A woeful patching record and an over reliance on firewalls is partly to blame for the telecoms industry suffering more Domain Name System attacks than any other sector, new research has revealed.

The poll by vendor EfficientIP found that telcos, which made up 10 percent of the cross-industry survey of 1,000 execs, faced on average four DNS attacks each in 2016.

A quarter of telcos admitted they lost sensitive customer information – again more than any other sector – while the average attack cost £460,000 to fix.

Moreover, 40 percent of telcos said it took them six hours to mitigate a DNS attack, the report found.

DDoS and malware were the top two threats, with DNS tunnelling, cache poisoning and zero-day exploits rounding out the top five.

The impacts of a DNS attack are four-fold: internal and external app downtime, brand damage and loss of revenue.

EfficientIP noted that telcos were prime targets for hackers given their reliance on IP-based networks and the huge amount of valuable data they hold.

However, it said they had applied on average just four of the 11 critical patches recommended by the Internet Systems Consortium (ISC) in 2016.

Speaking to European Communications, Hervé Dhelin, SVP Strategy at EfficientIP, described the lack of patching as “the most annoying” result that the survey had thrown up.

He said: “[Telcos] will have hundreds of DNS servers, with load balancers and firewalls in front.

“Each time they need to do maintenance, they need to update a lot of servers.

“It takes time and unfortunately they’re using one tech.”

Dhelin noted that a reliance on one type of infrastructure, such as the cloud, meant it was “open bar for a hacker” once a vulnerability was published.

“What we’re telling customers is don’t just use one tech – it’s a single point of failure,” he said.

According to Dhelin, the problems are mainly cultural.

In particular, he pointed the finger at outmoded thinking around firewalls being sufficient to protect DNS servers.

“This doesn’t work!” Dhelin said.

“A firewall is an external software trying to understand what is happening inside a DNS server – but there are several services inside and until you know which one is under attack you don’t know what to do.”

Looking ahead, Dhelin said the arrival next year of GDPR would “change the game” given businesses have 72 hours to report attacks that have happened.

“We will discover that more and more companies suffer data breaches,” he predicted.

Read more: BT Security CEO on red teaming, response times and protecting nation states

More News

BT signs up Symantec to tackle SME cyber threats BT signs up Symantec to tackle SME cyber threats BT has teamed up with Symantec to expand its security offering with a new solution for SMEs. More detail
Proximus bets on emoticons to help recruitment drive :-) Proximus bets on emoticons to help recruitment drive :-) Proximus is hoping winking face and see-no-evil monkey will help it to recruit the likes of copper splicers and data scientists. More detail
BT, VEON announce senior exec departures BT, VEON announce senior exec departures BT’s legal chief and the man in charge of transformation at VEON are set to be replaced, the two operators have revealed. More detail
SIRO, Huawei trial 10GBps fibre technology SIRO, Huawei trial 10GBps fibre technology Irish wholesale broadband provider SIRO has tested an emerging fibre technology that could allow it to offer symmetrical 10GBps connections to customers. More detail
Nokia sees Group COO depart Nokia sees Group COO depart Nokia’s Group COO has left the company just over six months after the role was created. More detail
    

@eurocomms