top of page

X-Analytics Software Update: January 11, 2023

To ensure the X-Analytics Application remains current and produces reliable outcomes, the X-Analytics Research Team aggregates and analyzes historical and cyber risk intelligence data to calibrate backend variables within X-Analytics.

This update includes:


Threat

Industry Threat Baselines: -1.8% change

  • The industry threat baselines decreased by an average of 1.8% since the last update.

  • Most notable, Management of Companies and Enterprises (55), Administrative and Support, and Waste Manager and Remediation Services (56), and Agriculture, Forestry, Fishing, and Hunting (11) have the largest decreases in threat activity.  For this most part, these industries are experiencing an increase in human error and payment card skimming activity.

  • However, Finance and Insurance (52), Healthcare and Social Assistance (62), and Professional, Scientific, and Technical Services (54) continue to have the most significant threat activity.  These industries are experiencing high volumes of web application attacks, crimeware (including ransomware), and denial of service activity.

  • Denial of Service Attacks, Crimeware (including ransomware), and Web Application Attacks are the top three threat categories (in order of most likely to least likely).

  • The decrease in threat activity is partially related to decreases in human error, misuse, and common attack varieties that have settled slightly in volume.

Threat Conclusion: The decrease in threat activity will cause a decrease in cyber exposure for some customers.


Data Breach Probability

Data Breach Probability Baseline: -5.3% change

  • Data breach probability baseline decreased by an average of 5.3% since the last update.

  • This decrease is partially due to a decrease in overall data breach volume per month, data breach size (as in number of records), and associated hacking activity.

  • The average size of data breach is between 100k and 200k records.

Data Breach Conclusion: The decrease in data breach probability will cause a decrease in data breach cyber exposure for most customers.


Business Interruption

Business Interruption (DoS) Probability Baseline: +1.9% change

  • Business interruption (DoS) probability baseline increased by an average of 1.9% since the last update.

  • DDoS attacks less than 4-hour durations decreased by an average of 3.7%.

  • DDoS attacks between 4 hours and 12 hours decreased by an average of 12.2%.

  • DDoS attacks between 12 hours and 24 hours decreased by an average of 21.4%.

  • This increase is partially related to geopolitical tension causing long duration DDoS attacks.

Business Interruption (Other) Probability Baseline: -2.2% change

  • Business interruption (Other) probability baseline decreased by an average of 2.2% since the last update.

  • The increase in probability is partially related to an overall decrease in reported business interruption incidents in December 2023.

Business Interruption Conclusion: The increase in business interruption (DoS) probability decrease probability and the decrease in business interruption (Other) probability will cause a decrease in business interruption cyber exposure for most customers.


Ransomware

Ransomware Probability Baseline: +0.7% change

  • Ransomware baseline probability has increased by an average of 0.7% since the last update.

  • The increase in probability is partially due to targeted ransomware incidents.

Ransomware Conclusion: The increase in ransomware probability will cause an increase in ransomware cyber exposure for most customers.


Misappropriation

Misappropriation Probability Baseline: +0.9% change

  • Misappropriation baseline probability has increased by an average of 0.9% since the last update.

  • The increase in probability is partially related to an increase in business email compromise, privileged misuse, and lack of reporting earlier in the year.

Misappropriation of Funds - % of Payments Related to Fraud: +0.9% change

  • The “% of payment transactions related to fraud” value has increased by 0.8% since the last update.

  • This increase is partially related to an increase in attack persistence and an increase in false positives within certain countermeasures that are not stopping certain fraud activity.

Misappropriation Conclusion: The increase in misappropriation probability will cause an increase in misappropriation cyber exposure for most customers, and the increase in "percent of payments related to fraud" will cause an increase in misappropriation of funds cyber exposure for most customers.


Control Effectiveness

  • Control effectiveness was updated for web application attacks intersecting with servers and application, network, end-user-systems, terminals, ICS/SCADA/OT, offline media, and people.

  • Control effectiveness was updated for point-of-sale intrusion intersecting with servers and application, network, end-user-systems, terminals, ICS/SCADA/OT, offline media, and people.

  • Control effectiveness was updated for misuse intersecting with servers and application, network, end-user-systems, terminals, ICS/SCADA/OT, offline media, and people.

  • Control effectiveness was updated for error intersecting with servers and application, network, end-user-systems, terminals, ICS/SCADA/OT, offline media, and people.

  • Control effectiveness was updated for crimeware (including ransomware) intersecting with servers and application, network, end-user-systems, terminals, ICS/SCADA/OT, offline media, and people.

  • Control effectiveness was updated for denial-of-service attack intersecting with servers and application, network, end-user-systems, terminals, ICS/SCADA/OT, offline media, and people.

  • The control effectiveness changes caused a shift in the most effective CIS CSC controls amongst the 110 risk scenarios. Data protection, security awareness training, secure configuration, access control, and asset inventory are currently the most effective controls.



If you have questions, please submit a support request here.



bottom of page