By: Ben Spear, Senior Cyber Intelligence Analyst
In order to provide greater insight into the state, local, tribal, and territorial (SLTT) cybersecurity landscape we’re sharing some of the insights MS-ISAC gained from the first six months of 2016.
In the first six months of 2016, MS-ISAC monitored devices generated in excess of 2.76 trillion records for analysis, which resulted in over 20,000 actionable alerts to members. A large portion of these alerts were related to malware infections, with the top culprits being ransomware and click fraud malware associated with the Angler Exploit Kit (EK). As depicted in the chart below, June’s average weekly number of notifications fell to nearly half the activity observed at the start of the year and one-third of the peak activity observed in late March. The blue dashed line shows the overall downward trend in actionable malicious activity.