A research study finds ransom was the No. 1 motivation behind cyber-attacks, followed by malware and IoT botnets.

Radware, Mahwah, N.J., found that hackers and companies agree on one thing—data is lucrative. That’s because, according to “Global Application and Network Security Report 2016-2017,” 49% of businesses confirmed being the subject of a cyber-ransom campaign in 2016. What’s more, 27% of IT professionals surveyed chose data leakage or loss as a key concern when faced with a cyber-attack, while only 19% chose service outage, 16% selected reputation loss and just 9% cited customer or partner loss.

The full report identifies 2016’s major attack trends, outlines industry preparedness and gives insider views from the front lines to the corner office. Among the biggest trends:

  • 41% reported that ransom was the top motivation behind cyber-attacks they had experienced in 2016, followed by insider threats (27%), political hacktivism (26%) and competition (26%).
  • Half of all organizations surveyed experienced a malware or bot attack in the past year, and 55% said that Internet of Things (IoT) complicates their detection or mitigation requirements, as it increases the surface of the attack landscape.
  • Massive distributed denial of service (DDoS) attacks made headlines in 2016, but Radware’s research shows that attacks of more than 50 Gbps made up just 4% of attacks experienced.
  • More than 83% of DDoS attacks reported by organizations were under 1 Gbps.
  • Big attacks can do a lot of damage—35% reported impact to their servers, 25% claimed damage to their internet pipe and 23% said large-scale attacks impacted their firewall. These respondents defined “impact” as 100% exhaustion resulting in total failure.
  • Companies are still not prepared to face the threat landscape, as 40% of organizations do not have an incident response plan in place, 70% do not have cyber-insurance, and despite the prevalence of ransomware, only 7% keep bitcoins on hand.

“One thing is clear—money is the top motivator in the threat landscape today,” says Carl Herberger, vice president of security solutions. “Attackers employ an ever-increasing number of tactics to steal valuable information, from ransom attacks that can lock up a company’s data to DDoS attacks that act as a smoke screen for information theft to direct brute force or injection attacks that grant direct access to internal data. Our report shows that most organizations are still not prepared to fend off many of the more sophisticated attacks.”

Key predictions from the report include:

  • With the code for the Mirai IoT Botnet now available to the public, novice and sophisticated hackers are already adjusting and “improving” the code’s capabilities based on their needs. In 2017, exponentially more devices are expected to become targeted and enslaved into IoT botnets. IoT device manufacturers will have to face the issue of securing their devices before they are brought to market, as botnet attacks from these devices can generate large-scale attacks that easily exceed 1 Tbps.
  • Cyber ransom is the fastest-growing motive and technique in cyber-attacks, as most phishing attempts now deliver ransomware. Today, threat actors focus their ransom attacks to target phones, laptops, company computers and other devices that are a daily necessity. In the future, they may target lifesaving healthcare devices like defibrillators.
  • Rise of permanent denial of service (PDoS) for data center and IoT operations. Also known as “phlashing” in some circles, PDoS is an attack that damages a system so badly that it requires replacement or reinstallation of the hardware itself. While these attacks have been around for a long time, they only appear sporadically. However, they can do a tremendous amount of damage. Radware predicts that more threat actors will target the destruction of devices via PDoS attacks in the coming year.
  • Telephony DoS (TDoS) is expected to rise in sophistication and importance, catching many by surprise. Cutting off communications during crisis periods could impede first responders’ situational awareness, exacerbate suffering and pain and potentially increase loss of life.
  • Public transportation held hostage. From trains and planes to buses and automobiles, entire systems of transportation are becoming self-guided. This automation is meant to provide increased safety, improved reliability and higher efficiencies. Most of this critical infrastructure may be vulnerable to threat actors looking to hijack public transportation or lock the system down with ransomware.

“Threat actors have a single focus, to develop the best tools possible to either disable an organization or steal its data,” says Herberger. “Businesses focus on delivering the highest value to their customers. In order to deliver that value, security must be woven into the customer experience for a company to truly succeed. Without this change in thinking, organizations will remain vulnerable.”