4 attacks last year, compared to 9.5 attacks across industries.

Overall, more than four out of five (83%) of service provider organizations experienced a DNS attack. In addition to being well above the overall average of 79%, a successful attack on telecommunications providers can have especially far reaching consequences as outages may affect customers in a wide variety of sectors relying on 24/7 availability of networks. As well as a high attack frequency, telecommunications providers also tended to experience costlier attacks with over 8% of organizations stating that they had suffered damage costs of over $5 million as a result of a DNS attack.

The most common attack types used by hackers were phishing attacks (37%), DNS-based malware (33%), DDoS attacks (27%), lock-up domain attacks (22%), which may cause DNS resolvers to exhaust their resources, as well as DNS amplification attacks (21%) which can result in the break-down of company networks potentially causing serious economic damages and disruptions.

Successful DNS attacks commonly resulted in in-house application downtime, experienced by 60% of organizations and cloud service downtime, which was reported by 54% of telcos surveyed. As previous outages have shown, service disruptions can result in both severe brand damage and customer churn as dissatisfied subscribers of telecommunications providers may switch to competitors with a more reliable network. The report indicates that a quarter (25%) of providers experienced brand damage while almost a third (31%) reported a loss of business. Lastly, for 18% of telcos, DNS attacks resulted in the theft of sensitive customer info. This is especially concerning since a large amount of customer information is at the mercy of the network which is trusted to perform at the highest levels.

While a large share of respondents implement comparatively blunt countermeasures to mitigate attacks, with 60% of organizations shutting down affected processes and connections and 55% disabling applications, effective solutions and strategies are starting to be implemented. This includes Zero Trust strategies which 75% of companies are either planning, piloting or already running. Other improvements include automation of security management policies - currently adopted by 59% of telcos - and passing of valuable DNS event information to SIEM and SOC (Security Operations Center) for helping simplify threat detection and accelerate remediation.

Considering the high be of attacks, telecommunications providers are increasingly acknowledging the important role DNS security plays in maintaining service continuity: 77% of organizations see DNS security as integral for their business. Ronan David, VP of Strategy, Business Development and Marketing, EfficientIP, noted: “With COVID-19 having caused a large-scale shift to remote work, telcos rely more than ever on a stable network availability and the high capacity needed to serve customer’s requests as quickly as possible. A successful DNS attack can have far reaching consequences – not just for the affected provider but also for its customers experiencing disruptions and outages. An effective DNS security architecture is key to fend off attacks and avoid downtimes.”

With 5G rollouts becoming more and more frequent, service providers would do well to prioritize DNS security as part of their overall security architecture. Next to “Zero Trust” strategies, companies can also augment their threat visibility using real-time, context-aware DNS transaction analytics for behavioral threat detection. This allows telcos to detect all threat types and prevent data theft to help meet regulatory compliance such as GDPR.

The full 2020 Global DNS Threat Report is available online. Read the full report here: https://www.efficientip.com/resources/idc-dns-threat-report-2020/

NOTE TO EDITORS

The research was conducted by IDC from January to April 2020. The data collected represents respondents' experience for the previous year. The results are based on 900 respondents in three regions - North America, Europe and Asia Pacific. Respondents included CISOs, CIOs, CTOs, IT Managers, Security Managers and Network Managers.

ABOUT EFFICIENTIP

EfficientIP is a network automation and security company, specializing in DNS-DHCP-IPAM solutions (DDI), with the goal of helping organizations worldwide drive business efficiency through agile, secure and reliable infrastructure foundations. We enable IP communication and simplify network management with end-to-end visibility and smart automation, while our patented technology secures DNS services to safeguard data and ensure application access. Companies in all sectors rely on our offerings to face the challenges of key IT initiatives such as cloud applications and mobility. For further information, please visit: www.efficientip.com

Contacts

PRESS CONTACT
APCO Worldwide for EfficientIP
Aftan Snyder
asnyder@apcoworldwide.com

Release Summary

Four out of five (83%) companies in the telecommunications & media sectors experienced a DNS attack last year.

Contacts

PRESS CONTACT
APCO Worldwide for EfficientIP
Aftan Snyder
asnyder@apcoworldwide.com