Millions Lost To DNS Attacks On Global Governments
Recent research conducted by EfficientIP, has revealed that global Governments lose approximately $7m to domain name system (DNS) attacks every year.
This figure is the most amount of money lost in any sector.
In IDC’s ‘Global DNS Threat Report 2019,’ it surveyed nearly 1,000 IT and security leaders from across the world to see what impact DNS attacks have had.
The report showed that public sector organisations suffer on average 12 DNS attacks per year, costing $6.7m.
51% of the respondents reported in-house applications becoming inaccessible as a result of DNS attacks in the past 12 months, while 43% faced cloud service downtime.
41% suffered compromised websites which put data at risk.
EfficientIP also claimed that over half of respondents (51%) were forced to shut down a server to stop an attack, pointing to poor levels of incident response and preparedness.
EfficientIP CEO, David Williamson, argued that as more Government services move online it has expanded cyber criminal’s DNS attack surface.
“When 91% of malware uses DNS, analysis of DNS transactions is vital for uncovering these dangerous threats hidden in network traffic. In particular, the detection of data exfiltration via DNS requires visibility and analytics on transactions from the client to the destination domain,” he added.
“Despite this, our latest research shows governments are significantly more exposed than other sectors to DNS attacks. This is unacceptable when governments are trusted with sensitive information by their citizens, so they need to understand the potential risks to protect both themselves and the public.”
As many as a third (32%) of Government respondents said that DNS security is only low or moderately important.