SlideShare a Scribd company logo
Cisco 2018, Annual Cybersecurity Report
2 Cisco 2018 Annual Cybersecurity Report | Table of contents
Table of contents
Executive summary........................................... 3
Part I: The attack landscape............................. 6
The evolution of malware .....................................................6
Encrypted malicious web traffic ............................................9
Email threats .......................................................................14
Sandbox evasion tactics .....................................................22
Abuse of cloud services and
other legitimate resources...................................................24
IoT and DDoS attacks..........................................................31
Vulnerabilities and patching ................................................38
Part II: The defender landscape...................... 46
The cost of attacks .............................................................46
Challenges and obstacles ..................................................47
Complexity created by vendors
in orchestration ..................................................................48
Impact: Public scrutiny from
breaches, higher risk of losses ...........................................50
Services: Addressing people and policies,
as well as technology..........................................................53
Expectations: Investing in
technology and training ......................................................54
Conclusion....................................................... 57
About Cisco..................................................... 60
Appendix.......................................................... 65
3 Cisco 2018 Annual Cybersecurity Report | Executive summary
Executive summary
What if defenders could see the future? If they knew an attack was coming, they
could stop it, or at least mitigate its impact and help ensure what they need to
protect most is safe. The fact is, defenders can see what’s on the horizon.
Many clues are out there—and obvious.
Adversaries and nation-state actors already have the
expertise and tools necessary to take down critical
infrastructure and systems and cripple entire regions. But
when news surfaces about disruptive and destructive cyber
attacks—such as those in Ukraine, for example, or elsewhere
in the world—some security professionals might initially think,
“Our company’s market/region/technology environment
wasn’t a target, so, we’re probably not at risk.”
However, by dismissing what seem like distant campaigns,
or allowing the chaos of daily skirmishes with attackers to
consume their attention, defenders fail to recognize the speed
and scale at which adversaries are amassing and refining their
cyber weaponry.
For years, Cisco has been warning defenders about escalating
cybercriminal activity around the globe. In this, our latest
annual cybersecurity report, we present data and analysis
from Cisco threat researchers and several of our technology
partners about attacker behavior observed over the past 12
to 18 months. Many of the topics examined in the report align
with three general themes:
1.	 Adversaries are taking malware to unprecedented
levels of sophistication and impact.
The evolution of malware (page 6) was one of the most
significant developments in the attack landscape in 2017.
The advent of network-based ransomware cryptoworms
eliminates the need for the human element in launching
ransomware campaigns. And for some adversaries, the
prize isn’t ransom, but obliteration of systems and data,
as Nyetya—wiper malware masquerading as ransomware—
proved (see page 6). Self-propagating malware is
dangerous and has the potential to take down the Internet,
according to Cisco threat researchers.
2.	 Adversaries are becoming more adept at evasion—
and weaponizing cloud services and other
technology used for legitimate purposes.
In addition to developing threats that can elude
increasingly sophisticated sandboxing environments
(page 22), malicious actors are widening their embrace
of encryption to evade detection (page 9). Encryption is
meant to enhance security, but it also provides malicious
actors with a powerful tool to conceal command-and-
control (C2) activity, affording them more time to operate
and inflict damage.
Cybercriminals are also adopting C2 channels that rely
on legitimate Internet services like Google, Dropbox,
and GitHub (see page 24). The practice makes malware
traffic almost impossible to identify.
Also, many attackers are now launching multiple
campaigns from a single domain (page 26) to get
the best return on their investments. They are also
reusing infrastructure resources, such as registrant email
addresses, autonomous system numbers (ASNs),
and nameservers.
3.	 Adversaries are exploiting undefended gaps in
security, many of which stem from the expanding
Internet of Things (IoT) and use of cloud services.
Defenders are deploying IoT devices at a rapid pace
but often pay scant attention to the security of these
systems. Unpatched and unmonitored IoT devices
present attackers with opportunities to infiltrate networks
(page 34). Organizations with IoT devices susceptible to
attack also seem unmotivated to speed remediation,
research suggests (page 42). Worse, these organizations
probably have many more vulnerable IoT devices in their
IT environments that they don’t even know about.
4 Cisco 2018 Annual Cybersecurity Report | Executive summary
Meanwhile, IoT botnets are expanding along with the
IoT and becoming more mature and automated. As they
grow, attackers are using them to launch more advanced
distributed-denial-of-service (DDoS) attacks (page 31).
Attackers are also taking advantage of the fact that
security teams are having difficulty defending both
IoT and cloud environments. One reason is the lack of
clarity around who exactly is responsible for protecting
those environments (see page 42).
Recommendations for defenders
When adversaries inevitably strike their organizations, will
defenders be prepared, and how quickly can they recover?
Findings from the Cisco 2018 Security Capabilities
Benchmark Study—which offers insights on security practices
from more than 3600 respondents across 26 countries—show
that defenders have a lot of challenges to overcome (see
page 46).
Even so, defenders will find that making strategic security
improvements and adhering to common best practices can
reduce exposure to emerging risks, slow attackers’ progress,
and provide more visibility into the threat landscape. They
should consider:
•• Implementing first-line-of-defense tools that can scale,
like cloud security platforms.
•• Confirming that they adhere to corporate policies and
practices for application, system, and appliance patching.
•• Employing network segmentation to help reduce
outbreak exposures.
•• Adopting next-generation endpoint process
monitoring tools.
•• Accessing timely, accurate threat intelligence data and
processes that allow for that data to be incorporated into
security monitoring and eventing.
•• Performing deeper and more advanced analytics.
•• Reviewing and practicing security response procedures.
•• Backing up data often and testing restoration
procedures—processes that are critical in a world of
fast-moving, network-based ransomware worms and
destructive cyber weapons.
•• Reviewing third-party efficacy testing of security
technologies to help reduce the risk of supply
chain attacks.
•• Conducting security scanning of microservice, cloud
service, and application administration systems.
•• Reviewing security systems and exploring the use of
SSL analytics—and, if possible, SSL decryption.
Defenders should also consider adopting advanced
security technologies that include machine learning and
artificial intelligence capabilities. With malware hiding its
communication inside of encrypted web traffic, and rogue
insiders sending sensitive data through corporate cloud
systems, security teams need effective tools to prevent or
detect the use of encryption for concealing malicious activity.
About the report
The Cisco 2018 Annual Cybersecurity Report presents our latest security industry advances designed to help organizations and
users defend against attacks. We also look at the techniques and strategies that adversaries use to break through those defenses
and evade detection.
The report also highlights major findings from the Cisco 2018 Security Capabilities Benchmark Study, which examines the security
posture of enterprises and their perceptions of their preparedness to defend against attacks.

Recommended for you

Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep Discovery

Targeted attacks and advanced persistent threats (APTs) are becoming the new norm of cyber security threats— encompassing organized, focused efforts that are custom-created to penetrate enterprises and government agencies for valuable data, trade secrets, and access to internal systems. We explore the anatomy of targeted attacks: the inner workings of the APT lifecycle, along with an in-depth overview of Trend Micro Deep Discovery advanced threat protection solution, and how it enables enterprise IT to adopt a custom defense strategy that modernizes its risk management program to defend against targeted attacks.

network securityrisk managementtrend micro
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum

This document introduces the need for a new security model to address the full attack continuum - before, during, and after attacks. Traditional security methods relying on detection and blocking are no longer adequate against modern threats. The threat landscape has evolved to include sophisticated, well-funded attackers employing techniques like zero-days, advanced persistent threats, and industrialized hacking for profit. Additionally, new business models and the growth of the Internet of Everything have expanded networks and attack surfaces. A new security model is needed to provide comprehensive visibility and protection across changing IT infrastructures and against evolving threats.

securitygartner
Intelligent cyber security solutions
Intelligent cyber security solutionsIntelligent cyber security solutions
Intelligent cyber security solutions

Information Security is an challenge to many companies. This paper helps team build secure operation center.

devopsinformation securitycybersecurity
Part I:
The attack landscape
6 Cisco 2018 Annual Cybersecurity Report | The attack landscape
Part I: The attack landscape
Adversaries are taking malware to unprecedented levels of sophistication and
impact. The growing number and variety of malware types and families perpetuate
chaos in the attack landscape by undermining defenders’ efforts to gain and hold
ground on threats.
THE EVOLUTION OF MALWARE
One of the most important developments in the attack landscape in 2017 was the evolution of ransomware. The
advent of network-based ransomware worms eliminates the need for the human element in launching ransomware
campaigns. And for some adversaries, the prize isn’t ransom, but the destruction of systems and data. We expect to
see more of this activity in the year ahead.
They’re out there: Defenders should prepare to face new, self-propagating,
network-based threats in 2018
1	 SamSam: The Doctor Will See You, After He Pays the Ransom, Cisco Talos blog, March 2016: blog.talosintelligence.com/2016/03/samsam-ransomware.html.
2	 Player 3 Has Entered the Game: Say Hello to ‘WannaCry,’ Cisco Talos blog, May 2017: blog.talosintelligence.com/2017/05/wannacry.html.
3	 New Ransomware Variant ‘Nyetya’ Compromises Systems Worldwide, Cisco Talos blog, June 2017: blog.talosintelligence.com/2017/06/worldwide-ransomware-variant.html.
In 2017, adversaries took ransomware to a new level—
although it had been expected. After the SamSam campaign
of March 20161
—the first large-scale attack that used the
network vector to spread ransomware, thereby removing the
user from the infection process—Cisco threat researchers
knew it would only be a matter of time before threat actors
found a way to automate this technique. Attackers would
make their malware even more potent by combining it with
“worm-like” functionality to cause widespread damage.
This malware evolution was swift. In May 2017, WannaCry—
a ransomware cryptoworm—emerged and spread like wildfire
across the Internet.2
To propagate, it took advantage of a
Microsoft Windows security vulnerability called EternalBlue,
which was leaked by the hacker group Shadow Brokers in
mid-April 2017.
WannaCry had earned more than US$143,000 through bitcoin
payments at the point the wallets were cashed out. Given the
timeline, and calculating accrual of the value on the bitcoin
originally paid into the wallets at $93,531, Cisco threat
researchers estimate that roughly 312 ransom payments
were made. As a comparison, the exploit kit Angler, when
it was active, was earning about $100 million per year as a
global business.
WannaCry did not track encrypted damage to and the
payments made by affected users. The number of users
who received decryption keys after making a payment is also
unknown. (WannaCry is still propagating, and users continue
to pay ransoms—in vain.) Due to the very low performance
of WannaCry as ransomware, the U.S. government and
many security researchers believe the ransom component
is effectively a smokescreen to conceal WannaCry’s true
purpose: wiping data.
Nyetya (also known as NotPetya) arrived in June 2017.3
This wiper malware also masqueraded as ransomware and it
too used the remote code execution vulnerability nicknamed
“EternalBlue,” as well as the remote code execution
vulnerability “EternalRomance” (also leaked by Shadow
Brokers), and other vectors involving credential harvesting
7 Cisco 2018 Annual Cybersecurity Report | The attack landscape
unrelated to the Shadow Brokers release.4
Nyetya was
deployed through software update systems for a tax software
package used by more than 80 percent of companies in the
Ukraine, and installed on more than 1 million computers.5
Ukraine cyber police confirmed that it affected more than
2000 Ukrainian companies.6
Before the rise of self-propagating ransomware, malware
was distributed in three ways: drive-by download, email, or
physical media such as malicious USB memory devices. All
methods required some type of human interaction to infect a
device or system with ransomware. With these new vectors
being employed by attackers, an active and unpatched
workstation is all that is needed to launch a network-based
ransomware campaign.
Security professionals may see worms as an “old” type
of threat because the number of worm-like Common
Vulnerabilities and Exposures (CVEs) has declined as product
security baselines have improved. However, self-propagating
malware not only is a relevant threat, but also has the
potential to bring down the Internet, according to Cisco threat
researchers. WannaCry and Nyetya are only a taste of what’s
to come, so defenders should prepare.
WannaCry and Nyetya could have been prevented, or their
impact muted, if more organizations had applied basic
security best practices such as patching vulnerabilities,
establishing appropriate processes and policies for incident
response, and employing network segmentation.
For more tips on meeting the threat of automated network-
based ransomware worms, read Back to Basics: Worm
Defense in the Ransomware Age on the Cisco Talos blog.
4	Ibid.
5	 Ukraine scrambles to contain new cyber threat after ‘NotPetya’ attack, by Jack Stubbs and Matthias Williams, Reuters, July 2017:
reuters.com/article/us-cyber-attack-ukraine-backdoor/ukraine-scrambles-to-contain-new-cyber-threat-after-notpetya-attack-idUSKBN19Q14P.
6	 The MeDoc Connection, Cisco Talos blog, July 2017: blog.talosintelligence.com/2017/07/the-medoc-connection.html.
7	 CCleaner Command and Control Causes Concern, Cisco Talos blog, September 2017: blog.talosintelligence.com/2017/09/ccleaner-c2-concern.html.
Security weak spot: the supply chain
The Nyetya campaign was also a supply chain attack, one of
many that Cisco threat researchers observed in 2017. One
reason Nyetya was successful at infecting so many machines
so quickly is that users did not see an automated software
update as a security risk, or in some cases even realize that
they were receiving the malicious updates.
Another supply chain attack, which occurred in September
2017, involved the download servers used by a software
vendor to distribute a legitimate software package known
as CCleaner.7
CCleaner’s binaries, which contained a Trojan
backdoor, were signed using a valid certificate, giving users
false confidence that the software they were using was
secure. The actors behind this campaign were targeting major
technology companies where the software was in use, either
legitimately or as part of shadow IT.
Supply chain attacks appear to be increasing in velocity and
complexity. They can impact computers on a massive scale,
and can persist for months or even years. Defenders should
be aware of the potential risk of using software or hardware
from organizations that do not have a responsible security
posture. Look for vendors that issue CVEs, are quick to
address vulnerabilities, and consistently strive to ensure that
their build systems can’t be compromised. Also, users should
take time to scan new software before downloading it to verify
that it doesn’t contain malware.
Network segmentation of software that is not backed by a
comprehensive security practice can help contain damage
from supply chain attacks, preventing them from spreading
throughout an organization.
8 Cisco 2018 Annual Cybersecurity Report | The attack landscape
Why integrity in threat intelligence reporting matters
All organizations that share threat information to customers or
the public through any channel should employ guidelines that
help them ensure accuracy in their reporting. Even if all the
facts aren’t clear, organizations can still communicate what
they know—and avoid guessing. Being right is better than
being first.
For example, when the WannaCry attack unfolded in
May 2017, there was initial confusion within the security
community about how the ransomware worm was infiltrating
systems. Multiple organizations in both the public and private
sector were reporting that the attack stemmed from a
phishing campaign and malicious email attachment. But the
network-based threat was, in fact, scanning for and infecting
vulnerable, public-facing Microsoft Windows Server Message
Block (SMB) Server ports.
Cisco threat researchers quickly alerted the security
community that the emails they thought were connected to
the WannaCry campaign were likely spam emails from the
Necurs bot that were spreading “Jaff” ransomware. It was
several days before the security community was in agreement
that the suspicious emails contained Jaff—not WannaCry. And
during that time, users were acting on information that could
not help them to avoid the fast-moving WannaCry campaign.
The chaos following the advent of the WannaCry campaign
serves as a reminder that the security community must avoid
communicating inaccurate facts about the origin and nature
of cyber attacks. In the early hours of a campaign, the sense
of urgency to quickly stop adversaries and protect users can
easily result in the publishing—especially on social media—of
information that may create confusion and prevent users from
defending their systems.
For more on this topic, read the post On Conveying Doubt
on the Cisco Talos blog.

Recommended for you

Contending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security ModelContending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security Model

The document proposes a hybrid security model to combat malware threats across different types of IT systems. It analyzes positive and negative security models and their advantages and disadvantages. A hybrid model is proposed that uses a combination of whitelisting, blacklisting, firewalls, antivirus software and other tools depending on the system type. For example, corporate systems would use application whitelisting to only allow approved enterprise apps, while home systems rely more on antivirus and firewalls for flexibility. The goal is to provide effective security tailored to each system's environment and business needs.

irjet
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael MontecilloLuncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo

The document discusses the evolution of cybersecurity threats and the IBM X-Force mission to monitor threats, research new attacks and develop protections, and educate customers. It outlines how threats have become more sophisticated, organized, and challenging over time as cybercrime has become organized. It also summarizes IBM's security capabilities and coverage across networks, endpoints, vulnerabilities, malware, and more.

ntxissastemissa
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015

The document discusses four key cybercrime trends observed by IBM's Emergency Response Services team in 2015: 1) an increase in "onion-layered" security incidents involving both unsophisticated and advanced attackers; 2) a rise in ransomware attacks that encrypt files and demand ransom; 3) growing threats from insider attacks; and 4) cybersecurity becoming a higher priority issue for management. It provides details on each trend and recommendations for organizations to improve security practices such as patching systems, increasing network visibility, training users, and having proper backup and response plans in place.

#ibm #cybersecurity #xforce #threats #technology
9 Cisco 2018 Annual Cybersecurity Report | The attack landscape
ENCRYPTED MALICIOUS WEB TRAFFIC
The expanding volume of encrypted web traffic—both legitimate and malicious—creates even more challenges and
confusion for defenders trying to identify and monitor potential threats. Encryption is meant to enhance security,
but it also provides malicious actors with a powerful tool to conceal command-and-control (C2) activity, affording
them more time to operate and inflict damage. Cisco threat researchers expect to see adversaries increase their use
of encryption in 2018. To keep pace, defenders will need to incorporate more automation and advanced tools like
machine learning and artificial intelligence to complement threat prevention, detection, and remediation.
A dark spot for defenders: encrypted malicious web traffic
Cisco threat researchers report that 50 percent of global web
traffic was encrypted as of October 2017. That is a 12-point
increase in volume from November 2016 (see Figure 1). One
factor driving that increase is the availability of low-cost or
free SSL certificates. Another is Google Chrome’s stepped-
up practice of flagging unencrypted websites that handle
sensitive information, like customers’ credit card information,
as “non-secure.” Businesses are motivated to comply with
Google’s HTTPS encryption requirement unless they want
to risk a potentially significant drop in their Google search
page rankings.
As the volume of encrypted global web traffic grows,
adversaries appear to be widening their embrace of
encryption as a tool for concealing their C2 activity. Cisco
threat researchers observed a more than threefold increase
in encrypted network communication used by inspected
malware samples over a 12-month period (see Figure 2). Our
analysis of more than 400,000 malicious binaries found that
about 70 percent had used at least some encryption as of
October 2017.
Figure 1 Increase in volume of encrypted global web traffic
HTTPS
38%
50%
12-Point Increase in Global Web Traffic from
November 2016-October 2017
Figure 1 Increase in volume of encrypted global
web traffic, November 2016-October 2017
Source: Cisco Security Research
Figure 2 Increase in volume of malicious binaries leveraging
some encrypted network communication
0
10
20
30
40
50
60
70
80
Nov
Dec
Jan
Feb
Mar
Apr
May
Jun
Jul
Oct
Aug
Sep
Figure 2 Increase in volume of malicious binaries
leveraging some encrypted network communication
2016 2017
Source: Cisco Security Research
PercentofSamplesUsingEncryption
Download the 2018 graphics at: cisco.com/go/acr2018graphics
10 Cisco 2018 Annual Cybersecurity Report | The attack landscape
Applying machine learning to the threat spectrum
To overcome the lack of visibility that encryption creates,
and reduce adversaries’ time to operate, we see more
enterprises exploring the use of machine learning and artificial
intelligence. These advanced capabilities can enhance
network security defenses and, over time, “learn” how to
automatically detect unusual patterns in web traffic that might
indicate malicious activity.
Machine learning is useful for automatically detecting
“known-known” threats—the types of infections that have
been seen before (see Figure 3). But its real value, especially
in monitoring encrypted web traffic, stems from its ability
to detect “known-unknown” threats (previously unseen
variations of known threats, malware subfamilies, or related
new threats) and “unknown-unknown” (net-new malware)
threats. The technology can learn to identify unusual patterns
in large volumes of encrypted web traffic and automatically
alert security teams to the need for further investigation.
That latter point is especially important, given that the lack
of trained personnel is an obstacle to enhancing security
defenses in many organizations, as seen in findings from
the Cisco 2018 Security Capabilities Benchmark Study
(see page 35). Automation and intelligent tools like machine
learning and artificial intelligence can help defenders
overcome skills and resource gaps, making them more
effective at identifying and responding to both known and
emerging threats.
Figure 3 Machine learning in network security: taxonomy
Figure 3 Machine Learning in Network Security: Taxonomy
WhatItDoesExamplesTechniqueProperties
Technique Trade-Off
Threat Type vs. Suitable Detection Technique
Detect the exactly known
infection, as seen before
Detect zero-days, unrelated
to any known malware
Known-Known
Detect previously unseen variations of known
threats, subfamilies or related new threats
Known-Unknown Unknown-Unknown
Static
Signatures
Dynamic
Signatures
Behavioral
Signatures
High-Level
Patterns
Unsupervised
Anomalies
Source: Cisco Security Research
Very high precision Very high precision High precision Good precision Low precision
No generalization
Recall limited to the exact same
cases
Generalization limited
Recall limited to predefined
pattern; finds variations explicitly
covered by the pattern
Generalization based on
similarity to known malware
Ideal for finding previously unseen
variations/subfamilies of known
infections
Generalization based on
common suspicious behaviors
High recall, good chance to find
true zero-days, at the cost of
more false alarms
Generalization based on
unusual behaviors
Best chance to find true zero-days;
highest risk of false alarms
Manual definition, possibly
tooling-assisted
Exact matching of predefined
character or numeric
sequences
Definitions human-readable
Manual definition, possibly
tooling-assisted
Matching of predefined rules (for
example, regex)
Definitions human-readable
Applicable through supervised
machine-learning
Matching of machine-learned
rules or recognition of machine-
learned behavioral patterns in
transformed feature space
Task for semi-supervised
machine learning
Very high-level patterns,
machine-learned to distinguish
generic behavior
Unsupervised machine learning
Cases significantly distant to all
known normal behavior, where the
model of known behavior is
machine-learned
Distance measures can be
highly abstract
Concrete malicious domain name
associated to trojan
Houdini RAT telemetry pattern Two illustrative found
instances
Generic characteristics of
suspicious traffic
Expected vs. unexplained
and unexpected
Good explainability Good explainability Good explainability but
more complex
Explainability limited
Findings may be difficult to
attribute to known infections
Explainability difficult
Findings may be difficult to
attribute to known infections
Does not scale Does not scale well Scales somewhat well Scales well Scales well
Requires manual definition Requires manual definition Learned (semi)auto from data Learned (semi)auto from data Learned auto from data
Not applicable to encrypted data
without MiTM
Not applicable to encrypted data
without MiTM
Applicable to encrypted data
without decryption
Applicable to encrypted data
without decryption
Applicable to encrypted data
without decryption
Better Precision and Explainability, Simplicity of Proof Better Recall, Scalability, Applicability to Encrypted Data, Ability to Detect Zero-Days
Please note: scaling statements refer to human time required to maintain detection system
Please note: this diagram represents a simplified illustration of machine learning capabilities in security
Download the 2018 graphics at: cisco.com/go/acr2018graphics
11 Cisco 2018 Annual Cybersecurity Report | The attack landscape
Cisco 2018 Security Capabilities Benchmark Study: Defenders report greater reliance
on automation and artificial intelligence
Chief information security officers (CISOs) interviewed for the
Cisco 2018 Security Capabilities Benchmark Study report that
they are eager to add tools that use artificial intelligence and
machine learning, and believe their security infrastructure is
growing in sophistication and intelligence. However, they are
also frustrated by the number of false positives such systems
generate, since false positives increase the security team’s
workload. These concerns should ease over time as machine
learning and artificial intelligence technologies mature and
learn what is “normal” activity in the network environments
they are monitoring.
When asked which automated technologies their organizations
rely on the most, 39 percent of security professionals said
they are completely reliant on automation, while 34 percent
are completely reliant on machine learning; 32 percent said
they are completely reliant on artificial intelligence (Figure 4).
Behavior analytics tools are also considered useful when
locating malicious actors in networks; 92 percent of security
professionals said these tools work very to extremely well
(Figure 5).
Figure 4 Organizations rely heavily on automation, machine learning, and artificial intelligence
Source: Cisco 2018 Security Capabilities Benchmark Study
Automation
Machine Learning
Artificial Intelligence
Not at All
Reliant
Completely
Reliant
44% 39% 83%
%Top
2-Box
77%
73%
43%
41% 32%
34%
14%
18%
18%3%
2% 4%
2%1%
6%
Figure 4 Organizations rely heavily on automation, machine learning, and artificial intelligence
User and Entity Behavior
48% 44%
7%
1%
Not at
All Well
Slightly
Well
Somewhat
Well
Very Well Extremely Well
(n=3617)
92%
38-39%
Very to
Extremely Well
2/3 of Healthcare Organizations Believe That Behavioral
Analytics/Forensics Help Identify Malicious Actors
Fewer in Transportation and Government Agree That
Behavioral Analytics/Forensics Work Extremely Well
Extremely Well
69%
(n=358)
(Transportation: n=175; Government: n=639)
Extremely Well
Figure 5 Most security professionals see value in behavioral analytics tools
Source: Cisco 2018 Security Capabilities Benchmark Study
Figure 5 Most security professionals see value in behavioral analytics tools
Download the 2018 graphics at: cisco.com/go/acr2018graphics
12 Cisco 2018 Annual Cybersecurity Report | The attack landscape
Figure 6 Malware-based block activity by content type, April 2016 – October 2017
Apr
May
Jun
Jul
Aug
Sep
Oct
Dec
Nov
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
0
10
20
30
40
50
60
70
80
90
100
Percentage
All Other File TypesExecutableHTML Plain Text
2016 2017
Figure 6 Malware-based block activity by content type, April 2016-October 2017
Source: Cisco Security Research
Web attack methods show adversaries’ intense focus on browser compromise
An analysis of web attack methods over an 18-month period
from April 2016 to October 2017 shows an increase in
adversaries’ use of malicious web content (Figure 6). That
trend aligns with the aggressive targeting of the Microsoft
Internet Explorer web browser by still-active exploit kits.
Cisco threat researchers observed that the number of
detections of malicious JavaScript web content was significant
and consistent during this period. That underscores the
effectiveness of this strategy for infecting vulnerable browsers
to facilitate other nefarious activity such as browser redirection
or Trojan downloads.

Recommended for you

DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISKDATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK

Data breaches pose an existential risk to organizations as cyber criminals carefully plan attacks to infiltrate networks and steal data. A recent ransomware attack encrypted over two terabytes of a victim's data after exploiting outdated systems, demonstrating the importance of preparing for attacks. While the victim initially paid ransoms without notifying authorities, which only increased demands, bringing in experts allowed identifying the attack and implementing preventative measures. All organizations must proactively address cybersecurity and incident response plans to mitigate risks and prevent catastrophic data loss from attacks.

M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat

1. Attackers are increasingly using passive backdoors like port listeners and web shells to evade detection. These backdoors do not actively initiate connections but wait silently for the attacker to connect, making them harder to detect through network traffic analysis and forensics. 2. Mandiant has observed attackers deploying these passive backdoors not just in the initial compromise but later on compromised internal systems for continued access even if other command and control mechanisms are removed. 3. The use of passive backdoors shows that targeted attackers are evolving their methodologies to ensure ongoing access to environments and circumvent detection mechanisms.

mtrendsincident responsecyber security
Computer Security Incident Handling Guide
Computer Security Incident Handling GuideComputer Security Incident Handling Guide
Computer Security Incident Handling Guide

This document provides guidelines for establishing effective computer security incident response capabilities. It assists organizations in creating incident response teams and processes for efficiently handling incidents. The guidelines can be applied independently of specific hardware, software, protocols or applications. The document recommends establishing planning, preparation, detection and analysis, containment, eradication and recovery as key phases in the incident response process.

computer security
13 Cisco 2018 Annual Cybersecurity Report | The attack landscape
Figure 7 is an overview of web attack methods over a three-
year period, from October 2014 to October 2017. Adversaries
consistently employed suspicious binaries during this period,
primarily to deliver adware and spyware. As discussed in the
Cisco 2017 Midyear Cybersecurity Report, these types of
potentially unwanted applications (PUAs) can present security
8	 Cisco 2017 Midyear Cybersecurity Report: cisco.com/c/m/en_au/products/security/offers/cybersecurity-reports.html.
risks, such as increased malware infections and theft of user
or company information.8
The three-year view in Figure 7 also shows that the volume
of malicious web content fluctuates over time as attackers
launch and end campaigns and change their tactics to
evade detection.Apr
Jul
Oct
Oct
Apr
Jul
Oct
Jan
Apr
Jul
Jan
Jan
2014 2015 2016 2017
Oct
0
10
20
30
40
50
60
70
80
90
100
Percentage
All Other File TypesBinary APKJavaScript HTML
Figure 7 Malware-based block activity by content type, 2014–2017
Source: Cisco Security Research
Figure 7 Malware-based block activity by content type, October 2014 – October 2017
Download the 2018 graphics at: cisco.com/go/acr2018graphics
14 Cisco 2018 Annual Cybersecurity Report | The attack landscape
EMAIL THREATS
No matter how much the threat landscape changes, malicious email and spam remain vital tools for adversaries to
distribute malware because they take threats straight to the endpoint. By applying the right mix of social engineering
techniques, such as phishing and malicious links and attachments, adversaries need only to sit back and wait for
unsuspecting users to activate their exploits.
Fluctuations in spam botnet activity impact overall volume
9	 See "Decline in exploit kit activity likely influencing global spam trends," p. 18, Cisco 2017 Midyear Cybersecurity Report:
cisco.com/c/m/en_au/products/security/offers/cybersecurity-reports.html.
In late 2016, Cisco threat researchers observed a noticeable
increase in spam campaign activity that appeared to coincide
with a decline in exploit kit activity. When leading exploit
kits like Angler abruptly disappeared from the market, many
users of those kits turned—or returned—to the email vector
to maintain profitability.9
However, after that initial rush back
to email, global spam volume declined and leveled during
most of the first half of 2017. Then, in late May and early June
2017, global spam volume dipped before spiking considerably
during mid- to late summer (see Figure 8).
Figure 8 IP reputation blocks by country, December 2016 – October 2017
US CN VN IN FR All Other Countries
0
1
2
3
4
5
Dec
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Percentage
Figure 8 IP reputation blocks by country, December 2016–September 2017
Source: Cisco Security Research
2016 2017
15 Cisco 2018 Annual Cybersecurity Report | The attack landscape
0
2
4
6
8
10
12
14
16
18
20
22
24
Reports Sent Spam Submitted
2016 2017
Dec
Nov
Oct
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Figure 9 Spam botnet activity, October 2016–October 2017
Source: Cisco SpamCop
Volume
Figure 9 Spam botnet activity, October 2016 – October 2017
The reduced spam volume from January through April 2017
coincides with a lull in spam botnet activity, as an internal
graph generated by the Cisco® SpamCop service shows
(Figure 9).
Cisco threat researchers report that the Necurs botnet, a
major contributor to overall spam volume globally, was active
but distributing less spam during the January to April time
frame. In May, the botnet was spreading Jaff ransomware
through massive spam campaigns. The campaigns featured
10	Jaff Ransomware: Player 2 Has Entered the Game, by Nick Biasini, Edmund Brumaghin, and Warren Mercer, with contributions from
Colin Grady, Cisco Talos blog, May 2017: blog.talosintelligence.com/2017/05/jaff-ransomware.html.
11	Player 1 Limps Back Into the Ring—Hello Again, Locky! by Alex Chiu, Warren Mercer, and Jaeson Schultz, with contributions from Sean Baird
and Matthew Molyett, Cisco Talos blog, June 2017: blog.talosintelligence.com/2017/06/necurs-locky-campaign.html.
a PDF file with an embedded malicious Microsoft Office
document, and the initial downloader for the Jaff ransomware.10
Security researchers discovered a vulnerability in Jaff that
allowed them to create a decryptor that forced Necurs’
operators to make a quick return to distributing its usual
threat, Locky ransomware.11
The time that the actors behind
Necurs needed to pivot back to Locky coincides with the
significant dip in global spam volume observed during the first
two weeks of June (Figure 9).
Download the 2018 graphics at: cisco.com/go/acr2018graphics
16 Cisco 2018 Annual Cybersecurity Report | The attack landscape
Malicious file extensions in email: common malware families’ top 10 tools
Cisco threat researchers analyzed email telemetry from
January through September 2017 to identify the types of
malicious file extensions in email documents that common
malware families employed most often. The analysis yielded
a top 10 list that shows the most prevalent group of malicious
file extensions (38 percent) was Microsoft Office formats such
as Word, PowerPoint, and Excel (see Figure 10).
Archive files, such as .zip and .jar, accounted for about 37
percent of all the malicious file extensions observed in our
study. That adversaries heavily employ archive files is not
surprising, as they have long been favored hiding places
for malware. Users must open archive files to see the
contents—an important step in the infection chain for many
threats. Malicious archive files also often find success in
foiling automated analysis tools, especially when they contain
threats that require user interaction for activation. Adversaries
will also use obscure file types, such as .7z and .rar, to
evade detection.
Malicious PDF file extensions rounded out the top three in
our analysis, accounting for nearly 14 percent of malicious
file extensions observed. (Note: The category of “Other
Extensions” applies to extensions observed in our study that
could not be mapped easily to known file types. Some malware
types are known to use random file extensions.)
Figure 10 Top 10 malicious file extensions,
January – September 2017Figure 10 Top 10 malicious file extensions, 2017
Source: Cisco Security Research
37%
1%
14%
38%
0%
0%
4%
0%
0%
6%
Archive
XML/
HTML/JS
PDF
Office
Apple
Android
Binaries
Scripts
Image
Other Ext.

Recommended for you

Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011

I'm not the owner of the copy rights All rights reserved: INSA Published on : http://blogsetie.blogspot.com

reporthackercyber intelligence
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence

Recently, NTT published the Global Threat Intelligence Report 2016 (GTIR). This year’s report focused both on the changes in threat trends and on how security organizations around the world can use the kill chain to help defend the enterprise. Turning threat intelligence data from multiple sources into actionable, contextual information is a challenge faced by many organizations today. The Global Threat Intelligence Platform provides increased efficiency, reduces risks and focuses on global coverage with accurate and up-to-date threat intelligence. This presentation was given at Carnegie Mellon University by Kenji Takahashi, VP of Product Management, Security at NTT Innovation Institute.

big dataanalyticsinformation technology
Panda Adaptive Defense - The evolution of malware
Panda Adaptive Defense - The evolution of malwarePanda Adaptive Defense - The evolution of malware
Panda Adaptive Defense - The evolution of malware

We analyze the evolution of malware and the next generation of Enpoint Protection agaings targeted attacks: Adaptive Defense. More info: http://www.pandasecurity.com/enterprise/solutions/advanced-threat-protection/

business securitymalwarepanda security
17 Cisco 2018 Annual Cybersecurity Report | The attack landscape
Figures 11a-c provide an overview of the malware families
included in our investigation that were associated with the top
three malicious file extension types: MS Office files, archives,
and PDFs. Figure 12 shows the percentage of detections,
by family, that included a malicious payload file extension.
The spikes in activity align with spam campaigns observed
during those months, according to Cisco threat researchers.
For example, in late summer, there were major campaigns
underway distributing Nemucod and Locky—two threats that
often work together. Nemucod is known to send malicious
payloads in archive files like .zip that contain malicious script
but look like normal .doc files. (“Dwnldr,” also seen in Figure
12, is a likely variant of Nemucod.)
PDF
A, Dldr,
Docdl
Donoff, Fraud,
Lg, Malphish,
MSWord NemucodOther
PDF
Pdfphish,Pdfuri
Urlmal,
Figure 11b Top 3 malicious file extensions
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
2017
0
100
80
60
40
20
Percentage
Source: Cisco Security Research
Adnel, Dde, Dldr,
Doc
Docdl
Donoff
Locky
Mdropper
Ms,
Other
Rtf,Valyria,Vba, Word
Figure 11a Top 3 malicious file extensions
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
2017
0
100
80
60
40
20
Percentage
Source: Cisco Security Research
Office
Figure 12 Patterns of top malware families,
January - October 2017
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
0
20
40
60
80
100
All Other Malware FamiliesLocky Dwnldr DldrNemucod
Figure 12 Patterns of malware families
Source: Cisco Security Research
PercentageofDetections
2017
Figure 11a Top three malicious file extension types and
malware family relationships
Figure 11b Top three malicious file extension types and
malware family relationships
Archive
Adwind, Autoit,
Dldr
Donoff,
Dwnldr
Fareit, Kryptik, Locky, Msil,
NemucodOther
Upatre
Vbkrypt
Vbscrdlx
Figure 11c Top 3 malicious file extensions
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
2017
0
100
80
60
40
20
Percentage
Source: Cisco Security Research
Figure 11c Top three malicious file extension types and
malware family relationships
18 Cisco 2018 Annual Cybersecurity Report | The attack landscape
MyWebSearch spyware most active user of
“other extensions”
The “other extensions” group in our study includes several
well-known malware types. But MyWebSearch, a malicious
adware software and browser hijacker that poses as a helpful
toolbar, is the most active player (see Figure 13). It uses
.exe file extensions exclusively, sometimes only one type per
month. The potentially unwanted application (PUA) has been
around for years and infects different browser types. It is often
bundled with fraudulent software programs and can expose
users to malvertising.
Our analysis of malicious file extension types shows that even
in today’s sophisticated and complex threat environment, email
remains a vital channel for malware distribution. For enterprises,
baseline defense strategies include:
•• Implementing powerful and comprehensive email
security defenses.
•• Educating users about the threat of malicious attachments
and links in phishing emails and spam.
Figure 13 MyWebSearch most active user of
“other extensions”Figure 13 MyWebSearch most active user of
“other extensions"
MyWebSearch QjwmonkeyOther
Adwind, Cerber, Docdl, Donoff, Fareit,
Fraud, Imali, Kryptik, Masrung, PDF, ValyriaJan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
2017
0
100
80
60
40
20
Percentage
Source: Cisco Security Research
19 Cisco 2018 Annual Cybersecurity Report | The attack landscape
Social engineering still a critical launchpad for email attacks
12	Massive Phishing Attack Targets Gmail Users, by Alex Johnson, NBC News, May 2017:
nbcnews.com/tech/security/massive-phishing-attack-targets-millions-gmail-users-n754501.
13	Hackers target Irish energy networks amid fears of further cyber attacks on UK’s crucial infrastructure, by Lizzie Deardon, The Independent, July 2017:
independent.co.uk/news/world/europe/cyber-attacks-uk-hackers-target-irish-energy-network-russia-putin-electricity-supply-board-nuclear-a7843086.html.
Phishing and spear phishing are well-worn tactics for stealing
users’ credentials and other sensitive information, and that’s
because they are very effective. In fact, phishing and spear
phishing emails were at the root of some of the biggest,
headline-grabbing breaches in recent years. Two examples
from 2017 include a widespread attack that targeted Gmail
users12
and a hack of Irish energy systems.13
To gauge how prevalent phishing URLs and domains are on
today’s Internet, Cisco threat researchers examined data
from sources that investigate potentially “phishy” emails
submitted by users through community-based, anti-phishing
threat intelligence. Figure 14 shows the number of phishing
URLs and phishing domains observed during the period from
January to October 2017.
The spikes seen in March and June can be attributed to two
different campaigns. The first appeared to target users of a
major telecom services provider. That campaign:
•• Involved 59,651 URLs containing subdomains under
aaaainfomation[dot]org.
•• Had subdomains that contained random strings consisting
of 50-62 letters.
Each subdomain length (50-62) contained about 3500 URLs,
which allowed for programmatic use of the subdomains
(example: Cewekonuxykysowegulukozapojygepuqybyteqe
johofopefogu[dot]aaaainfomation[dot]org).
Adversaries used an inexpensive privacy service to register
the domains observed in this campaign.
Figure 14 Number of observed phishing URLs and domains by month
Domains URLs
Total Phishing URLs
Total Phishing Domains
0
5K
10K
20K
30K
60K
80K
120K
100K
Volume
2017
101,934
8445
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Figure 14 Number of observed phishing URLs and domains by month, 2017
Source: Cisco Security Research
20 Cisco 2018 Annual Cybersecurity Report | The attack landscape
Figure 15 TLD distribution across known phishing sites
.net, .br
Percent of All Sites with TLDs (All Data)
others
.net, .org, .br
.pl, .info, .in
.au, .es, .ru
others
.org
.top
.ru, .info, .au, .in
.es
Percent of Sites with TLDs
(Excluding Specific TLDs from Two
Campaigns Targeting Tax Agency and Telecom)
54%
25%
4%
2%
1%
21%
19%
5%
1%
2%
3%
.com
.com
43%
Figure 15 TLD distribution across known phishing sites
Source: Cisco Security Research
In the second campaign, which was most active in June,
threat actors used the name of a legitimate tax agency in the
United Kingdom to disguise their actions. They employed 12
top-level domains (TLDs). Eleven of the domains were URLs with
six random six-character strings (example: jyzwyp[dot]top). And
nine of the domains were associated with more than 1600
phishing sites each.
Like the March campaign, adversaries registered the domains
using a privacy service to conceal domain registration
information. They registered all the domains over a two-day
period. On the second day, nearly 19,000 URLs connected to
the campaign were observed, and all were discovered within
a five-hour window (for more on how quickly threat actors
put newly registered domains to use, see “Malicious use of
legitimate resources for backdoor C2,” on page 24).
TLD distribution across known phishing sites
Our analysis of phishing sites during the period from January
to August 2017 found that threat actors were employing 326
unique TLDs for these activities, including .com, .org, .top
(largely due to the United Kingdom taxing agency campaign),
and country-specific TLDs (see Figure 15). Employing lesser-
known TLDs can be advantageous for adversaries; these
domains are typically inexpensive and often offer inexpensive
privacy protection.

Recommended for you

Understanding the mirai botnet
Understanding the mirai botnetUnderstanding the mirai botnet
Understanding the mirai botnet

This document analyzes the Mirai botnet, which caused major DDoS attacks in late 2016. It summarizes the key events in Mirai's timeline from August 2016 to February 2017. The paper then provides an overview of Mirai's structure and propagation method, noting it spread through internet scanning and exploiting default passwords to infect IoT devices, especially cameras and DVRs. Finally, it outlines the paper's goals to conduct the first comprehensive longitudinal study of Mirai through multiple data sources in order to understand how it emerged and evolved over time and the challenges this poses for IoT security.

technologymiraisecurity
Cisco asr-2016-160121231711
Cisco asr-2016-160121231711Cisco asr-2016-160121231711
Cisco asr-2016-160121231711

Como cybercriminals cada vez mais ataques a sua estratégia de risco cibernético está sob o microscópio. Com o Cisco 2016 Annual Security Report, que analisa os avanços da indústria de segurança e dos criminosos, veja como seus empresas avaliam a preparação para a segurança em suas organizações e obtêm idéias sobre onde fortalecer suas defesas. Seja um profissional de Segurança da informação faça o curso de analista de Redes e segurança http://www.trainning.com.br/curso_mcse_ccna_ceh_itil_vmware/?v=Slide

hackersegurança da redesegurança de internet
Cisco 2016 Security Report
Cisco 2016 Security Report Cisco 2016 Security Report
Cisco 2016 Security Report

The document describes how Cisco collaborated with other security companies to identify and shut down a major Angler exploit kit operation that was targeting 90,000 victims per day and generating tens of millions of dollars annually through ransomware attacks. By working with the hosting provider Limestone Networks, Cisco was able to determine that most of the Angler traffic was coming from a small number of Limestone and Hetzner servers, and helped get those servers taken offline to cripple the ransomware campaign. The success highlights the importance of industry collaboration to combat sophisticated cybercriminal operations.

21 Cisco 2018 Annual Cybersecurity Report | The attack landscape
Defenders should be vigilant in monitoring this “old” threat
In 2017, tens of thousands of phishing attempts were
reported monthly to the community-based, anti-phishing
threat intelligence services included in our analysis. Some
of the common tactics and tools adversaries use to execute
phishing campaigns include:
•• Domain squatting: Domains named to look like valid
domains (example: cisc0[dot]com).
•• Domain shadowing: Subdomains added under a valid
domain without the owner’s knowledge (example:
badstuff[dot]cisco[dot]com).
•• Maliciously registered domains: A domain created to
serve malicious purposes (example: viqpbe[dot]top).
•• URL shorteners: A malicious URL disguised with a URL
shortener (example: bitly[dot]com/random-string).
Note: In the data we examined, Bitly.com was the
URL-shortening tool adversaries used most. Malicious
shortened URLs represented 2 percent of the phishing
sites in our study. That number peaked to 3.1 percent
in August.
•• Subdomain services: A site created under a subdomain
server (example: mybadpage[dot]000webhost[dot]com).
Threat actors in the phishing and spear phishing game are
continuously refining social engineering methods to trick
users into clicking malicious links or visiting fraudulent web
pages, and providing credentials or other types of high-
value information. User training and accountability, and the
application of email security technologies, remain crucial
strategies for combatting these threats.
22 Cisco 2018 Annual Cybersecurity Report | The attack landscape
SANDBOX EVASION TACTICS
Adversaries are becoming adept at developing threats that can evade increasingly sophisticated sandboxing
environments. When Cisco threat researchers analyzed malicious email attachments that were equipped with various
sandbox evasion techniques, they discovered that the number of malicious samples using a particular sandbox
evasion technique showed sharp peaks, and then quickly dropped. This is yet another example of how attackers are
swift to ramp up the volume of attempts to break through defenses once they find an effective technique.
Malware authors playing dirty tricks in defenders’ sandboxes
In September 2017, Cisco threat researchers noted high
volumes of samples where a malicious payload is delivered
after a document is closed (Figure 16). In this case, the
malware is triggered using the “document_close” event. The
technique works because, in many cases, documents are not
closed after the document has been opened and analyzed in
the sandbox. Because the sandbox doesn’t explicitly close the
document, the attachments are deemed safe by the sandbox,
and will be delivered to the intended recipients. When a
recipient opens the document attachment, and later closes
the document, the malicious payload is delivered. Sandboxes
that don’t properly detect actions on document close can be
evaded using this technique.
The use of the “document_close” event is a clever option
for attackers. It takes advantage of the macro functionality
built into Microsoft Office, as well as users’ tendency to
open attachments that they believe are relevant to them.
Once users realize the attachment is not relevant to them,
they close the document, triggering the macros in which the
malware is hidden.
Figure 16 High volume of malicious Microsoft Word documents using “close function calls” observed in September 2017
0
5K
10K
15K
20K
25K
30K
35K
40K
Malicious Samples Total Samples
2016 2017
Dec
Nov
Oct
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Figure 16 High volume of malicious Microsoft Word documents using “close function calls”
observed in September 2017
Source: Cisco Security Research
Volume
23 Cisco 2018 Annual Cybersecurity Report | The attack landscape
The spikes in malicious samples using different sandbox
evasion techniques point to malicious actors’ desire to follow
a method that seems to work for them—or for other attackers.
Also, if adversaries go to the trouble of creating malware
and associated infrastructure, they want a return on their
investments. If they determine that malware can slip through
sandbox testing, they will, in turn, increase the number of
attack attempts and affected users.
Cisco researchers recommend using sandboxing that includes
“content-aware” features to help ensure malware that uses
the tactics described above does not evade sandbox analysis.
For example, sandboxing technology should show awareness
of the metadata features of the samples it is analyzing—such
as determining whether the sample includes an action upon
closing of the document.
Some attackers evade sandboxing by disguising the type of
document in which the malicious payload exists. As seen in
Figure 17, we noted a significant attack in May 2017 that was
built around malicious Word documents embedded within PDF
documents. The documents might bypass sandboxes that
simply detect and open the PDF, instead of also opening and
analyzing the embedded Word document. The PDF document
typically contained an enticement for the user to click and
open the Word document, which would trigger the malicious
behavior. Sandboxes that don’t open and analyze embedded
documents within PDFs can be bypassed using this technique.
After viewing the spike in malicious samples involving these
PDFs, our threat researchers refined the sandbox environment
to detect whether PDFs contained actions or enticements to
open embedded Word documents.
Figure 17 Large attack in May 2017 involved PDFs with malicious embedded Word documents
Volume
2016 2017
Dec
Nov
Oct
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
10K
0
20K
30K
40K
50K
60K
70K
80K
90K
Malicious Samples Total Samples “document_open”
Figure 17 Attackers use PDFs with embedded Microsoft Word documents to evade sandboxing
Source: Cisco Security Research
24 Cisco 2018 Annual Cybersecurity Report | The attack landscape
ABUSE OF CLOUD SERVICES AND OTHER LEGITIMATE RESOURCES
As applications, data, and identities move to the cloud, security teams must manage the risk involved with losing
control of the traditional network perimeter. Attackers are taking advantage of the fact that security teams are having
difficulty defending evolving and expanding cloud and IoT environments. One reason is the lack of clarity around who
exactly is responsible for protecting those environments.
To meet this challenge, enterprises may need to apply a combination of best practices, advanced security
technologies like machine learning, and even some experimental methodologies, depending on the services they use
for their business and how threats in this space evolve.
Malicious use of legitimate resources for backdoor C2
14	Anomali defines a C2 schema as “the totality of IP addresses, domains, legitimate services, and all the remote systems that are part of the … communications architecture” of malware.
When threat actors use legitimate services for command
and control (C2), malware network traffic becomes nearly
impossible for security teams to identify because it mimics the
behavior of legitimate network traffic. Adversaries have a lot
of Internet “noise” to use as cover because so many people
today rely on services like Google Docs and Dropbox to do
their work, regardless of whether these services are offered
or systemically endorsed by their employers.
Figure 18 shows several of the well-known legitimate
services that researchers with Anomali, a Cisco partner and
threat intelligence provider, have observed being used in
malware backdoor C2 schemas14
in the last few years. (Note:
These types of services face a dilemma in combatting abuse,
as making it more difficult for users to set up accounts and
use their services can adversely affect their ability to
generate revenue.)
Figure 18 Examples of legitimate services abused by malware for C2
Figure 18 Examples of legitimate services abused by malware for C2
Source: Anomali
Google Docs
Google Code
Google Translate
Google Apps Script
Google Calendar
Google Plus
Gmail
Blogger
Live.com
Hotmail.com
Microsoft TechNet
Microsoft Answers
Microsoft Social
OneDrive
Yahoo Answers
Babelfish
Pastebin
Amazon
GitHub
Twitter
Dropbox

Recommended for you

Cisco Midyear Security Report 2016
Cisco Midyear Security Report 2016Cisco Midyear Security Report 2016
Cisco Midyear Security Report 2016

Ransomware has become the most profitable malware type due to its use of strong encryption that victims cannot easily decrypt. It is dominated by ransomware paid in bitcoin, which allows anonymous payments. Recent ransomware campaigns have targeted vulnerabilities in enterprise application software like JBoss to quietly encrypt networks. This threatens entire industries if left unpatched. While paying the ransom may decrypt files, there are risks of data loss, tampering or reinfection. Ransomware is expected to evolve further to propagate itself for even greater profitability. Organizations must back up critical data and prepare incident response plans.

ictransomwaresecurity
Cyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdfCyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdf

The attack surface is expanding rapidly due to growth in mobile devices, public cloud usage, and cloud infrastructure. This expansion provides more opportunities for adversaries to operate. Annual global IP traffic is projected to pass 1 zettabyte by the end of 2016 and reach 2.3 zettabytes by 2020, representing a threefold increase. Much of this growth is driven by wireless devices and mobile usage. As the Internet of Everything takes shape and digitization increases, defenders will have more to protect while adversaries have more space to conduct operations.

A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS  K. JeniferA STUDY ON CYBER SECURITY AND ITS RISKS  K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer

Cyber security is a basic term used nowadays by each and everyone in the world. It is appropriate to know about cyber security as everything became digitized in our day-today life, because digital world is the place where cyber crimes emerge. Securing the information has become one of the biggest challenges in the present day. Various measures are taken in order to prevent these cyber crimes, though cyber security is still a very big concern. In this paper I have made a study on cyber security, how far cyber crimes are increasing and what are the threats we should be aware of.

cyber security crime communication protection
25 Cisco 2018 Annual Cybersecurity Report | The attack landscape
According to Anomali’s research, advanced persistent
threat (APT) actors and state-sponsored groups were
among the first adversaries to use legitimate services for
C2; however, the technique is now embraced by a broader
range of sophisticated adversaries in the shadow economy.
Using legitimate services for C2 appeals to malicious actors
because it’s easy to:
•• Register new accounts on these services.
•• Set up a web page on the publicly accessible Internet.
•• Usurp encryption for C2 protocols. (Instead of setting up
C2 servers with encryption or building encryption into
malware, attackers can simply adopt the SSL certificate
of a legitimate service.)
•• Adapt and transform resources on the fly. (Attackers can
reuse implants across attacks without reusing DNS or IP
addresses, for instance.)
•• Reduce the likelihood of “burning” infrastructure.
(Adversaries that use legitimate services for C2 don’t
need to hard-code malware with IP addresses or
domains. When their operation is complete, they can
simply take down their legitimate services pages—and no
one will ever know the IP addresses.)
•• Attackers benefit from this technique because it allows
them to reduce overhead and improve their return
on investment.
For defenders, adversaries’ use of legitimate services for C2
presents some significant challenges:
Legitimate services are difficult to block
Can organizations, from a mere business perspective, even
consider blocking parts of legitimate Internet services like
Twitter or Google?
15	For details on these experimental methodologies, and more information about how adversaries use legitimate services for C2, download the Anomali research paper,
Rise of Legitimate Services for Backdoor Command and Control, available at: anomali.cdn.rackfoundry.net/files/anomali-labs-reports/legit-services.pdf.
Legitimate services are often encrypted and innately
difficult to inspect
SSL decrypting is expensive and not always possible at
enterprise scale. So, malware hides its communication inside
of encrypted traffic, making it difficult, if not impossible, for
security teams to identify malicious traffic.
Use of legitimate services subverts domain and certificate
intelligence, and complicates attribution
Adversaries don’t need to register domains because the
legitimate service account is considered the initial C2 address.
Also, they’re not likely to continue registering SSL certificates
or using self-signed SSL certificates for C2 schemas. Both
trends obviously will have a negative impact on indicator feeds
for reputation filtering and indicator blacklisting, which are
based on newly generated and newly registered domains and
the certificates and IP addresses connected to them.
Detecting the use of legitimate services for C2 is difficult.
However, Anomali’s threat researchers recommend that
defenders consider applying some experimental methodologies.
For example, defenders may identify malware using legitimate
services for C2 by looking for:
•• Non-browser, non-app connections to legitimate services
•• Unique or low page response sizes from
legitimate services
•• High certificate exchange frequencies to
legitimate services
•• Bulk sandboxing samples for suspicious DNS calls to
legitimate services
All these unique behaviors merit further investigation of the
source programs and processes.15
26 Cisco 2018 Annual Cybersecurity Report | The attack landscape
Extracting optimal value from resources
Cisco security researchers analyzed newly seen unique query
names (domains) associated with DNS queries made over a
seven-day period in August 2017. Note that “newly seen”
in this discussion has no bearing on when a domain was
created; it relates to when a domain was first “seen” by Cisco
cloud security technology during the period of observation.
The purpose of this research was to gain more insight into how
often adversaries use, and reuse, registered-level domains
(RLDs) in their attacks. Understanding threat actor behavior
at the domain level can help defenders identify malicious
domains, and related subdomains, that should be blocked with
first-line-of-defense tools like cloud security platforms.
So that our researchers could focus solely on the core group
of unique RLDs—about 4 million in total—subdomains were
stripped from the sample of newly seen domains. Only a small
percentage of the RLDs in that sample was categorized as
malicious. Of the RLDs that were malicious, more than half
(about 58 percent) were reused, as Figure 19 shows.
That finding suggests that, while most attackers build new
domains for their campaigns, many are focused on trying to
get the best return on their investments by launching multiple
campaigns from a single domain. Domain registration can
be costly, especially at the scale most attackers require to
execute their campaigns and evade detection.
One-fifth of malicious domains quickly put into use
Adversaries may sit on domains for days, months, or even
years after registering them, waiting for the right time to
use them. However, Cisco threat researchers observed that
a significant percentage of malicious domains—about 20
percent—were used in campaigns less than one week after
they were registered (see Figure 20).
Figure 19 Percent of new vs. reused domains
ReusedNew
42.4%
57.6%
Figure 19 Percentage of new vs. reused domains
Source: Cisco Security Research
Figure 20 RLD registration times
Registered More Than a Week from First Seen
Registered Less Than a Week from First Seen
19.5%
80.5%
Figure 20 RLD registration times
Source: Cisco Security Research
27 Cisco 2018 Annual Cybersecurity Report | The attack landscape
Many new domains tied to malvertising campaigns
Most malicious domains we analyzed were associated with
spam campaigns—about 60 percent. Nearly one-fifth of the
domains were connected to malvertising campaigns (see
Figure 21). Malvertising has become an essential tool for
directing users to exploit kits, including those that
distribute ransomware.
Well-worn, domain-related techniques for creating
malvertising campaigns include domain shadowing. In
this technique, attackers steal legitimate domain account
credentials to create subdomains directed at malicious
servers. Another tactic is the abuse of free, dynamic DNS
services to generate malicious domains and subdomains.
That allows threat actors to deliver malicious payloads from
constantly changing hosting IPs, either infected users’
computers or compromised public websites.
Domains reuse infrastructure resources
The malicious RLDs in our sample also appeared to reuse
infrastructure resources, such as registrant email addresses,
IP addresses, autonomous system numbers (ASNs), and
nameservers (see Figure 22). This is further evidence of
adversaries trying to get the most value from their investments
in new domains and preserve resources, according to our
researchers. For example, an IP address can be used by more
than one domain. So, an attacker laying the groundwork for a
campaign might decide to invest in a few IP addresses and an
array of domain names instead of servers, which cost more.
Figure 21 Malicious categorizations
Spam Malvertising Other
20.9%
19.6%
59.6%
Figure 21 Malicious categorizations
Source: Cisco Security Research
Figure 22 Reuse of infrastructure by malicious RLDs
Used Multiple Times Used Once
43.0%
57.0%
W W WW W W
8.7%
32.2%
67.8%
IP Reuse
Registrant Reuse
ASN Reuse
Nameserver
Reuse
10.6%
91.3%
89.4%
Figure 22 Reuse of infrastructure by
malicious RLDs
Source: Cisco Security Research
28 Cisco 2018 Annual Cybersecurity Report | The attack landscape
The resources that RLDs reuse give clues to whether the
domain is likely to be malicious. For example, reuse of
registrant emails or IP addresses occurs infrequently, so a
pattern of reuse on either front suggests suspicious behavior.
Defenders can have a high degree of confidence in blocking
those domains, knowing that doing so probably will have no
negative impact on business activity.
Static blocking of ASNs and nameservers is not likely to be
feasible in most cases. However, patterns of reuse by RLDs
are worthy of further investigation to determine whether
certain domains should be blocked.
Using intelligent, first-line-of-defense cloud security tools
to identify and analyze potentially malicious domains and
subdomains can help security teams follow the trail of an
attacker and answer questions, such as:
•• What IP address does the domain resolve to?
•• What ASN is associated with that IP address?
•• Who registered the domain?
•• What other domains are associated with that domain?
The answers can help defenders not only refine security
policies and block attacks, but also prevent users from
connecting to malicious destinations on the Internet while
they’re on the enterprise network.
DevOps technologies at risk for ransomware attacks
16	After MongoDB, Ransomware Groups Hit Exposed Elasticsearch Clusters, by Lucian Constantin, IDG News Service, January 13, 2017:
pcworld.com/article/3157417/security/after-mongodb-ransomware-groups-hit-exposed-elasticsearch-clusters.html.
2017 saw the emergence of DevOps ransomware attacks,
beginning with a campaign in January that targeted open-
source database platform, MongoDB.16
Attackers encrypted
public MongoDB instances and demanded ransom payments
for decryption keys and software. Soon after, they set their
sights on compromising databases, such as CouchDB and
Elasticsearch, with server-targeted ransomware.
Rapid7 is a Cisco partner and provider of security data and
analytics solutions. As Rapid7 researchers explained in our
Cisco 2017 Midyear Cybersecurity Report, DevOps services
are often deployed improperly, or left open intentionally for
convenient access by legitimate users—leaving these services
open for attack.
Rapid7 performs regular Internet sweeps for DevOps
technologies and catalogs both open instances and ransomed
instances. Some of the DevOps services they encounter during
their sweeps may contain personally identifiable information
(PII), based on the names of the tables exposed to the Internet.
To reduce their risk of exposure to DevOps ransomware
attacks, organizations that use public Internet instances of
DevOps technologies should:
•• Develop solid standards for secure deployment of
DevOps technologies
•• Maintain active awareness of public infrastructure used by
the company
•• Keep DevOps technologies up to date and patched
•• Conduct vulnerability scans
For more details on Rapid7’s research, see “Don’t let
DevOps technologies leave the business exposed,” in the
Cisco 2017 Midyear Cybersecurity Report.

Recommended for you

Cisco 2017 Midyear Cybersecurity Report
Cisco 2017 Midyear Cybersecurity ReportCisco 2017 Midyear Cybersecurity Report
Cisco 2017 Midyear Cybersecurity Report

Cisco 2017 Midyear Cybersecurity Report Executive Summary Executive Summary For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency. In these reports, we strive to alert defenders to the increasing sophistication of threats and the techniques that adversaries use to compromise users, steal information, and create disruption. Go to www.esgjrconsultinginc.com to learn more about Software/Network Engineering Solutions.

cyber securitycyberthreat cyber securitysoftware
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork

The document provides a guide for improving cybersecurity in the manufacturing industry. It begins by noting that nearly half of all manufacturers have experienced a cyberattack. An effective defensive strategy includes 1) creating continuity and recoverability through reliable backups and disaster recovery plans, 2) protecting critical data through inventory, access control, and encryption, 3) improving system and network security hygiene such as network segmentation and patching outdated systems, 4) not overlooking security for industrial control systems and IoT devices, and 5) improving communication about cyber threats. Insider threats are also a risk that can be mitigated using security information and event management systems to monitor employee activity.

cybersecurity
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview

The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development. The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers: State of global ICS asset and network exposure Sectoral targets and attacks as well as the cost of ransom Global APT activity, AI usage, actor and tactic profiles, and implications Rise in volumes of AI-powered cyberattacks Major cyber events in 2024 Malware and malicious payload trends Cyberattack types and targets Vulnerability exploit attempts on CVEs Attacks on counties – USA Expansion of bot farms – how, where, and why In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East Why are attacks on smart factories rising? Cyber risk predictions Axis of attacks – Europe Systemic attacks in the Middle East Download the full report from here: https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/

ics threat reportot threat landscapecybersecurity report 2024
29 Cisco 2018 Annual Cybersecurity Report | The attack landscape
Insider threats: Taking advantage of the cloud
17	Cisco 2017 Midyear Cybersecurity Report: cisco.com/c/m/en_au/products/security/offers/cybersecurity-reports.html.
In previous security reports, we have discussed the value
of OAuth permissions and super-user privileges to enforce
who can enter networks, and how they can access data.17
To further examine the impact of user activity on security,
Cisco threat researchers recently examined data exfiltration
trends. They employed a machine-learning algorithm to
profile 150,000 users in 34 countries, all using cloud service
providers, from January to June 2017. The algorithm
accounted for not only the volume of documents being
downloaded, but also variables such as the time of day of
downloads, IP addresses, and locations.
After profiling users for six months, our researchers spent 1.5
months studying abnormalities. flagging 0.5 percent of users
for suspicious downloads. That’s a small amount, but these
users downloaded, in total, more than 3.9 million documents
from corporate cloud systems, or an average of 5200
documents per user during the 1.5-month period. Of the
suspicious downloads, 62 percent occurred outside of normal
work hours; 40 percent took place on weekends.
Cisco researchers also conducted a text-mining analysis on the
titles of the 3.9 million suspiciously downloaded documents.
One of the most popular keywords in the documents’ titles
was “data.” The keywords most commonly appearing with the
word “data” were “employee” and “customer.” Of the types
of documents downloaded, 34 percent were PDFs and 31
percent were Microsoft Office documents (see Figure 23).
Applying machine-learning algorithms offers a more
nuanced view of cloud user activity beyond just the number
of downloads. In our analysis, 23 percent of the users we
studied were flagged more than three times for suspicious
downloads, usually starting with small numbers of documents.
The volume slowly increased each time, and eventually, these
users showed sudden and significant spikes in downloads
(Figure 24).
Machine-learning algorithms hold the promise of providing
greater visibility into the cloud and user behavior. If defenders
can start predicting user behavior in terms of downloads,
they can save the time it might take to investigate legitimate
behavior. They can also step in to stop a potential attack or
data-exfiltration incident before it happens.
Figure 24 Machine-learning algorithms capture suspicious
user download behavior
0
1K
2K
3K
4K
5K
6K
7K
8K
May June
Figure 24 Machine-learning algorithms capture
user download behavior 2017
Suspicious ActivityUser Activity
NumberofFilesDownloaded
Source: Cisco Security Research
Figure 23 Most commonly downloaded documents
31%
Office
23%
Media
4%
Programming,
Data, and
Scripts (PD&S)
8%
Others
34%
PDFs
Figure 23 Most commonly downloaded documents
Source: Cisco Security Research
30 Cisco 2018 Annual Cybersecurity Report | The attack landscape
Cisco 2018 Security Capabilities Benchmark Study: Security viewed as a
key benefit of hosting networks in the cloud
The use of on-premises and public cloud infrastructure is
growing, according to the Cisco 2018 Security Capabilities
Benchmark Study, although many organizations still host
networks on-premises. In the 2017 study, 27 percent of
security professionals said they are using off-premises private
clouds, compared with 25 percent in 2016 and 20 percent in
2015 (Figure 25). Fifty-two percent said their networks are
hosted on-premises as part of a private cloud.
Of those organizations using the cloud, 36 percent host
25 to 49 percent of their infrastructure in the cloud, while 35
percent host 50 to 74 percent of their infrastructure in the
cloud (Figure 26).
Security is the most common benefit of hosting networks in the
cloud, according to the security personnel respondents. Among
them, 57 percent said they host networks in the cloud because
of better data security; 48 percent, because of scalability; and
46 percent, because of ease of use (see Figure 27).
Respondents also said that, as more infrastructure is moved
to the cloud, they may look to invest in cloud access security
brokers (CASBs) to add extra security to cloud environments.
Figure 25 More organizations are using private clouds
2014 (n=1727), 2015 (n=2417), 2016 (n=2887), 2017 (n=3625)
50%
Off-Premises Private Cloud
On-Premises as
Part of a Private Cloud
52%
50%
51%
18%
27%
25%
20%
2017
2016
2015
2014
Figure 25 More organizations are using private
clouds
Source: Cisco 2018 Security Capabilities Benchmark Study
Figure 26 53% of organizations host at least
50% of infrastructure in the cloud
Percent of Infrastructure Hosted in the Cloud
Source: Cisco 2018 Security Capabilities Benchmark Study
35% 36%
11%18%
1-24% 25-49% 50-74% More Than 75%
Figure 26 Fifty-three percent of organizations host at least
half of infrastructure in the cloud
Figure 27 Fifty-seven percent believe the cloud
offers better data security
Source: Cisco 2018 Security Capabilities Benchmark Study
Cloud Offers Better
Data Security
Scalability
Ease of Use
Ease of Collaboration
with External Parties
Regulation or Compliance
Requirements
Not Core to Business, so
Outsourcing Is Preferable
Operational Expenditures
Preferred Over Capital
Lack of Internal
IT Workforce
57%
48%
46%
41%
39%
39%
37%
14%
Figure 27 57% believe the cloud offers
better data security
Download the 2018 graphics at: cisco.com/go/acr2018graphics
31 Cisco 2018 Annual Cybersecurity Report | The attack landscape
IoT AND DDoS ATTACKS
The IoT is still evolving, but adversaries are already exploiting security weaknesses in IoT devices to gain access to
systems—including industrial control systems that support critical infrastructure. IoT botnets are also growing in both
size and power, and are increasingly capable of unleashing powerful attacks that could severely disrupt the Internet.
Attackers’ shift toward greater exploitation of the application layer indicates that this is their aim. But many security
professionals aren’t aware of, or they dismiss, the threat that IoT botnets pose. Organizations keep adding IoT devices
to their IT environments with little or no thought about security, or worse, take no time to assess how many IoT
devices are touching their networks. In these ways, they’re making it easy for adversaries to take command of the IoT.
Few organizations see IoT botnets as an imminent threat—but they should
18	For more details on Radware’s IoT botnet research, see “The IoT is only just emerging but the IoT botnets are already here,” p. 39,
Cisco 2017 Midyear Cybersecurity Report: cisco.com/c/m/en_au/products/security/offers/cybersecurity-reports.html.
As the IoT expands and evolves, so too are IoT botnets. And
as these botnets grow and mature, attackers are using them
to launch DDoS attacks of increasing scope and intensity.
Radware, a Cisco partner, offered an analysis of three of
the largest IoT botnets—Mirai, Brickerbot, and Hajime—in the
Cisco 2017 Midyear Cybersecurity Report, and revisits the
IoT botnet topic in our latest report to underscore the severity
of this threat.18
Their research shows that only 13 percent of
organizations believe that IoT botnets will be a major threat to
their business in 2018.
IoT botnets are thriving because organizations and users are
deploying low-cost IoT devices rapidly and with little or no
regard for security. IoT devices are Linux- and Unix-based
systems, so they are often targets of executable and linkable
format (ELF) binaries. They are also less challenging to take
control of than a PC, which means it’s easy for adversaries to
quickly build a large army.
IoT devices operate on a 24-hour basis and can be called
into action at a moment’s notice. And as adversaries
increase the size of their IoT botnets, they are investing in
more sophisticated code and malware and shifting to more
advanced DDoS attacks.
Application DDoS overtakes network DDoS
Application layer attacks are on the rise while network layer
attacks are declining (see Figure 28). Radware researchers
suspect this shift can be attributed to growth in IoT botnets.
The trend is concerning because the application layer is so
diverse, and has so many devices within it, which means
attacks targeting this layer could potentially shut down large
portions of the Internet.
Figure 28 Application DDoS attacks increased in 2017
37%
HTTP
35%
TCP-SYN
Flood
28%
HTTPS
33%
DNS
23%
UDP
18%
ICMP
12%
TCP-Other
10%
IPv6
4%
Other
Network: 51%Application: 64%
Which of the following attack vectors have you experienced this year?
Figure 28 Application DDoS attacks increased in 2017
Source: Radware
7%
VoIP
23%
SMTP
32 Cisco 2018 Annual Cybersecurity Report | The attack landscape
More attackers are turning to the application layer because
there is little left to exploit in the network layer, according to
Radware researchers. IoT botnets are also less resource-
intensive than PC botnets to build. That means adversaries
can invest more resources in developing advanced code and
malware. The operators of the multivector botnet Mirai, which
is known for advanced application attacks, are among those
making that type of investment.
“Burst attacks” increasing in complexity, frequency,
and duration
One of the most significant DDoS attack trends Radware
observed in 2017 was an increase in short-burst attacks, which
are becoming more complex, frequent, and persistent. Forty-two
percent of organizations in Radware’s investigation experienced
this type of DDoS attack in 2017 (Figure 29). In most of the
attacks, the recurring bursts lasted only a few minutes.
Burst tactics are typically aimed at gaming websites and
service providers due to their targets’ sensitivity to service
availability and their inability to sustain such attack maneuvers.
Timely or random bursts of high traffic rates over a period of
days or even weeks can leave these organizations with no
time to respond, causing severe service disruptions.
Radware researchers say that burst attacks:
•• Are composed of multiple changing vectors. The
attacks are geographically distributed and manifest as a
sustained series of precise and high-volume SYN floods,
ACK floods, and User Datagram Protocol (UDP) floods on
multiple ports.
•• Combine high-volume attacks with varying durations—
from two to 50 seconds of high burst-traffic with intervals
of approximately five to 15 minutes.
•• Are often combined with other long-duration
DDoS attacks.
Growth in reflection amplification attacks
Another DDoS trend Radware observed during 2017 is growth
in reflection amplification DDoS attacks as a major vector
against a wide spectrum of services. According to Radware,
two in five businesses experienced a reflection amplification
attack in 2017. One-third of those organizations reported that
they were unable to mitigate these attacks.
A reflection amplification attack uses a potentially legitimate
third-party component to send attack traffic to a target,
concealing the attacker’s identity. Attackers send packets
to the reflector servers with a source IP address set to the
target user’s IP. That makes it possible to indirectly overwhelm
the target with response packets and exhaust the target’s
utilization of resources (see Figure 30).
Figure 29 Experience with DDoS attacks in recurring bursts
Experienced Short-Burst
DDoS Attacks in 2017
Lasted
Seconds
Lasted a
Few Minutes
Lasted
15-30
Minutes
Not Hit by
Burst Attacks
58%9% 15%18%
42%
Figure 29 Experience with DDoS attacks in
recurring bursts
Source: Radware
Figure 30 Reflection amplification attack
Source: Radware
Third-Party Component
Attacker Target
Figure 30 Reflection amplification attack

Recommended for you

En msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurityEn msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurity

The document summarizes the top 10 cybersecurity trends found in Microsoft's research in 2016. These include: an increase in highly severe vulnerabilities; a decline in Java exploits; consumer computers encountering twice as many threats as enterprise computers; locations like Mongolia and Libya having the highest malware infection rates; exploit kits accounting for 40% of commonly encountered exploits; Adobe Flash Player being the most commonly detected object on malicious pages; over 40% of vulnerabilities being in non-browser or OS applications; an increase in Trojan encounters; threats varying dramatically by country; and less than 10% of vulnerabilities being in Microsoft software.

Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation

Network security is a dynamic art, with dangers appearing as fast as black hats can exploit vulnerabilities. While there are basic “golden rules” which can make life difficult for the bad guys, it remains a challenge to keep networks secure. John Chambers, Executive Chairman of Cisco, famously said “there are two types of companies: those that have been hacked, and those who don’t know they have been hacked”. The question for most organizations isn’t if they’re going to be breached, but how quickly they can isolate and mitigate the threat. In this paper, we’ll examine best practices for effective cybersecurity – from both a proactive (access hardening) and reactive (threat isolation and mitigation) perspective. We’ll address how network automation can help minimize cyberattacks by closing vulnerability gaps and how it can improve incident response times in the event of a cyberthreat. Finally, we’ll lay a vision for continuous network security, to explore how machine-to-machine automation may deliver an auto-securing and self-healing network. Go to www.esgjrconsultinginc.com

cyberthreat cyber securitycyber security
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation

Network security is a dynamic art, with dangers appearing as fast as black hats can exploit vulnerabilities. While there are basic “golden rules” which can make life difficult for the bad guys, it remains a challenge to keep networks secure. John Chambers, Executive Chairman of Cisco, famously said “there are two types of companies: those that have been hacked, and those who don’t know they have been hacked”. The question for most organizations isn’t if they’re going to be breached, but how quickly they can isolate and mitigate the threat. In this paper, we’ll examine best practices for effective cybersecurity – from both a proactive (access hardening) and reactive (threat isolation and mitigation) perspective. We’ll address how network automation can help minimize cyberattacks by closing vulnerability gaps and how it can improve incident response times in the event of a cyberthreat. Finally, we’ll lay a vision for continuous network security, to explore how machine-to-machine automation may deliver an auto-securing and self-healing network.

cybersecuritycyber defensenetwork security engineer
33 Cisco 2018 Annual Cybersecurity Report | The attack landscape
To successfully execute a reflection amplification attack,
adversaries need to have a larger bandwidth capacity than
their targets. Reflector servers make that possible: the
attacker simply reflects the traffic from one or more third-
party machines. Since these are ordinary servers, this
type of attack is particularly difficult to mitigate. Common
examples include:
DNS amplification reflective attacks
This sophisticated denial of service attack takes advantage
of a DNS server’s behavior to amplify the attack. A standard
DNS request is smaller than the DNS reply. In a DNS
amplification reflective attack, the attacker carefully selects
a DNS query that results in a lengthy reply that’s up to 80
times longer than the request (for example, “ANY”). The
attacker sends this query using a botnet to third-party
DNS servers while spoofing the source IP address with the
target user’s IP address. The third-party DNS servers send
their responses to the target’s IP address. With this attack
technique, a relatively small botnet can channel a volumetric
flood of large responses toward the target.
NTP reflection
This type of amplification attack exploits publicly accessible
Network Time Protocol (NTP) servers to overwhelm and
exhaust defenders with UDP traffic. NTP is an old networking
protocol for clock synchronization between computer systems
over packet-switched networks. It is still widely used across
the Internet by desktops, servers, and even phones to keep
their clocks in sync. Several old versions of NTP servers
contain a command called monlist, which sends the requester
a list of up to the last 600 hosts that connected to the
queried server.
In a basic scenario, the attacker repeatedly sends the “get
monlist” request to a random NTP server and spoofs the
source IP address for the requesting server as the target
server. NTP server responses are then directed to the target
server to cause a significant increase in UDP traffic from
source port 123.
SSDP reflection
This attack exploits the Simple Service Discovery Protocol
(SSDP), which is used to allow Universal-Plug-and-Play
(UPnP) devices to broadcast their existence. It also helps
to enable discovery and control of networked devices and
services, such as cameras, network-attached printers, and
many other types of electronic equipment.
Once a UPnP device is connected to a network, and after
it receives an IP address, the device is able to advertise
its services to other computers in the network by sending
a message in a multicast IP. When a computer gets the
discovery message about the device, it makes a request for a
complete description of the device services. The UPnP device
then responds directly to that computer with a complete list of
any services it has to offer.
As with NTP and DNS amplified DDoS attacks, the attacker can
use a small botnet to query that final request for the services.
The attacker then spoofs the source IP to the target user’s IP
address and aims the responses directly at the target.
34 Cisco 2018 Annual Cybersecurity Report | The attack landscape
Figure 31 Overview of infrastructure blind spots across various industriesFigure 31 Overview of infrastructure blind spots across various industries
Healthcare Tech FinanceGovernmentLumeta Actual Customers
Presumed endpoints
Endpoint visibility gap
Unmanaged networks
Unauthorized or unsecured forwarding devices
Known but unreachable networks
Leak paths to Internet identified on deployment 3000 220120 9400
33,256 454 16,828
520 42075 2026
3278 77124 5
12% 50%33% 43%
150,000 600,00060,000 8000
Discovered endpoints 170,000 1,200,00089,860 14,000
Source: Lumeta
Defenders must remediate “leak paths”
A “leak path,” as defined by Cisco partner Lumeta, is a policy
or segmentation violation or unauthorized or misconfigured
connection created to the Internet on an enterprise network,
including from the cloud, that allows traffic to be forwarded
to a location on the Internet—such as a malicious website.
These unexpected connections can also occur internally
between two different network segments that should not
be communicating with each other. For example, in critical
infrastructure environments, an unexpected leak path
between the manufacturing floor and business IT systems
could indicate malicious activity. Leak paths can also stem
from improperly configured routers and switches.
Devices that don’t have permissions set up correctly, or
are left open and unmanaged, are vulnerable to attackers.
Devices and networks related to rogue or shadow IT are also
fertile ground for adversaries to establish leak paths because
they tend to be unmanaged and unpatched. Lumeta estimates
that about 40 percent of the dynamic networks, endpoints,
and cloud infrastructure in enterprises is leading to significant
infrastructure blind spots and lack of real-time awareness for
security teams.
Detection of existing leak paths are critical as they can be
exploited at any time. However, newly created leak paths
are important to detect in real time since they are immediate
indicators of compromise and are associated with most
advanced attacks, including ransomware.
Lumeta’s recent analysis of IT infrastructure at more than
200 organizations across several industries underscores the
endpoint visibility gap. It also shows that many companies
significantly underestimate the number of endpoints in their IT
environments (see Figure 31). Lack of awareness about the
number of IP-enabled IoT devices connected to the network
is often a key reason for underestimation of endpoints.
35 Cisco 2018 Annual Cybersecurity Report | The attack landscape
Lumeta’s researchers suggest that leak paths are on the rise,
especially in cloud environments, where there is less network
visibility and fewer security controls in place.
Malicious actors don’t always immediately use the leak
paths they create or find. When they do return to these
channels, they use them to install malware or ransomware,
steal information, and more. Researchers with Lumeta say
one reason leak paths often remain undetected is because
threat actors are adept at encrypting and obfuscating their
activity—by using TOR, for example. They also are careful to
use leak paths judiciously, so as not to alert security teams
to their activity.
Lumeta researchers say security team skills gaps, namely the
lack of fundamental knowledge about networks, can interfere
with organizations’ ability to investigate and remediate leak
path issues in a timely manner. Better collaboration between
security and network teams can help expedite investigations
and remediation of leak paths.
Tools for automation that provide network context can also
give security analysts insight into potential leak path issues. In
addition, implementing appropriate segmentation policies can
help security teams quickly determine whether unexpected
communication between networks or devices is malicious.
Cisco 2018 Security Capabilities Benchmark Study: Lack of security personnel prevents many
organizations from implementing new cyber capabilities
Severe staff shortages remain a major issue for defenders. As
noted above, skills gaps can interfere with an organization’s
ability to investigate and remediate certain types of threats.
Also, without the right talent in place, defenders can’t deploy
new technology and processes that could help to strengthen
their security postures (Figure 32).
Many security professionals interviewed for the Cisco 2018
Security Capabilities Benchmark Study said that, ideally, they
would automate or outsource more of their routine activities,
so they could redirect staff to higher-value activities.
Figure 32 Key capabilities defenders would add,
if staffing levels improved
19%
Endpoint
Forensics
17%
Cloud Access
Security Broker
(CASB)
17%
Web Application
Firewall
16%
Intrusion
Prevention
16%
Multifactor
Authentication
16%
Mobility
Security
15%
Encryption/
Privacy/
Data Protection
16%
Firewall
16%
Endpoint
Protection/
Antivirus
16%
Network
Forensics
Figure 32 Key capabilities defenders would add,
if staffing levels improved
Source: Cisco 2018 Security Capabilities Benchmark Study
Download the 2018 graphics at: cisco.com/go/acr2018graphics
36 Cisco 2018 Annual Cybersecurity Report | The attack landscape
Industrial control systems vulnerabilities place critical infrastructure at risk
Industrial control systems (ICS) are at the heart of all
manufacturing and process control systems. ICS connect to
other electronic systems that are part of the control process,
creating a highly connected ecosystem of vulnerable devices
that a wide range of attackers is eager to compromise.
Threat actors who want to target ICS to cripple critical
infrastructure are actively engaged in research and creating
backdoor pivot points to facilitate future attacks, according
to TrapX Security, a Cisco partner that develops deception-
based cybersecurity defenses. Among the potential cyber
attackers are experts with advanced knowledge of IT systems,
ICS architectures, and the processes they support. Some also
know how to program product lifecycle management (PLM)
controllers and subsystems.
Threat researchers with TrapX recently conducted
investigations into several cyber attacks that targeted
customers’ ICS to help highlight unexpected problems with
ICS cyber defense. Two of the incidents, described below,
took place in 2017 and remain under investigation.
Target: Large international water treatment and waste
processing company
Attackers used the company’s demilitarized zone (DMZ)
server as a pivot point to compromise the internal network.
The security operations team received alerts from deception
security technology embedded in the network DMZ. This
physical or logical subnetwork bridges internal networks from
untrusted networks, such as the Internet, protecting other
internal infrastructure. The investigation found that:
•• The DMZ server was breached due to a misconfiguration
that allowed RDP connections.
•• The server was breached and controlled from several IPs,
which were connected to political hacktivists hostile to
the plant.
•• The attackers were able to launch multiple major attacks
against several of the company’s other plants from the
compromised internal network.
Target: Power plant
This power plant’s critical assets include a very large ICS
infrastructure and the necessary supervisory control and
data acquisition (SCADA) components that manage and
run their processes. The plant is considered critical national
infrastructure and subject to scrutiny and oversight by the
responsible national security agency. It is therefore considered
a high-security installation.
The CISO involved decided to implement deception
technology to protect the plant’s standard IT resources from
ransomware attacks. The technology was also distributed
within the ICS infrastructure. Soon after, the security
operations team received several alerts that indicated a
breach to the systems within the critical infrastructure plant
operations. Their immediate investigation concluded:
•• A device in the process control network was attempting
to interact with the deception traps, which were
camouflaged as PLM controllers. This was an active
attempt to map and understand the exact nature of each
PLM controller within the network.
•• The compromised device would normally have been
closed, but a vendor performing maintenance failed to
close the connection when finished. That oversight left
the process control network vulnerable to attackers.
•• The information adversaries were collecting is exactly the
type needed to disrupt plant activity and potentially cause
great damage to ongoing plant operations.

Recommended for you

McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats Predictions

McAfee Labs explores top threats expected in the coming year. Welcome to the McAfee Labs 2017 Threats Predictions report. We have split this year’s report into two sections. The first section digs into three very important topics, looking at each through a long lens. The second section makes specific predictions about threats activity in 2017. Our predictions for next year cover a wide range of threats, including ransomware, vulnerabilities of all kinds, the use of threat intelligence to improve defenses, and attacks on mobile devices.

cybersecuritythreatprediction
The Role Of Data Analytics In Cybersecurity
The Role Of Data Analytics In CybersecurityThe Role Of Data Analytics In Cybersecurity
The Role Of Data Analytics In Cybersecurity

If you've decided to pursue this path, take a look at ABM College's cybersecurity program. From understanding the fundamentals of security to mastering advanced data analysis and penetration testing, the college equips students with the knowledge to fill the industry's significant skills gap.

cybersecurity
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security

This document discusses threats, attacks, and vulnerabilities which play a key role in cyber security. It begins by defining cyber security as preventing, detecting, and responding to cyber attacks. It then discusses various common cyber threats like cyber theft, cyber vandalism, and denial of service attacks. It also examines different types of cyber attacks like untargeted and targeted attacks. The document outlines how vulnerabilities in software, policies, users, and other areas can enable these threats and attacks. It concludes that while technology can help reduce cyber attacks, vulnerabilities ultimately reside with human behavior, so education is important to strengthen cyber security.

irjet
37 Cisco 2018 Annual Cybersecurity Report | The attack landscape
Recommendations
Many ICS breaches begin with the compromise of vulnerable
servers and computing resources within the corporate IT
network. Threat researchers with TrapX recommend that
organizations take the following actions to reduce risk and
help ensure the integrity of operations within their facilities:
•• Review vendors and systems, and see that all patches
and updates are applied promptly. (If patches are not
available, consider migrating to new technology.)
•• Reduce the use of USB memory sticks and DVD drives.
•• Isolate ICS systems from IT networks. Don’t allow any
direct connections between the two. That includes
network connections, laptops, and memory sticks.
•• Implement policies that severely limit the use of the ICS
networks for anything other than essential operations.
Reduce accessibility to ICS workstations and monitors
with external Internet browser access. Assume these
policies will fail and plan accordingly.
•• Research and eliminate all embedded passwords or
default passwords in your production network. And
wherever possible, implement two-factor authentication.
•• Review plans for disaster recovery following a major
cyber attack.
For additional case studies, see the TrapX Security research
paper, Anatomy of an Attack: Industrial Control Systems
Under Siege.
Cisco 2018 Security Capabilities Benchmark Study: More OT and IoT attacks on the horizon
Attacks targeting operational technology (OT) such as ICS
and IoT devices are still uncommon enough that many
security professionals haven’t experienced them firsthand.
But according to research for the Cisco 2018 Security
Capabilities Benchmark Study, security professionals fully
expect such attacks to occur, and are trying to determine how
they will respond to them.
Security professionals recognize that these systems often have
few protections and unpatched and out-of-date software,
making them vulnerable to attacks.
“We still have OT devices that are 25 years old, and
compressors and machines that are 40 years old,” said one
respondent. “IT professionals are used to the schedule. [They
say,] ‘Tell me when Windows X is no longer supported,’ or
‘Hey, this Oracle version is going EOL [end of life].’ There’s no
such thing in the OT environment.”
Few security professionals can speak confidently on issues
relating to securing OT in their organizations. That is either
because they don’t have or anticipate adding much OT, or
because IoT implementations are new. Of these professionals, 31
percent said their organizations have already experienced cyber
attacks on OT infrastructure, while 38 percent said they expect
attacks to extend from IT to OT in the next year (Figure 33).
Figure 33 Thirty-one percent of organizations have
experienced cyber attacks on OT infrastructure
Source: Cisco 2018 Security Capabilities Benchmark Study
Have Already Seen
Cyber Attacks in OT
Expect Cyber Attacks
to Extend into OT
Expect Cyber Attacks
in OT, but Not in the
Next Year
Believe Cyber Attacks Will
Remain Focused on IT
38%
20%
10%
31%
Figure 33 Thirty-one percent of organizations have
experienced cyber attacks on OT infrastructure
Download the 2018 graphics at: cisco.com/go/acr2018graphics
38 Cisco 2018 Annual Cybersecurity Report | The attack landscape
VULNERABILITIES AND PATCHING
Amid the chaos of security concerns, defenders may lose sight of vulnerabilities affecting their technology. But
you can be sure attackers are paying attention, and calculating how to exploit these potential weaknesses to
launch attacks.
There was a time when patching known vulnerabilities within 30 days was considered best practice. Now, waiting
that long to remediate could increase an organization’s risk of being targeted for attack because threat actors are
moving faster to release and use active exploits of vulnerabilities. Organizations also must avoid neglecting small but
significant security gaps that could benefit adversaries, especially during the reconnaissance phase of attacks when
they are searching for pathways into systems.
Prevalent vulnerabilities in 2017 included buffer overflow errors, Apache Struts
Buffer overflow errors topped the list of Common Weakness
Enumeration (CWE) vulnerabilities tracked by Cisco in 2017,
although other categories showed movement up and down.
Input validation vulnerabilities increased, while buffer errors
declined (Figure 34).
Figure 34 CWE threat category activity
Figure 34 CWE threat category activity
ChangeJan-Sep 2016 Jan-Sep 2017Threat Category
CWE-119: Buffer errors
CWE-20: Input validation
CWE-264: Permissions, privileges and access
CWE-200: Information leak/disclosure 125 +100%250
137 +18%163
227 +15%268
493 (-22%)403
CWE-310: Cryptographic issues
CWE-78: OS Command injections
CWE-59: Link following 5 0
7 +114%15
27 (-37%)17
Source: Cisco Security Research
39 Cisco 2018 Annual Cybersecurity Report | The attack landscape
In examining critical advisories (Figure 35), Apache Struts
vulnerabilities were still prominent in 2017. Apache Struts is
an open-source framework for creating Java applications that
is widely used. Apache Struts vulnerabilities were implicated
in security breaches in 2017 that involved major data brokers.
While Apache tends to identify vulnerabilities and offer
patches quickly, infrastructure solutions such as Apache
Struts can be challenging to patch without disrupting network
performance. As discussed in previous Cisco security
19	Cisco 2017 Midyear Cybersecurity Report: cisco.com/c/m/en_au/products/security/offers/cybersecurity-reports.html.
reports,19
third-party or open-source software vulnerabilities
can require manual patching, which may not be done as
frequently as automated patching from standard software
vendors. That gives malicious actors a greater window of time
to launch attacks.
Deep scanning of operating systems down to the library or
individual file level can provide organizations with inventories
of the components of open-source solutions.
Figure 35 Critical advisories and attack activities
Attack Activities
Mar 7th
WikiLeaks Vault 7
Release
Multiple CVEs
Operation Cloud
Hopper Sustained
Global Campaigns
Apr 6th
Shadow Brokers
Group Disclosure
of Equation Exploits
Apr 8th
MS17-010
Multiple CVEs
WannaCry Activity
May 17st
Critical Vulnerabilities
CVE-2017-3733
CVE-2017-5638
Oracle CPU,
OIT Vulnerabilities
Jan 18th
OpenSSL
Vulnerabilities
Jan 26th
OpenSSL
Vulnerabilities
Feb 6th
Apache Struts 2
Remote Code
Execution
Vulnerabilities
Mar 6th
Multiple CVEs
Multiple CVEs Multiple CVEs
CVE-2017-0145
CVE-2017-0108
CVE-2017-7269
Microsoft Windows
Graphics
Mar 14th
CVE-2017-0199
Microsoft Office
(Dridex Exploiting)
Apr 11th
CVE-2017-9805
Apache Struts REST
Plug-in XML
Processing Arbitrary
Code Execution
Vulnerability
Sep 6th
CVE-2017-8759
Microsoft .NET
Framework Arbitrary
Code Execution
Vulnerability
Sep 12th
Microsoft Windows
Server Message
Block Service
Arbitrary Code
Execution
Vulnerabilities
Mar 14th
Network Time
Protocol
Vulnerabilities
Mar 21st
Microsoft Internet
Information
Services (IIS)
WebDAV
Mar 29th
Figure 35 Critical advisories and attack activities
Source: Cisco Security Research Download the 2018 graphics at: cisco.com/go/acr2018graphics
40 Cisco 2018 Annual Cybersecurity Report | The attack landscape
IoT and library vulnerabilities loomed larger in 2017
Between October 1, 2016, and September 30, 2017, Cisco
threat researchers discovered 224 new vulnerabilities in non-
Cisco products, of which 40 vulnerabilities were related to
third-party software libraries included in these products, and
74 were related to IoT devices (Figure 36).
The relatively large number of vulnerabilities in libraries
points to the need to delve deeper into third-party solutions
that provide the framework for many enterprise networks.
Defenders should assume that third-party software libraries
can be targets for attackers; it’s not enough to simply make
sure the latest version of the software is running, or that no
open CVEs (common vulnerabilities) have been reported.
Security teams should check frequently for patches, and
review the security practices of third-party vendors. Teams
could, for example, request that vendors provide secure
development lifecycle statements.
Another best practice for vetting third-party software is
helping to ensure that auto-update or check-for-update
features are running securely. For example, when an update
is initiated, security professionals should be certain that
the communication for that software occurs over a secure
channel (such as SSL), and that the software is digitally
signed. Both are needed: If only digital signatures are used,
but not a secure channel, an attacker could intercept traffic
and potentially replace an update with an older version
of the software that is digitally signed, but may contain
vulnerabilities. If only a secure channel is used, an attacker
could potentially compromise the vendor’s update server and
replace the update with malware.
Spectre and Meltdown vulnerabilities: proactive preparation can accelerate remediation
The January 2018 announcement of the Spectre and Meltdown
vulnerabilities, which could allow attackers to compromise data
on platforms running current-generation computer processors,
raised concerns about security professionals’ ability to protect
data from attacks. The vulnerabilities could allow attackers to
view application data in memory on the chipset, with potential
for widespread damage, since affected microprocessors are
found in everything from mobile phones to server hardware.
The threats posed by the Spectre and Meltdown vulnerabilities
highlight the importance of communicating with security
organizations about solutions such as patches—as well as
ensuring that third-party providers, such as cloud and supply
chain vendors, are adhering to best practices for remediating
gaps in security posed by such vulnerabilities. Product
security incident response teams, or PSIRTs (such as the
Cisco PSIRT), are designed to respond quickly to vulnerability
announcements, provide patches, and advise customers on
how to avoid risks.
Organizations need to plan for vulnerabilities like Spectre and
Meltdown to happen, instead of hoping they won’t occur. The
key is preparing for such announcements, and having systems
in place to mitigate potential damage. For example, security
teams should proactively inventory devices under their control,
and document configurations in features in use, as some
vulnerabilities are configuration-dependent and impact security
only when certain features are activated.
Security teams should also ask third-party vendors, such
as cloud providers, about their update and patching
processes. Organizations need to ask for transparency from
their cloud providers in terms of how they remediate such
vulnerabilities, and how quickly they respond to alerts. But
in the end, the responsibility for preparedness falls on the
organizations themselves; they must communicate with PSIRT
organizations, and establish processes for quickly responding
to vulnerabilities.
For more information, read the Talos blog post on Spectre
and Meltdown.
Total Vulnerabilities: 224
IoT: 74
Third-Party
Software Libraries: 40
Figure 36 Third-party library and IoT
vulnerabilities, October 1, 2016-September 30, 2017
Source: Cisco Security Research
Figure 36 Third-party library and IoT vulnerabilities

Recommended for you

Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck

Download the full Midyear Security Report >> http://cs.co/MSR15SL Cisco has released its Midyear Security Report. In this report, Cisco provides industry insights and key findings taken from threat intelligence and cybersecurity trends for the first half of 2015.

cisco securitycisco midyear security reportcybersecurity
C018131821
C018131821C018131821
C018131821

This document discusses cyber security in the era of networking. It covers several topics including types of cyber attacks like denial of service attacks and spoofing; threats like criminals, spies, and terrorists; vulnerabilities from insiders and supply chains; risks existing everywhere networked systems are used; and approaches to cyber crisis planning, mobile security, threat intelligence, next generation firewalls, access controls, surveillance, security awareness, and conclusions. Research areas discussed include scalable trustworthy systems, malware combating, and privacy-aware security.

iosr journal of computer engineering (iosr-jce)
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack

Looking to understand how hackers and other attackers use cyber technology to attack your network and your executives? This slide set provides an overview and details the anatomy of a cyber attack, and the strategies you can use to manage and mitigate risk.

information securityitsecurity
41 Cisco 2018 Annual Cybersecurity Report | The attack landscape
Active exploits fuel race to remediate, except for IoT devices
Qualys, Inc., a Cisco partner and provider of cloud-based
security and compliance solutions, took a retrospective look at
companies’ patch management behavior before and after the
WannaCry campaign that affected many organizations across
the world in May 2017.
The ransomware cryptoworm WannaCry, which many security
experts believe was designed to wipe data, took advantage of
a Microsoft Windows security vulnerability called EternalBlue,
which was leaked by the hacker group Shadow Brokers
in mid-April 2017. (For more on this topic, see “They’re
out there: Defenders should prepare to face new, self-
propagating, network-based threats in 2018,” on page 6.)
On March 14, 2017, Microsoft issued a security update
(MS17-010) alerting users to a critical vulnerability in its
Microsoft Windows SMB Server. Figure 37 shows how the
number of devices detected with the vulnerability spikes, and
then gradually declines between mid-March and mid-April as
organizations scan their systems and apply the patch.
However, a significant number of devices still remained
unpatched as of mid-April. Then, on April 14, Shadow
Brokers released the working exploit for targeting that known
vulnerability in various versions of Microsoft Windows.
Figure 37 shows that the number of devices detected with the
vulnerability nearly doubled shortly thereafter. That happened
as organizations learned of the exploit and its potential to
impact both supported and unsupported versions of Windows
through a remote check from Qualys that used a portion of
the exploit code.
But even after the exploit was released, widespread patching
didn’t occur until mid-May, after the WannaCry attack made
headlines around the world. Figure 37 shows the steep
remediation curve after that campaign. By late May, few
devices were left unpatched.
Qualys’ research into its customers’ patching behavior
indicates that it takes a major event to motivate many
organizations to patch critical vulnerabilites—even knowledge
of an active exploit is not enough to accelerate remediation.
And in the case of the WannaCry campaign, businesses had
access to the patch for the Microsoft vulnerability for two
months before the ransomware attacks occurred.
Another factor, as described by researchers with Cisco and
Qualys partner Lumeta, was that unknown, unmanaged,
rogue, and shadow IT endpoints were left unpatched.
Attackers were able to leverage these blind spots. Without
knowledge of these systems, vulnerabilty scanners were
unable to evaluate and recommend patching of these
systems, leaving them vulnerable to WannaCry.
Figure 37 Patching behavior before and after
WannaCry campaign
Figure 37 Patching behavior before and after
WannaCry campaign
Source: Qualys
600K
500K
400K
300K
200K
100K
NumberofDetections
2017
Mar Apr May
MS17-010 Detections
Microsoft Warns
of Vulnerability
Exploited Vulnerability
Makes Headlines
Remediation Activities Accelerate Due
to Active Attacks by WannaCry
Download the 2018 graphics at: cisco.com/go/acr2018graphics
Cisco 2018, Annual Cybersecurity Report
Cisco 2018, Annual Cybersecurity Report
Cisco 2018, Annual Cybersecurity Report

Recommended for you

The Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksThe Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted Attacks

Advanced persistent threats (APTs) and targeted attacks have a proven ability to penetrate standard security defenses and remain undetected for months while siphoning valuable data or carrying out destructive actions. We review challenges faced by information security leaders, their options for dealing with attackers and how to a Custom Defense approach to deploy a comprehensive Detect—Analyze—Adapt—Respond lifecycle that enhances current security investments while providing new weapons to fight back against their attackers.

network securitycyber threatapt
Insecure magazine - 52
Insecure magazine - 52Insecure magazine - 52
Insecure magazine - 52

This document discusses the evolution of approaches to securing SCADA systems. Early advice based on IT security principles is subtly flawed, as it fails to prevent system compromise and physical damage cannot be undone with backups. More recent approaches focus on prevention over detection and response. The key shift is recognizing SCADA systems must remain uncompromised, as restoring operations from intrusions is impossible unlike with IT systems. Overall confidence in SCADA security remains low due to outdated approaches still in use.

hackinghackerhack
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKSAN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS

This document summarizes an empirical study on cyber security threats and attacks. It discusses recent trends in cyber attacks such as ransomware, advanced persistent threats, insider threats, malware, and botnets. It also examines vulnerabilities in critical infrastructure that can be exploited by attackers. The document provides examples of research analyzing specific cyber threats and vulnerabilities. It concludes that understanding cyber threats is important for protecting systems and networks, and that security policies and monitoring are needed to mitigate threats and safeguard systems.

anempiricalstudy
Cisco 2018, Annual Cybersecurity Report
Cisco 2018, Annual Cybersecurity Report
Cisco 2018, Annual Cybersecurity Report
Cisco 2018, Annual Cybersecurity Report

Recommended for you

Hackathon evaluation template_latest_uploadpdf
Hackathon evaluation template_latest_uploadpdfHackathon evaluation template_latest_uploadpdf
Hackathon evaluation template_latest_uploadpdf

Template of evaluation

Cisco 2018, Annual Cybersecurity Report
Cisco 2018, Annual Cybersecurity Report
Cisco 2018, Annual Cybersecurity Report
Cisco 2018, Annual Cybersecurity Report

Recommended for you

cisco-mpls-tp-solutions-moustafa-kattan.pdf
cisco-mpls-tp-solutions-moustafa-kattan.pdfcisco-mpls-tp-solutions-moustafa-kattan.pdf
cisco-mpls-tp-solutions-moustafa-kattan.pdf

The document discusses Cisco MPLS-TP solutions and provides an overview of MPLS-TP fundamentals, carrier packet transport, control planes, and MPLS-TP scenarios. It summarizes the industry transition from legacy TDM networks to Ethernet and describes how MPLS-TP can help carriers migrate from SDH/SONET infrastructure to packet-based networks.

Startup leadership academy tirana
Startup leadership academy tiranaStartup leadership academy tirana
Startup leadership academy tirana

The document summarizes the goals and activities of the Startup Academy Tirana. The academy aims to groom the next generation of startup CEOs through a world-class curriculum covering various industries like technology, agriculture, and tourism. The program is open to entrepreneurs, investors, and innovators to help them realize their dreams and create jobs. The academy provides mentoring, leadership training, fundraising assistance, and hands-on simulations. It also outlines the timeline for workshops covering topics like business planning, product development, and leadership.

Innovation_Imperative_Erion_Nako_KEMBA_2017
Innovation_Imperative_Erion_Nako_KEMBA_2017Innovation_Imperative_Erion_Nako_KEMBA_2017
Innovation_Imperative_Erion_Nako_KEMBA_2017

This document discusses the potential of 3D printing to revolutionize the construction industry. It begins with a brief historical overview of bunker construction in communist-era Albania, and hypothesizes that 3D printing technology could have transformed Albania's defenses if available then. The document then provides background on 3D printing technology and its current applications. It explores how 3D printing could change building design, business models, and city planning. Specific areas discussed include opportunities in China and Africa, using 3D printing for a lunar base, and the technology's transformative promise for the construction industry.

Cisco 2018, Annual Cybersecurity Report
Cisco 2018, Annual Cybersecurity Report
Cisco 2018, Annual Cybersecurity Report
Cisco 2018, Annual Cybersecurity Report

Recommended for you

Daryaganj @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model Safe
Daryaganj @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model SafeDaryaganj @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model Safe
Daryaganj @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model Safe

Daryaganj @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model Safe

iot paper presentation FINAL EDIT by kiran.pptx
iot paper presentation FINAL EDIT by kiran.pptxiot paper presentation FINAL EDIT by kiran.pptx
iot paper presentation FINAL EDIT by kiran.pptx

Iot

Lajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ginni Singh Top Model Safe
Lajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ginni Singh Top Model SafeLajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ginni Singh Top Model Safe
Lajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ginni Singh Top Model Safe

Lajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ginni Singh Top Model Safe

Cisco 2018, Annual Cybersecurity Report
Cisco 2018, Annual Cybersecurity Report
Cisco 2018, Annual Cybersecurity Report
Cisco 2018, Annual Cybersecurity Report

Recommended for you

Vasant Kunj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ruhi Singla Top Model Safe
Vasant Kunj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ruhi Singla Top Model SafeVasant Kunj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ruhi Singla Top Model Safe
Vasant Kunj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ruhi Singla Top Model Safe

Vasant Kunj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ruhi Singla Top Model Safe

RK Puram @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model Safe
RK Puram @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model SafeRK Puram @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model Safe
RK Puram @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model Safe

RK Puram @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model Safe

Karol Bagh @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model Safe
Karol Bagh @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model SafeKarol Bagh @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model Safe
Karol Bagh @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model Safe

Karol Bagh @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model Safe

Cisco 2018, Annual Cybersecurity Report
Cisco 2018, Annual Cybersecurity Report
Cisco 2018, Annual Cybersecurity Report
Cisco 2018, Annual Cybersecurity Report

Recommended for you

Sin Involves More Than You Might Think (We'll Explain)
Sin Involves More Than You Might Think (We'll Explain)Sin Involves More Than You Might Think (We'll Explain)
Sin Involves More Than You Might Think (We'll Explain)

Sin Involves More Than You Might Think (We'll Explain)

Pitampura @ℂall @Girls ꧁❤ 9873777170 ❤꧂Fabulous sonam Mehra Top Model Safe
Pitampura @ℂall @Girls ꧁❤ 9873777170 ❤꧂Fabulous sonam Mehra Top Model SafePitampura @ℂall @Girls ꧁❤ 9873777170 ❤꧂Fabulous sonam Mehra Top Model Safe
Pitampura @ℂall @Girls ꧁❤ 9873777170 ❤꧂Fabulous sonam Mehra Top Model Safe

Pitampura @ℂall @Girls ꧁❤ 9873777170 ❤꧂Fabulous sonam Mehra Top Model Safe

[D3T1S02] Aurora Limitless Database Introduction
[D3T1S02] Aurora Limitless Database Introduction[D3T1S02] Aurora Limitless Database Introduction
[D3T1S02] Aurora Limitless Database Introduction

Amazon Aurora 클러스터를 초당 수백만 건의 쓰기 트랜잭션으로 확장하고 페타바이트 규모의 데이터를 관리할 수 있으며, 사용자 지정 애플리케이션 로직을 생성하거나 여러 데이터베이스를 관리할 필요 없이 Aurora에서 관계형 데이터베이스 워크로드를 단일 Aurora 라이터 인스턴스의 한도 이상으로 확장할 수 있는 Amazon Aurora Limitless Database를 소개합니다.

awsdatabaseaurora
Cisco 2018, Annual Cybersecurity Report
Cisco 2018, Annual Cybersecurity Report
Cisco 2018, Annual Cybersecurity Report
Cisco 2018, Annual Cybersecurity Report

Recommended for you

Laxmi Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Laxmi Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model SafeLaxmi Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Laxmi Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe

Laxmi Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe

How We Added Replication to QuestDB - JonTheBeach
How We Added Replication to QuestDB - JonTheBeachHow We Added Replication to QuestDB - JonTheBeach
How We Added Replication to QuestDB - JonTheBeach

Building a database that can beat industry benchmarks is hard work, and we had to use every trick in the book to keep as close to the hardware as possible. In doing so, we initially decided QuestDB would scale only vertically, on a single instance. A few years later, data replication —for horizontally scaling reads and for high availability— became one of the most demanded features, especially for enterprise and cloud environments. So, we rolled up our sleeves and made it happen. Today, QuestDB supports an unbounded number of geographically distributed read-replicas without slowing down reads on the primary node, which can ingest data at over 4 million rows per second. In this talk, I will tell you about the technical decisions we made, and their trade offs. You'll learn how we had to revamp the whole ingestion layer, and how we actually made the primary faster than before when we added multi-threaded Write Ahead Logs to deal with data replication. I'll also discuss how we are leveraging object storage as a central part of the process. And of course, I'll show you a live demo of high-performance multi-region replication in action.

questdbtime-series
Greater Kailash @ℂall @Girls ꧁❤ 9873777170 ❤꧂Glamorous sonam Mehra Top Model ...
Greater Kailash @ℂall @Girls ꧁❤ 9873777170 ❤꧂Glamorous sonam Mehra Top Model ...Greater Kailash @ℂall @Girls ꧁❤ 9873777170 ❤꧂Glamorous sonam Mehra Top Model ...
Greater Kailash @ℂall @Girls ꧁❤ 9873777170 ❤꧂Glamorous sonam Mehra Top Model ...

Greater Kailash @ℂall @Girls ꧁❤ 9873777170 ❤꧂Glamorous sonam Mehra Top Model Safe

More Related Content

What's hot

Web Attack Survival Guide
Web Attack Survival GuideWeb Attack Survival Guide
Web Attack Survival Guide
- Mark - Fullbright
 
Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report
Mandar Kharkar
 
Cyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdfCyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdf
Mitch Cardoza, SPHR, Workforce Solutions Exec.
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Trend Micro
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
Cisco Security
 
Intelligent cyber security solutions
Intelligent cyber security solutionsIntelligent cyber security solutions
Intelligent cyber security solutions
Swapnil Deshmukh
 
Contending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security ModelContending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security Model
IRJET Journal
 
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael MontecilloLuncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
North Texas Chapter of the ISSA
 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015
Andreanne Clarke
 
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISKDATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
Robert Anderson
 
M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat
FireEye, Inc.
 
Computer Security Incident Handling Guide
Computer Security Incident Handling GuideComputer Security Incident Handling Guide
Computer Security Incident Handling Guide
Muhammad FAHAD
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011
Mousselmal Tarik
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
NTT Innovation Institute Inc.
 
Panda Adaptive Defense - The evolution of malware
Panda Adaptive Defense - The evolution of malwarePanda Adaptive Defense - The evolution of malware
Panda Adaptive Defense - The evolution of malware
Panda Security
 
Understanding the mirai botnet
Understanding the mirai botnetUnderstanding the mirai botnet
Understanding the mirai botnet
Felipe Prado
 

What's hot (16)

Web Attack Survival Guide
Web Attack Survival GuideWeb Attack Survival Guide
Web Attack Survival Guide
 
Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report
 
Cyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdfCyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdf
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep Discovery
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Intelligent cyber security solutions
Intelligent cyber security solutionsIntelligent cyber security solutions
Intelligent cyber security solutions
 
Contending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security ModelContending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security Model
 
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael MontecilloLuncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015
 
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISKDATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
 
M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat
 
Computer Security Incident Handling Guide
Computer Security Incident Handling GuideComputer Security Incident Handling Guide
Computer Security Incident Handling Guide
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
Panda Adaptive Defense - The evolution of malware
Panda Adaptive Defense - The evolution of malwarePanda Adaptive Defense - The evolution of malware
Panda Adaptive Defense - The evolution of malware
 
Understanding the mirai botnet
Understanding the mirai botnetUnderstanding the mirai botnet
Understanding the mirai botnet
 

Similar to Cisco 2018, Annual Cybersecurity Report

Cisco asr-2016-160121231711
Cisco asr-2016-160121231711Cisco asr-2016-160121231711
Cisco asr-2016-160121231711
Trainning Educação
 
Cisco 2016 Security Report
Cisco 2016 Security Report Cisco 2016 Security Report
Cisco 2016 Security Report
Steve Fantauzzo
 
Cisco Midyear Security Report 2016
Cisco Midyear Security Report 2016Cisco Midyear Security Report 2016
Cisco Midyear Security Report 2016
Maticmind
 
Cyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdfCyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdf
Mitch Cardoza, SPHR, Workforce Solutions Exec.
 
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS  K. JeniferA STUDY ON CYBER SECURITY AND ITS RISKS  K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
AM Publications
 
Cisco 2017 Midyear Cybersecurity Report
Cisco 2017 Midyear Cybersecurity ReportCisco 2017 Midyear Cybersecurity Report
Cisco 2017 Midyear Cybersecurity Report
E.S.G. JR. Consulting, Inc.
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
Clearnetwork
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
En msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurityEn msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurity
Online Business
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
E.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
Ken Flott
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats Predictions
Matthew Rosenquist
 
The Role Of Data Analytics In Cybersecurity
The Role Of Data Analytics In CybersecurityThe Role Of Data Analytics In Cybersecurity
The Role Of Data Analytics In Cybersecurity
ABMCollege2
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
IRJET Journal
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
Cisco Security
 
C018131821
C018131821C018131821
C018131821
IOSR Journals
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
Mark Silver
 
The Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksThe Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted Attacks
Trend Micro
 
Insecure magazine - 52
Insecure magazine - 52Insecure magazine - 52
Insecure magazine - 52
Felipe Prado
 
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKSAN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
Daphne Smith
 

Similar to Cisco 2018, Annual Cybersecurity Report (20)

Cisco asr-2016-160121231711
Cisco asr-2016-160121231711Cisco asr-2016-160121231711
Cisco asr-2016-160121231711
 
Cisco 2016 Security Report
Cisco 2016 Security Report Cisco 2016 Security Report
Cisco 2016 Security Report
 
Cisco Midyear Security Report 2016
Cisco Midyear Security Report 2016Cisco Midyear Security Report 2016
Cisco Midyear Security Report 2016
 
Cyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdfCyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdf
 
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS  K. JeniferA STUDY ON CYBER SECURITY AND ITS RISKS  K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
 
Cisco 2017 Midyear Cybersecurity Report
Cisco 2017 Midyear Cybersecurity ReportCisco 2017 Midyear Cybersecurity Report
Cisco 2017 Midyear Cybersecurity Report
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
En msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurityEn msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurity
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats Predictions
 
The Role Of Data Analytics In Cybersecurity
The Role Of Data Analytics In CybersecurityThe Role Of Data Analytics In Cybersecurity
The Role Of Data Analytics In Cybersecurity
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
 
C018131821
C018131821C018131821
C018131821
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
The Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksThe Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted Attacks
 
Insecure magazine - 52
Insecure magazine - 52Insecure magazine - 52
Insecure magazine - 52
 
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKSAN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
 

More from Geneva Business School Myanmar Campus

Hackathon evaluation template_latest_uploadpdf
Hackathon evaluation template_latest_uploadpdfHackathon evaluation template_latest_uploadpdf
Hackathon evaluation template_latest_uploadpdf
Geneva Business School Myanmar Campus
 
cisco-mpls-tp-solutions-moustafa-kattan.pdf
cisco-mpls-tp-solutions-moustafa-kattan.pdfcisco-mpls-tp-solutions-moustafa-kattan.pdf
cisco-mpls-tp-solutions-moustafa-kattan.pdf
Geneva Business School Myanmar Campus
 
Startup leadership academy tirana
Startup leadership academy tiranaStartup leadership academy tirana
Startup leadership academy tirana
Geneva Business School Myanmar Campus
 
Innovation_Imperative_Erion_Nako_KEMBA_2017
Innovation_Imperative_Erion_Nako_KEMBA_2017Innovation_Imperative_Erion_Nako_KEMBA_2017
Innovation_Imperative_Erion_Nako_KEMBA_2017
Geneva Business School Myanmar Campus
 

More from Geneva Business School Myanmar Campus (6)

Design Thinking Class_September 26.06.2024
Design Thinking Class_September 26.06.2024Design Thinking Class_September 26.06.2024
Design Thinking Class_September 26.06.2024
 
Hackathon evaluation template_latest_uploadpdf
Hackathon evaluation template_latest_uploadpdfHackathon evaluation template_latest_uploadpdf
Hackathon evaluation template_latest_uploadpdf
 
HandbookGVA-2018 xxxxxxxxxxxxxxxxxxxxxxxx
HandbookGVA-2018 xxxxxxxxxxxxxxxxxxxxxxxxHandbookGVA-2018 xxxxxxxxxxxxxxxxxxxxxxxx
HandbookGVA-2018 xxxxxxxxxxxxxxxxxxxxxxxx
 
cisco-mpls-tp-solutions-moustafa-kattan.pdf
cisco-mpls-tp-solutions-moustafa-kattan.pdfcisco-mpls-tp-solutions-moustafa-kattan.pdf
cisco-mpls-tp-solutions-moustafa-kattan.pdf
 
Startup leadership academy tirana
Startup leadership academy tiranaStartup leadership academy tirana
Startup leadership academy tirana
 
Innovation_Imperative_Erion_Nako_KEMBA_2017
Innovation_Imperative_Erion_Nako_KEMBA_2017Innovation_Imperative_Erion_Nako_KEMBA_2017
Innovation_Imperative_Erion_Nako_KEMBA_2017
 

Recently uploaded

Daryaganj @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model Safe
Daryaganj @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model SafeDaryaganj @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model Safe
Daryaganj @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model Safe
butwhat24
 
iot paper presentation FINAL EDIT by kiran.pptx
iot paper presentation FINAL EDIT by kiran.pptxiot paper presentation FINAL EDIT by kiran.pptx
iot paper presentation FINAL EDIT by kiran.pptx
KiranKumar139571
 
Lajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ginni Singh Top Model Safe
Lajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ginni Singh Top Model SafeLajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ginni Singh Top Model Safe
Lajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ginni Singh Top Model Safe
khansayyad1256
 
Vasant Kunj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ruhi Singla Top Model Safe
Vasant Kunj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ruhi Singla Top Model SafeVasant Kunj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ruhi Singla Top Model Safe
Vasant Kunj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ruhi Singla Top Model Safe
nikita dubey$A17
 
RK Puram @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model Safe
RK Puram @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model SafeRK Puram @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model Safe
RK Puram @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model Safe
Alisha Pathan $A17
 
Karol Bagh @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model Safe
Karol Bagh @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model SafeKarol Bagh @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model Safe
Karol Bagh @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model Safe
bookmybebe1
 
Sin Involves More Than You Might Think (We'll Explain)
Sin Involves More Than You Might Think (We'll Explain)Sin Involves More Than You Might Think (We'll Explain)
Sin Involves More Than You Might Think (We'll Explain)
sapna sharmap11
 
Pitampura @ℂall @Girls ꧁❤ 9873777170 ❤꧂Fabulous sonam Mehra Top Model Safe
Pitampura @ℂall @Girls ꧁❤ 9873777170 ❤꧂Fabulous sonam Mehra Top Model SafePitampura @ℂall @Girls ꧁❤ 9873777170 ❤꧂Fabulous sonam Mehra Top Model Safe
Pitampura @ℂall @Girls ꧁❤ 9873777170 ❤꧂Fabulous sonam Mehra Top Model Safe
vasudha malikmonii$A17
 
[D3T1S02] Aurora Limitless Database Introduction
[D3T1S02] Aurora Limitless Database Introduction[D3T1S02] Aurora Limitless Database Introduction
[D3T1S02] Aurora Limitless Database Introduction
Amazon Web Services Korea
 
Laxmi Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Laxmi Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model SafeLaxmi Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Laxmi Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
yogita singh$A17
 
How We Added Replication to QuestDB - JonTheBeach
How We Added Replication to QuestDB - JonTheBeachHow We Added Replication to QuestDB - JonTheBeach
How We Added Replication to QuestDB - JonTheBeach
javier ramirez
 
Greater Kailash @ℂall @Girls ꧁❤ 9873777170 ❤꧂Glamorous sonam Mehra Top Model ...
Greater Kailash @ℂall @Girls ꧁❤ 9873777170 ❤꧂Glamorous sonam Mehra Top Model ...Greater Kailash @ℂall @Girls ꧁❤ 9873777170 ❤꧂Glamorous sonam Mehra Top Model ...
Greater Kailash @ℂall @Girls ꧁❤ 9873777170 ❤꧂Glamorous sonam Mehra Top Model ...
shoeb2926
 
[D3T1S03] Amazon DynamoDB design puzzlers
[D3T1S03] Amazon DynamoDB design puzzlers[D3T1S03] Amazon DynamoDB design puzzlers
[D3T1S03] Amazon DynamoDB design puzzlers
Amazon Web Services Korea
 
NPS_Presentation_V3.pptx it is regarding National pension scheme
NPS_Presentation_V3.pptx it is regarding National pension schemeNPS_Presentation_V3.pptx it is regarding National pension scheme
NPS_Presentation_V3.pptx it is regarding National pension scheme
ASISHSABAT3
 
Supervised Learning (Data Science).pptx
Supervised Learning  (Data Science).pptxSupervised Learning  (Data Science).pptx
Supervised Learning (Data Science).pptx
TARIKU ENDALE
 
Nehru Place @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model Safe
Nehru Place @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model SafeNehru Place @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model Safe
Nehru Place @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model Safe
butwhat24
 
BIGPPTTTTTTTTtttttttttttttttttttttt.pptx
BIGPPTTTTTTTTtttttttttttttttttttttt.pptxBIGPPTTTTTTTTtttttttttttttttttttttt.pptx
BIGPPTTTTTTTTtttttttttttttttttttttt.pptx
RajdeepPaul47
 
Maruti Wagon R on road price in Faridabad - CarDekho
Maruti Wagon R on road price in Faridabad - CarDekhoMaruti Wagon R on road price in Faridabad - CarDekho
Maruti Wagon R on road price in Faridabad - CarDekho
kamli sharma#S10
 
Simon Fraser University degree offer diploma Transcript
Simon Fraser University  degree offer diploma TranscriptSimon Fraser University  degree offer diploma Transcript
Simon Fraser University degree offer diploma Transcript
taqyea
 
Amul goes international: Desi dairy giant to launch fresh ...
Amul goes international: Desi dairy giant to launch fresh ...Amul goes international: Desi dairy giant to launch fresh ...
Amul goes international: Desi dairy giant to launch fresh ...
chetankumar9855
 

Recently uploaded (20)

Daryaganj @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model Safe
Daryaganj @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model SafeDaryaganj @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model Safe
Daryaganj @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model Safe
 
iot paper presentation FINAL EDIT by kiran.pptx
iot paper presentation FINAL EDIT by kiran.pptxiot paper presentation FINAL EDIT by kiran.pptx
iot paper presentation FINAL EDIT by kiran.pptx
 
Lajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ginni Singh Top Model Safe
Lajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ginni Singh Top Model SafeLajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ginni Singh Top Model Safe
Lajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ginni Singh Top Model Safe
 
Vasant Kunj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ruhi Singla Top Model Safe
Vasant Kunj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ruhi Singla Top Model SafeVasant Kunj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ruhi Singla Top Model Safe
Vasant Kunj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Ruhi Singla Top Model Safe
 
RK Puram @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model Safe
RK Puram @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model SafeRK Puram @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model Safe
RK Puram @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model Safe
 
Karol Bagh @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model Safe
Karol Bagh @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model SafeKarol Bagh @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model Safe
Karol Bagh @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model Safe
 
Sin Involves More Than You Might Think (We'll Explain)
Sin Involves More Than You Might Think (We'll Explain)Sin Involves More Than You Might Think (We'll Explain)
Sin Involves More Than You Might Think (We'll Explain)
 
Pitampura @ℂall @Girls ꧁❤ 9873777170 ❤꧂Fabulous sonam Mehra Top Model Safe
Pitampura @ℂall @Girls ꧁❤ 9873777170 ❤꧂Fabulous sonam Mehra Top Model SafePitampura @ℂall @Girls ꧁❤ 9873777170 ❤꧂Fabulous sonam Mehra Top Model Safe
Pitampura @ℂall @Girls ꧁❤ 9873777170 ❤꧂Fabulous sonam Mehra Top Model Safe
 
[D3T1S02] Aurora Limitless Database Introduction
[D3T1S02] Aurora Limitless Database Introduction[D3T1S02] Aurora Limitless Database Introduction
[D3T1S02] Aurora Limitless Database Introduction
 
Laxmi Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Laxmi Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model SafeLaxmi Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Laxmi Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
 
How We Added Replication to QuestDB - JonTheBeach
How We Added Replication to QuestDB - JonTheBeachHow We Added Replication to QuestDB - JonTheBeach
How We Added Replication to QuestDB - JonTheBeach
 
Greater Kailash @ℂall @Girls ꧁❤ 9873777170 ❤꧂Glamorous sonam Mehra Top Model ...
Greater Kailash @ℂall @Girls ꧁❤ 9873777170 ❤꧂Glamorous sonam Mehra Top Model ...Greater Kailash @ℂall @Girls ꧁❤ 9873777170 ❤꧂Glamorous sonam Mehra Top Model ...
Greater Kailash @ℂall @Girls ꧁❤ 9873777170 ❤꧂Glamorous sonam Mehra Top Model ...
 
[D3T1S03] Amazon DynamoDB design puzzlers
[D3T1S03] Amazon DynamoDB design puzzlers[D3T1S03] Amazon DynamoDB design puzzlers
[D3T1S03] Amazon DynamoDB design puzzlers
 
NPS_Presentation_V3.pptx it is regarding National pension scheme
NPS_Presentation_V3.pptx it is regarding National pension schemeNPS_Presentation_V3.pptx it is regarding National pension scheme
NPS_Presentation_V3.pptx it is regarding National pension scheme
 
Supervised Learning (Data Science).pptx
Supervised Learning  (Data Science).pptxSupervised Learning  (Data Science).pptx
Supervised Learning (Data Science).pptx
 
Nehru Place @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model Safe
Nehru Place @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model SafeNehru Place @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model Safe
Nehru Place @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model Safe
 
BIGPPTTTTTTTTtttttttttttttttttttttt.pptx
BIGPPTTTTTTTTtttttttttttttttttttttt.pptxBIGPPTTTTTTTTtttttttttttttttttttttt.pptx
BIGPPTTTTTTTTtttttttttttttttttttttt.pptx
 
Maruti Wagon R on road price in Faridabad - CarDekho
Maruti Wagon R on road price in Faridabad - CarDekhoMaruti Wagon R on road price in Faridabad - CarDekho
Maruti Wagon R on road price in Faridabad - CarDekho
 
Simon Fraser University degree offer diploma Transcript
Simon Fraser University  degree offer diploma TranscriptSimon Fraser University  degree offer diploma Transcript
Simon Fraser University degree offer diploma Transcript
 
Amul goes international: Desi dairy giant to launch fresh ...
Amul goes international: Desi dairy giant to launch fresh ...Amul goes international: Desi dairy giant to launch fresh ...
Amul goes international: Desi dairy giant to launch fresh ...
 

Cisco 2018, Annual Cybersecurity Report

  • 2. 2 Cisco 2018 Annual Cybersecurity Report | Table of contents Table of contents Executive summary........................................... 3 Part I: The attack landscape............................. 6 The evolution of malware .....................................................6 Encrypted malicious web traffic ............................................9 Email threats .......................................................................14 Sandbox evasion tactics .....................................................22 Abuse of cloud services and other legitimate resources...................................................24 IoT and DDoS attacks..........................................................31 Vulnerabilities and patching ................................................38 Part II: The defender landscape...................... 46 The cost of attacks .............................................................46 Challenges and obstacles ..................................................47 Complexity created by vendors in orchestration ..................................................................48 Impact: Public scrutiny from breaches, higher risk of losses ...........................................50 Services: Addressing people and policies, as well as technology..........................................................53 Expectations: Investing in technology and training ......................................................54 Conclusion....................................................... 57 About Cisco..................................................... 60 Appendix.......................................................... 65
  • 3. 3 Cisco 2018 Annual Cybersecurity Report | Executive summary Executive summary What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Many clues are out there—and obvious. Adversaries and nation-state actors already have the expertise and tools necessary to take down critical infrastructure and systems and cripple entire regions. But when news surfaces about disruptive and destructive cyber attacks—such as those in Ukraine, for example, or elsewhere in the world—some security professionals might initially think, “Our company’s market/region/technology environment wasn’t a target, so, we’re probably not at risk.” However, by dismissing what seem like distant campaigns, or allowing the chaos of daily skirmishes with attackers to consume their attention, defenders fail to recognize the speed and scale at which adversaries are amassing and refining their cyber weaponry. For years, Cisco has been warning defenders about escalating cybercriminal activity around the globe. In this, our latest annual cybersecurity report, we present data and analysis from Cisco threat researchers and several of our technology partners about attacker behavior observed over the past 12 to 18 months. Many of the topics examined in the report align with three general themes: 1. Adversaries are taking malware to unprecedented levels of sophistication and impact. The evolution of malware (page 6) was one of the most significant developments in the attack landscape in 2017. The advent of network-based ransomware cryptoworms eliminates the need for the human element in launching ransomware campaigns. And for some adversaries, the prize isn’t ransom, but obliteration of systems and data, as Nyetya—wiper malware masquerading as ransomware— proved (see page 6). Self-propagating malware is dangerous and has the potential to take down the Internet, according to Cisco threat researchers. 2. Adversaries are becoming more adept at evasion— and weaponizing cloud services and other technology used for legitimate purposes. In addition to developing threats that can elude increasingly sophisticated sandboxing environments (page 22), malicious actors are widening their embrace of encryption to evade detection (page 9). Encryption is meant to enhance security, but it also provides malicious actors with a powerful tool to conceal command-and- control (C2) activity, affording them more time to operate and inflict damage. Cybercriminals are also adopting C2 channels that rely on legitimate Internet services like Google, Dropbox, and GitHub (see page 24). The practice makes malware traffic almost impossible to identify. Also, many attackers are now launching multiple campaigns from a single domain (page 26) to get the best return on their investments. They are also reusing infrastructure resources, such as registrant email addresses, autonomous system numbers (ASNs), and nameservers. 3. Adversaries are exploiting undefended gaps in security, many of which stem from the expanding Internet of Things (IoT) and use of cloud services. Defenders are deploying IoT devices at a rapid pace but often pay scant attention to the security of these systems. Unpatched and unmonitored IoT devices present attackers with opportunities to infiltrate networks (page 34). Organizations with IoT devices susceptible to attack also seem unmotivated to speed remediation, research suggests (page 42). Worse, these organizations probably have many more vulnerable IoT devices in their IT environments that they don’t even know about.
  • 4. 4 Cisco 2018 Annual Cybersecurity Report | Executive summary Meanwhile, IoT botnets are expanding along with the IoT and becoming more mature and automated. As they grow, attackers are using them to launch more advanced distributed-denial-of-service (DDoS) attacks (page 31). Attackers are also taking advantage of the fact that security teams are having difficulty defending both IoT and cloud environments. One reason is the lack of clarity around who exactly is responsible for protecting those environments (see page 42). Recommendations for defenders When adversaries inevitably strike their organizations, will defenders be prepared, and how quickly can they recover? Findings from the Cisco 2018 Security Capabilities Benchmark Study—which offers insights on security practices from more than 3600 respondents across 26 countries—show that defenders have a lot of challenges to overcome (see page 46). Even so, defenders will find that making strategic security improvements and adhering to common best practices can reduce exposure to emerging risks, slow attackers’ progress, and provide more visibility into the threat landscape. They should consider: •• Implementing first-line-of-defense tools that can scale, like cloud security platforms. •• Confirming that they adhere to corporate policies and practices for application, system, and appliance patching. •• Employing network segmentation to help reduce outbreak exposures. •• Adopting next-generation endpoint process monitoring tools. •• Accessing timely, accurate threat intelligence data and processes that allow for that data to be incorporated into security monitoring and eventing. •• Performing deeper and more advanced analytics. •• Reviewing and practicing security response procedures. •• Backing up data often and testing restoration procedures—processes that are critical in a world of fast-moving, network-based ransomware worms and destructive cyber weapons. •• Reviewing third-party efficacy testing of security technologies to help reduce the risk of supply chain attacks. •• Conducting security scanning of microservice, cloud service, and application administration systems. •• Reviewing security systems and exploring the use of SSL analytics—and, if possible, SSL decryption. Defenders should also consider adopting advanced security technologies that include machine learning and artificial intelligence capabilities. With malware hiding its communication inside of encrypted web traffic, and rogue insiders sending sensitive data through corporate cloud systems, security teams need effective tools to prevent or detect the use of encryption for concealing malicious activity. About the report The Cisco 2018 Annual Cybersecurity Report presents our latest security industry advances designed to help organizations and users defend against attacks. We also look at the techniques and strategies that adversaries use to break through those defenses and evade detection. The report also highlights major findings from the Cisco 2018 Security Capabilities Benchmark Study, which examines the security posture of enterprises and their perceptions of their preparedness to defend against attacks.
  • 5. Part I: The attack landscape
  • 6. 6 Cisco 2018 Annual Cybersecurity Report | The attack landscape Part I: The attack landscape Adversaries are taking malware to unprecedented levels of sophistication and impact. The growing number and variety of malware types and families perpetuate chaos in the attack landscape by undermining defenders’ efforts to gain and hold ground on threats. THE EVOLUTION OF MALWARE One of the most important developments in the attack landscape in 2017 was the evolution of ransomware. The advent of network-based ransomware worms eliminates the need for the human element in launching ransomware campaigns. And for some adversaries, the prize isn’t ransom, but the destruction of systems and data. We expect to see more of this activity in the year ahead. They’re out there: Defenders should prepare to face new, self-propagating, network-based threats in 2018 1 SamSam: The Doctor Will See You, After He Pays the Ransom, Cisco Talos blog, March 2016: blog.talosintelligence.com/2016/03/samsam-ransomware.html. 2 Player 3 Has Entered the Game: Say Hello to ‘WannaCry,’ Cisco Talos blog, May 2017: blog.talosintelligence.com/2017/05/wannacry.html. 3 New Ransomware Variant ‘Nyetya’ Compromises Systems Worldwide, Cisco Talos blog, June 2017: blog.talosintelligence.com/2017/06/worldwide-ransomware-variant.html. In 2017, adversaries took ransomware to a new level— although it had been expected. After the SamSam campaign of March 20161 —the first large-scale attack that used the network vector to spread ransomware, thereby removing the user from the infection process—Cisco threat researchers knew it would only be a matter of time before threat actors found a way to automate this technique. Attackers would make their malware even more potent by combining it with “worm-like” functionality to cause widespread damage. This malware evolution was swift. In May 2017, WannaCry— a ransomware cryptoworm—emerged and spread like wildfire across the Internet.2 To propagate, it took advantage of a Microsoft Windows security vulnerability called EternalBlue, which was leaked by the hacker group Shadow Brokers in mid-April 2017. WannaCry had earned more than US$143,000 through bitcoin payments at the point the wallets were cashed out. Given the timeline, and calculating accrual of the value on the bitcoin originally paid into the wallets at $93,531, Cisco threat researchers estimate that roughly 312 ransom payments were made. As a comparison, the exploit kit Angler, when it was active, was earning about $100 million per year as a global business. WannaCry did not track encrypted damage to and the payments made by affected users. The number of users who received decryption keys after making a payment is also unknown. (WannaCry is still propagating, and users continue to pay ransoms—in vain.) Due to the very low performance of WannaCry as ransomware, the U.S. government and many security researchers believe the ransom component is effectively a smokescreen to conceal WannaCry’s true purpose: wiping data. Nyetya (also known as NotPetya) arrived in June 2017.3 This wiper malware also masqueraded as ransomware and it too used the remote code execution vulnerability nicknamed “EternalBlue,” as well as the remote code execution vulnerability “EternalRomance” (also leaked by Shadow Brokers), and other vectors involving credential harvesting
  • 7. 7 Cisco 2018 Annual Cybersecurity Report | The attack landscape unrelated to the Shadow Brokers release.4 Nyetya was deployed through software update systems for a tax software package used by more than 80 percent of companies in the Ukraine, and installed on more than 1 million computers.5 Ukraine cyber police confirmed that it affected more than 2000 Ukrainian companies.6 Before the rise of self-propagating ransomware, malware was distributed in three ways: drive-by download, email, or physical media such as malicious USB memory devices. All methods required some type of human interaction to infect a device or system with ransomware. With these new vectors being employed by attackers, an active and unpatched workstation is all that is needed to launch a network-based ransomware campaign. Security professionals may see worms as an “old” type of threat because the number of worm-like Common Vulnerabilities and Exposures (CVEs) has declined as product security baselines have improved. However, self-propagating malware not only is a relevant threat, but also has the potential to bring down the Internet, according to Cisco threat researchers. WannaCry and Nyetya are only a taste of what’s to come, so defenders should prepare. WannaCry and Nyetya could have been prevented, or their impact muted, if more organizations had applied basic security best practices such as patching vulnerabilities, establishing appropriate processes and policies for incident response, and employing network segmentation. For more tips on meeting the threat of automated network- based ransomware worms, read Back to Basics: Worm Defense in the Ransomware Age on the Cisco Talos blog. 4 Ibid. 5 Ukraine scrambles to contain new cyber threat after ‘NotPetya’ attack, by Jack Stubbs and Matthias Williams, Reuters, July 2017: reuters.com/article/us-cyber-attack-ukraine-backdoor/ukraine-scrambles-to-contain-new-cyber-threat-after-notpetya-attack-idUSKBN19Q14P. 6 The MeDoc Connection, Cisco Talos blog, July 2017: blog.talosintelligence.com/2017/07/the-medoc-connection.html. 7 CCleaner Command and Control Causes Concern, Cisco Talos blog, September 2017: blog.talosintelligence.com/2017/09/ccleaner-c2-concern.html. Security weak spot: the supply chain The Nyetya campaign was also a supply chain attack, one of many that Cisco threat researchers observed in 2017. One reason Nyetya was successful at infecting so many machines so quickly is that users did not see an automated software update as a security risk, or in some cases even realize that they were receiving the malicious updates. Another supply chain attack, which occurred in September 2017, involved the download servers used by a software vendor to distribute a legitimate software package known as CCleaner.7 CCleaner’s binaries, which contained a Trojan backdoor, were signed using a valid certificate, giving users false confidence that the software they were using was secure. The actors behind this campaign were targeting major technology companies where the software was in use, either legitimately or as part of shadow IT. Supply chain attacks appear to be increasing in velocity and complexity. They can impact computers on a massive scale, and can persist for months or even years. Defenders should be aware of the potential risk of using software or hardware from organizations that do not have a responsible security posture. Look for vendors that issue CVEs, are quick to address vulnerabilities, and consistently strive to ensure that their build systems can’t be compromised. Also, users should take time to scan new software before downloading it to verify that it doesn’t contain malware. Network segmentation of software that is not backed by a comprehensive security practice can help contain damage from supply chain attacks, preventing them from spreading throughout an organization.
  • 8. 8 Cisco 2018 Annual Cybersecurity Report | The attack landscape Why integrity in threat intelligence reporting matters All organizations that share threat information to customers or the public through any channel should employ guidelines that help them ensure accuracy in their reporting. Even if all the facts aren’t clear, organizations can still communicate what they know—and avoid guessing. Being right is better than being first. For example, when the WannaCry attack unfolded in May 2017, there was initial confusion within the security community about how the ransomware worm was infiltrating systems. Multiple organizations in both the public and private sector were reporting that the attack stemmed from a phishing campaign and malicious email attachment. But the network-based threat was, in fact, scanning for and infecting vulnerable, public-facing Microsoft Windows Server Message Block (SMB) Server ports. Cisco threat researchers quickly alerted the security community that the emails they thought were connected to the WannaCry campaign were likely spam emails from the Necurs bot that were spreading “Jaff” ransomware. It was several days before the security community was in agreement that the suspicious emails contained Jaff—not WannaCry. And during that time, users were acting on information that could not help them to avoid the fast-moving WannaCry campaign. The chaos following the advent of the WannaCry campaign serves as a reminder that the security community must avoid communicating inaccurate facts about the origin and nature of cyber attacks. In the early hours of a campaign, the sense of urgency to quickly stop adversaries and protect users can easily result in the publishing—especially on social media—of information that may create confusion and prevent users from defending their systems. For more on this topic, read the post On Conveying Doubt on the Cisco Talos blog.
  • 9. 9 Cisco 2018 Annual Cybersecurity Report | The attack landscape ENCRYPTED MALICIOUS WEB TRAFFIC The expanding volume of encrypted web traffic—both legitimate and malicious—creates even more challenges and confusion for defenders trying to identify and monitor potential threats. Encryption is meant to enhance security, but it also provides malicious actors with a powerful tool to conceal command-and-control (C2) activity, affording them more time to operate and inflict damage. Cisco threat researchers expect to see adversaries increase their use of encryption in 2018. To keep pace, defenders will need to incorporate more automation and advanced tools like machine learning and artificial intelligence to complement threat prevention, detection, and remediation. A dark spot for defenders: encrypted malicious web traffic Cisco threat researchers report that 50 percent of global web traffic was encrypted as of October 2017. That is a 12-point increase in volume from November 2016 (see Figure 1). One factor driving that increase is the availability of low-cost or free SSL certificates. Another is Google Chrome’s stepped- up practice of flagging unencrypted websites that handle sensitive information, like customers’ credit card information, as “non-secure.” Businesses are motivated to comply with Google’s HTTPS encryption requirement unless they want to risk a potentially significant drop in their Google search page rankings. As the volume of encrypted global web traffic grows, adversaries appear to be widening their embrace of encryption as a tool for concealing their C2 activity. Cisco threat researchers observed a more than threefold increase in encrypted network communication used by inspected malware samples over a 12-month period (see Figure 2). Our analysis of more than 400,000 malicious binaries found that about 70 percent had used at least some encryption as of October 2017. Figure 1 Increase in volume of encrypted global web traffic HTTPS 38% 50% 12-Point Increase in Global Web Traffic from November 2016-October 2017 Figure 1 Increase in volume of encrypted global web traffic, November 2016-October 2017 Source: Cisco Security Research Figure 2 Increase in volume of malicious binaries leveraging some encrypted network communication 0 10 20 30 40 50 60 70 80 Nov Dec Jan Feb Mar Apr May Jun Jul Oct Aug Sep Figure 2 Increase in volume of malicious binaries leveraging some encrypted network communication 2016 2017 Source: Cisco Security Research PercentofSamplesUsingEncryption Download the 2018 graphics at: cisco.com/go/acr2018graphics
  • 10. 10 Cisco 2018 Annual Cybersecurity Report | The attack landscape Applying machine learning to the threat spectrum To overcome the lack of visibility that encryption creates, and reduce adversaries’ time to operate, we see more enterprises exploring the use of machine learning and artificial intelligence. These advanced capabilities can enhance network security defenses and, over time, “learn” how to automatically detect unusual patterns in web traffic that might indicate malicious activity. Machine learning is useful for automatically detecting “known-known” threats—the types of infections that have been seen before (see Figure 3). But its real value, especially in monitoring encrypted web traffic, stems from its ability to detect “known-unknown” threats (previously unseen variations of known threats, malware subfamilies, or related new threats) and “unknown-unknown” (net-new malware) threats. The technology can learn to identify unusual patterns in large volumes of encrypted web traffic and automatically alert security teams to the need for further investigation. That latter point is especially important, given that the lack of trained personnel is an obstacle to enhancing security defenses in many organizations, as seen in findings from the Cisco 2018 Security Capabilities Benchmark Study (see page 35). Automation and intelligent tools like machine learning and artificial intelligence can help defenders overcome skills and resource gaps, making them more effective at identifying and responding to both known and emerging threats. Figure 3 Machine learning in network security: taxonomy Figure 3 Machine Learning in Network Security: Taxonomy WhatItDoesExamplesTechniqueProperties Technique Trade-Off Threat Type vs. Suitable Detection Technique Detect the exactly known infection, as seen before Detect zero-days, unrelated to any known malware Known-Known Detect previously unseen variations of known threats, subfamilies or related new threats Known-Unknown Unknown-Unknown Static Signatures Dynamic Signatures Behavioral Signatures High-Level Patterns Unsupervised Anomalies Source: Cisco Security Research Very high precision Very high precision High precision Good precision Low precision No generalization Recall limited to the exact same cases Generalization limited Recall limited to predefined pattern; finds variations explicitly covered by the pattern Generalization based on similarity to known malware Ideal for finding previously unseen variations/subfamilies of known infections Generalization based on common suspicious behaviors High recall, good chance to find true zero-days, at the cost of more false alarms Generalization based on unusual behaviors Best chance to find true zero-days; highest risk of false alarms Manual definition, possibly tooling-assisted Exact matching of predefined character or numeric sequences Definitions human-readable Manual definition, possibly tooling-assisted Matching of predefined rules (for example, regex) Definitions human-readable Applicable through supervised machine-learning Matching of machine-learned rules or recognition of machine- learned behavioral patterns in transformed feature space Task for semi-supervised machine learning Very high-level patterns, machine-learned to distinguish generic behavior Unsupervised machine learning Cases significantly distant to all known normal behavior, where the model of known behavior is machine-learned Distance measures can be highly abstract Concrete malicious domain name associated to trojan Houdini RAT telemetry pattern Two illustrative found instances Generic characteristics of suspicious traffic Expected vs. unexplained and unexpected Good explainability Good explainability Good explainability but more complex Explainability limited Findings may be difficult to attribute to known infections Explainability difficult Findings may be difficult to attribute to known infections Does not scale Does not scale well Scales somewhat well Scales well Scales well Requires manual definition Requires manual definition Learned (semi)auto from data Learned (semi)auto from data Learned auto from data Not applicable to encrypted data without MiTM Not applicable to encrypted data without MiTM Applicable to encrypted data without decryption Applicable to encrypted data without decryption Applicable to encrypted data without decryption Better Precision and Explainability, Simplicity of Proof Better Recall, Scalability, Applicability to Encrypted Data, Ability to Detect Zero-Days Please note: scaling statements refer to human time required to maintain detection system Please note: this diagram represents a simplified illustration of machine learning capabilities in security Download the 2018 graphics at: cisco.com/go/acr2018graphics
  • 11. 11 Cisco 2018 Annual Cybersecurity Report | The attack landscape Cisco 2018 Security Capabilities Benchmark Study: Defenders report greater reliance on automation and artificial intelligence Chief information security officers (CISOs) interviewed for the Cisco 2018 Security Capabilities Benchmark Study report that they are eager to add tools that use artificial intelligence and machine learning, and believe their security infrastructure is growing in sophistication and intelligence. However, they are also frustrated by the number of false positives such systems generate, since false positives increase the security team’s workload. These concerns should ease over time as machine learning and artificial intelligence technologies mature and learn what is “normal” activity in the network environments they are monitoring. When asked which automated technologies their organizations rely on the most, 39 percent of security professionals said they are completely reliant on automation, while 34 percent are completely reliant on machine learning; 32 percent said they are completely reliant on artificial intelligence (Figure 4). Behavior analytics tools are also considered useful when locating malicious actors in networks; 92 percent of security professionals said these tools work very to extremely well (Figure 5). Figure 4 Organizations rely heavily on automation, machine learning, and artificial intelligence Source: Cisco 2018 Security Capabilities Benchmark Study Automation Machine Learning Artificial Intelligence Not at All Reliant Completely Reliant 44% 39% 83% %Top 2-Box 77% 73% 43% 41% 32% 34% 14% 18% 18%3% 2% 4% 2%1% 6% Figure 4 Organizations rely heavily on automation, machine learning, and artificial intelligence User and Entity Behavior 48% 44% 7% 1% Not at All Well Slightly Well Somewhat Well Very Well Extremely Well (n=3617) 92% 38-39% Very to Extremely Well 2/3 of Healthcare Organizations Believe That Behavioral Analytics/Forensics Help Identify Malicious Actors Fewer in Transportation and Government Agree That Behavioral Analytics/Forensics Work Extremely Well Extremely Well 69% (n=358) (Transportation: n=175; Government: n=639) Extremely Well Figure 5 Most security professionals see value in behavioral analytics tools Source: Cisco 2018 Security Capabilities Benchmark Study Figure 5 Most security professionals see value in behavioral analytics tools Download the 2018 graphics at: cisco.com/go/acr2018graphics
  • 12. 12 Cisco 2018 Annual Cybersecurity Report | The attack landscape Figure 6 Malware-based block activity by content type, April 2016 – October 2017 Apr May Jun Jul Aug Sep Oct Dec Nov Jan Feb Mar Apr May Jun Jul Aug Sep Oct 0 10 20 30 40 50 60 70 80 90 100 Percentage All Other File TypesExecutableHTML Plain Text 2016 2017 Figure 6 Malware-based block activity by content type, April 2016-October 2017 Source: Cisco Security Research Web attack methods show adversaries’ intense focus on browser compromise An analysis of web attack methods over an 18-month period from April 2016 to October 2017 shows an increase in adversaries’ use of malicious web content (Figure 6). That trend aligns with the aggressive targeting of the Microsoft Internet Explorer web browser by still-active exploit kits. Cisco threat researchers observed that the number of detections of malicious JavaScript web content was significant and consistent during this period. That underscores the effectiveness of this strategy for infecting vulnerable browsers to facilitate other nefarious activity such as browser redirection or Trojan downloads.
  • 13. 13 Cisco 2018 Annual Cybersecurity Report | The attack landscape Figure 7 is an overview of web attack methods over a three- year period, from October 2014 to October 2017. Adversaries consistently employed suspicious binaries during this period, primarily to deliver adware and spyware. As discussed in the Cisco 2017 Midyear Cybersecurity Report, these types of potentially unwanted applications (PUAs) can present security 8 Cisco 2017 Midyear Cybersecurity Report: cisco.com/c/m/en_au/products/security/offers/cybersecurity-reports.html. risks, such as increased malware infections and theft of user or company information.8 The three-year view in Figure 7 also shows that the volume of malicious web content fluctuates over time as attackers launch and end campaigns and change their tactics to evade detection.Apr Jul Oct Oct Apr Jul Oct Jan Apr Jul Jan Jan 2014 2015 2016 2017 Oct 0 10 20 30 40 50 60 70 80 90 100 Percentage All Other File TypesBinary APKJavaScript HTML Figure 7 Malware-based block activity by content type, 2014–2017 Source: Cisco Security Research Figure 7 Malware-based block activity by content type, October 2014 – October 2017 Download the 2018 graphics at: cisco.com/go/acr2018graphics
  • 14. 14 Cisco 2018 Annual Cybersecurity Report | The attack landscape EMAIL THREATS No matter how much the threat landscape changes, malicious email and spam remain vital tools for adversaries to distribute malware because they take threats straight to the endpoint. By applying the right mix of social engineering techniques, such as phishing and malicious links and attachments, adversaries need only to sit back and wait for unsuspecting users to activate their exploits. Fluctuations in spam botnet activity impact overall volume 9 See "Decline in exploit kit activity likely influencing global spam trends," p. 18, Cisco 2017 Midyear Cybersecurity Report: cisco.com/c/m/en_au/products/security/offers/cybersecurity-reports.html. In late 2016, Cisco threat researchers observed a noticeable increase in spam campaign activity that appeared to coincide with a decline in exploit kit activity. When leading exploit kits like Angler abruptly disappeared from the market, many users of those kits turned—or returned—to the email vector to maintain profitability.9 However, after that initial rush back to email, global spam volume declined and leveled during most of the first half of 2017. Then, in late May and early June 2017, global spam volume dipped before spiking considerably during mid- to late summer (see Figure 8). Figure 8 IP reputation blocks by country, December 2016 – October 2017 US CN VN IN FR All Other Countries 0 1 2 3 4 5 Dec Jan Feb Mar Apr May Jun Jul Aug Sep Oct Percentage Figure 8 IP reputation blocks by country, December 2016–September 2017 Source: Cisco Security Research 2016 2017
  • 15. 15 Cisco 2018 Annual Cybersecurity Report | The attack landscape 0 2 4 6 8 10 12 14 16 18 20 22 24 Reports Sent Spam Submitted 2016 2017 Dec Nov Oct Jan Feb Mar Apr May Jun Jul Aug Sep Oct Figure 9 Spam botnet activity, October 2016–October 2017 Source: Cisco SpamCop Volume Figure 9 Spam botnet activity, October 2016 – October 2017 The reduced spam volume from January through April 2017 coincides with a lull in spam botnet activity, as an internal graph generated by the Cisco® SpamCop service shows (Figure 9). Cisco threat researchers report that the Necurs botnet, a major contributor to overall spam volume globally, was active but distributing less spam during the January to April time frame. In May, the botnet was spreading Jaff ransomware through massive spam campaigns. The campaigns featured 10 Jaff Ransomware: Player 2 Has Entered the Game, by Nick Biasini, Edmund Brumaghin, and Warren Mercer, with contributions from Colin Grady, Cisco Talos blog, May 2017: blog.talosintelligence.com/2017/05/jaff-ransomware.html. 11 Player 1 Limps Back Into the Ring—Hello Again, Locky! by Alex Chiu, Warren Mercer, and Jaeson Schultz, with contributions from Sean Baird and Matthew Molyett, Cisco Talos blog, June 2017: blog.talosintelligence.com/2017/06/necurs-locky-campaign.html. a PDF file with an embedded malicious Microsoft Office document, and the initial downloader for the Jaff ransomware.10 Security researchers discovered a vulnerability in Jaff that allowed them to create a decryptor that forced Necurs’ operators to make a quick return to distributing its usual threat, Locky ransomware.11 The time that the actors behind Necurs needed to pivot back to Locky coincides with the significant dip in global spam volume observed during the first two weeks of June (Figure 9). Download the 2018 graphics at: cisco.com/go/acr2018graphics
  • 16. 16 Cisco 2018 Annual Cybersecurity Report | The attack landscape Malicious file extensions in email: common malware families’ top 10 tools Cisco threat researchers analyzed email telemetry from January through September 2017 to identify the types of malicious file extensions in email documents that common malware families employed most often. The analysis yielded a top 10 list that shows the most prevalent group of malicious file extensions (38 percent) was Microsoft Office formats such as Word, PowerPoint, and Excel (see Figure 10). Archive files, such as .zip and .jar, accounted for about 37 percent of all the malicious file extensions observed in our study. That adversaries heavily employ archive files is not surprising, as they have long been favored hiding places for malware. Users must open archive files to see the contents—an important step in the infection chain for many threats. Malicious archive files also often find success in foiling automated analysis tools, especially when they contain threats that require user interaction for activation. Adversaries will also use obscure file types, such as .7z and .rar, to evade detection. Malicious PDF file extensions rounded out the top three in our analysis, accounting for nearly 14 percent of malicious file extensions observed. (Note: The category of “Other Extensions” applies to extensions observed in our study that could not be mapped easily to known file types. Some malware types are known to use random file extensions.) Figure 10 Top 10 malicious file extensions, January – September 2017Figure 10 Top 10 malicious file extensions, 2017 Source: Cisco Security Research 37% 1% 14% 38% 0% 0% 4% 0% 0% 6% Archive XML/ HTML/JS PDF Office Apple Android Binaries Scripts Image Other Ext.
  • 17. 17 Cisco 2018 Annual Cybersecurity Report | The attack landscape Figures 11a-c provide an overview of the malware families included in our investigation that were associated with the top three malicious file extension types: MS Office files, archives, and PDFs. Figure 12 shows the percentage of detections, by family, that included a malicious payload file extension. The spikes in activity align with spam campaigns observed during those months, according to Cisco threat researchers. For example, in late summer, there were major campaigns underway distributing Nemucod and Locky—two threats that often work together. Nemucod is known to send malicious payloads in archive files like .zip that contain malicious script but look like normal .doc files. (“Dwnldr,” also seen in Figure 12, is a likely variant of Nemucod.) PDF A, Dldr, Docdl Donoff, Fraud, Lg, Malphish, MSWord NemucodOther PDF Pdfphish,Pdfuri Urlmal, Figure 11b Top 3 malicious file extensions Jan Feb Mar Apr May Jun Jul Aug Sep Oct 2017 0 100 80 60 40 20 Percentage Source: Cisco Security Research Adnel, Dde, Dldr, Doc Docdl Donoff Locky Mdropper Ms, Other Rtf,Valyria,Vba, Word Figure 11a Top 3 malicious file extensions Jan Feb Mar Apr May Jun Jul Aug Sep Oct 2017 0 100 80 60 40 20 Percentage Source: Cisco Security Research Office Figure 12 Patterns of top malware families, January - October 2017 Jan Feb Mar Apr May Jun Jul Aug Sep Oct 0 20 40 60 80 100 All Other Malware FamiliesLocky Dwnldr DldrNemucod Figure 12 Patterns of malware families Source: Cisco Security Research PercentageofDetections 2017 Figure 11a Top three malicious file extension types and malware family relationships Figure 11b Top three malicious file extension types and malware family relationships Archive Adwind, Autoit, Dldr Donoff, Dwnldr Fareit, Kryptik, Locky, Msil, NemucodOther Upatre Vbkrypt Vbscrdlx Figure 11c Top 3 malicious file extensions Jan Feb Mar Apr May Jun Jul Aug Sep Oct 2017 0 100 80 60 40 20 Percentage Source: Cisco Security Research Figure 11c Top three malicious file extension types and malware family relationships
  • 18. 18 Cisco 2018 Annual Cybersecurity Report | The attack landscape MyWebSearch spyware most active user of “other extensions” The “other extensions” group in our study includes several well-known malware types. But MyWebSearch, a malicious adware software and browser hijacker that poses as a helpful toolbar, is the most active player (see Figure 13). It uses .exe file extensions exclusively, sometimes only one type per month. The potentially unwanted application (PUA) has been around for years and infects different browser types. It is often bundled with fraudulent software programs and can expose users to malvertising. Our analysis of malicious file extension types shows that even in today’s sophisticated and complex threat environment, email remains a vital channel for malware distribution. For enterprises, baseline defense strategies include: •• Implementing powerful and comprehensive email security defenses. •• Educating users about the threat of malicious attachments and links in phishing emails and spam. Figure 13 MyWebSearch most active user of “other extensions”Figure 13 MyWebSearch most active user of “other extensions" MyWebSearch QjwmonkeyOther Adwind, Cerber, Docdl, Donoff, Fareit, Fraud, Imali, Kryptik, Masrung, PDF, ValyriaJan Feb Mar Apr May Jun Jul Aug Sep Oct 2017 0 100 80 60 40 20 Percentage Source: Cisco Security Research
  • 19. 19 Cisco 2018 Annual Cybersecurity Report | The attack landscape Social engineering still a critical launchpad for email attacks 12 Massive Phishing Attack Targets Gmail Users, by Alex Johnson, NBC News, May 2017: nbcnews.com/tech/security/massive-phishing-attack-targets-millions-gmail-users-n754501. 13 Hackers target Irish energy networks amid fears of further cyber attacks on UK’s crucial infrastructure, by Lizzie Deardon, The Independent, July 2017: independent.co.uk/news/world/europe/cyber-attacks-uk-hackers-target-irish-energy-network-russia-putin-electricity-supply-board-nuclear-a7843086.html. Phishing and spear phishing are well-worn tactics for stealing users’ credentials and other sensitive information, and that’s because they are very effective. In fact, phishing and spear phishing emails were at the root of some of the biggest, headline-grabbing breaches in recent years. Two examples from 2017 include a widespread attack that targeted Gmail users12 and a hack of Irish energy systems.13 To gauge how prevalent phishing URLs and domains are on today’s Internet, Cisco threat researchers examined data from sources that investigate potentially “phishy” emails submitted by users through community-based, anti-phishing threat intelligence. Figure 14 shows the number of phishing URLs and phishing domains observed during the period from January to October 2017. The spikes seen in March and June can be attributed to two different campaigns. The first appeared to target users of a major telecom services provider. That campaign: •• Involved 59,651 URLs containing subdomains under aaaainfomation[dot]org. •• Had subdomains that contained random strings consisting of 50-62 letters. Each subdomain length (50-62) contained about 3500 URLs, which allowed for programmatic use of the subdomains (example: Cewekonuxykysowegulukozapojygepuqybyteqe johofopefogu[dot]aaaainfomation[dot]org). Adversaries used an inexpensive privacy service to register the domains observed in this campaign. Figure 14 Number of observed phishing URLs and domains by month Domains URLs Total Phishing URLs Total Phishing Domains 0 5K 10K 20K 30K 60K 80K 120K 100K Volume 2017 101,934 8445 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Figure 14 Number of observed phishing URLs and domains by month, 2017 Source: Cisco Security Research
  • 20. 20 Cisco 2018 Annual Cybersecurity Report | The attack landscape Figure 15 TLD distribution across known phishing sites .net, .br Percent of All Sites with TLDs (All Data) others .net, .org, .br .pl, .info, .in .au, .es, .ru others .org .top .ru, .info, .au, .in .es Percent of Sites with TLDs (Excluding Specific TLDs from Two Campaigns Targeting Tax Agency and Telecom) 54% 25% 4% 2% 1% 21% 19% 5% 1% 2% 3% .com .com 43% Figure 15 TLD distribution across known phishing sites Source: Cisco Security Research In the second campaign, which was most active in June, threat actors used the name of a legitimate tax agency in the United Kingdom to disguise their actions. They employed 12 top-level domains (TLDs). Eleven of the domains were URLs with six random six-character strings (example: jyzwyp[dot]top). And nine of the domains were associated with more than 1600 phishing sites each. Like the March campaign, adversaries registered the domains using a privacy service to conceal domain registration information. They registered all the domains over a two-day period. On the second day, nearly 19,000 URLs connected to the campaign were observed, and all were discovered within a five-hour window (for more on how quickly threat actors put newly registered domains to use, see “Malicious use of legitimate resources for backdoor C2,” on page 24). TLD distribution across known phishing sites Our analysis of phishing sites during the period from January to August 2017 found that threat actors were employing 326 unique TLDs for these activities, including .com, .org, .top (largely due to the United Kingdom taxing agency campaign), and country-specific TLDs (see Figure 15). Employing lesser- known TLDs can be advantageous for adversaries; these domains are typically inexpensive and often offer inexpensive privacy protection.
  • 21. 21 Cisco 2018 Annual Cybersecurity Report | The attack landscape Defenders should be vigilant in monitoring this “old” threat In 2017, tens of thousands of phishing attempts were reported monthly to the community-based, anti-phishing threat intelligence services included in our analysis. Some of the common tactics and tools adversaries use to execute phishing campaigns include: •• Domain squatting: Domains named to look like valid domains (example: cisc0[dot]com). •• Domain shadowing: Subdomains added under a valid domain without the owner’s knowledge (example: badstuff[dot]cisco[dot]com). •• Maliciously registered domains: A domain created to serve malicious purposes (example: viqpbe[dot]top). •• URL shorteners: A malicious URL disguised with a URL shortener (example: bitly[dot]com/random-string). Note: In the data we examined, Bitly.com was the URL-shortening tool adversaries used most. Malicious shortened URLs represented 2 percent of the phishing sites in our study. That number peaked to 3.1 percent in August. •• Subdomain services: A site created under a subdomain server (example: mybadpage[dot]000webhost[dot]com). Threat actors in the phishing and spear phishing game are continuously refining social engineering methods to trick users into clicking malicious links or visiting fraudulent web pages, and providing credentials or other types of high- value information. User training and accountability, and the application of email security technologies, remain crucial strategies for combatting these threats.
  • 22. 22 Cisco 2018 Annual Cybersecurity Report | The attack landscape SANDBOX EVASION TACTICS Adversaries are becoming adept at developing threats that can evade increasingly sophisticated sandboxing environments. When Cisco threat researchers analyzed malicious email attachments that were equipped with various sandbox evasion techniques, they discovered that the number of malicious samples using a particular sandbox evasion technique showed sharp peaks, and then quickly dropped. This is yet another example of how attackers are swift to ramp up the volume of attempts to break through defenses once they find an effective technique. Malware authors playing dirty tricks in defenders’ sandboxes In September 2017, Cisco threat researchers noted high volumes of samples where a malicious payload is delivered after a document is closed (Figure 16). In this case, the malware is triggered using the “document_close” event. The technique works because, in many cases, documents are not closed after the document has been opened and analyzed in the sandbox. Because the sandbox doesn’t explicitly close the document, the attachments are deemed safe by the sandbox, and will be delivered to the intended recipients. When a recipient opens the document attachment, and later closes the document, the malicious payload is delivered. Sandboxes that don’t properly detect actions on document close can be evaded using this technique. The use of the “document_close” event is a clever option for attackers. It takes advantage of the macro functionality built into Microsoft Office, as well as users’ tendency to open attachments that they believe are relevant to them. Once users realize the attachment is not relevant to them, they close the document, triggering the macros in which the malware is hidden. Figure 16 High volume of malicious Microsoft Word documents using “close function calls” observed in September 2017 0 5K 10K 15K 20K 25K 30K 35K 40K Malicious Samples Total Samples 2016 2017 Dec Nov Oct Jan Feb Mar Apr May Jun Jul Aug Sep Oct Figure 16 High volume of malicious Microsoft Word documents using “close function calls” observed in September 2017 Source: Cisco Security Research Volume
  • 23. 23 Cisco 2018 Annual Cybersecurity Report | The attack landscape The spikes in malicious samples using different sandbox evasion techniques point to malicious actors’ desire to follow a method that seems to work for them—or for other attackers. Also, if adversaries go to the trouble of creating malware and associated infrastructure, they want a return on their investments. If they determine that malware can slip through sandbox testing, they will, in turn, increase the number of attack attempts and affected users. Cisco researchers recommend using sandboxing that includes “content-aware” features to help ensure malware that uses the tactics described above does not evade sandbox analysis. For example, sandboxing technology should show awareness of the metadata features of the samples it is analyzing—such as determining whether the sample includes an action upon closing of the document. Some attackers evade sandboxing by disguising the type of document in which the malicious payload exists. As seen in Figure 17, we noted a significant attack in May 2017 that was built around malicious Word documents embedded within PDF documents. The documents might bypass sandboxes that simply detect and open the PDF, instead of also opening and analyzing the embedded Word document. The PDF document typically contained an enticement for the user to click and open the Word document, which would trigger the malicious behavior. Sandboxes that don’t open and analyze embedded documents within PDFs can be bypassed using this technique. After viewing the spike in malicious samples involving these PDFs, our threat researchers refined the sandbox environment to detect whether PDFs contained actions or enticements to open embedded Word documents. Figure 17 Large attack in May 2017 involved PDFs with malicious embedded Word documents Volume 2016 2017 Dec Nov Oct Jan Feb Mar Apr May Jun Jul Aug Sep Oct 10K 0 20K 30K 40K 50K 60K 70K 80K 90K Malicious Samples Total Samples “document_open” Figure 17 Attackers use PDFs with embedded Microsoft Word documents to evade sandboxing Source: Cisco Security Research
  • 24. 24 Cisco 2018 Annual Cybersecurity Report | The attack landscape ABUSE OF CLOUD SERVICES AND OTHER LEGITIMATE RESOURCES As applications, data, and identities move to the cloud, security teams must manage the risk involved with losing control of the traditional network perimeter. Attackers are taking advantage of the fact that security teams are having difficulty defending evolving and expanding cloud and IoT environments. One reason is the lack of clarity around who exactly is responsible for protecting those environments. To meet this challenge, enterprises may need to apply a combination of best practices, advanced security technologies like machine learning, and even some experimental methodologies, depending on the services they use for their business and how threats in this space evolve. Malicious use of legitimate resources for backdoor C2 14 Anomali defines a C2 schema as “the totality of IP addresses, domains, legitimate services, and all the remote systems that are part of the … communications architecture” of malware. When threat actors use legitimate services for command and control (C2), malware network traffic becomes nearly impossible for security teams to identify because it mimics the behavior of legitimate network traffic. Adversaries have a lot of Internet “noise” to use as cover because so many people today rely on services like Google Docs and Dropbox to do their work, regardless of whether these services are offered or systemically endorsed by their employers. Figure 18 shows several of the well-known legitimate services that researchers with Anomali, a Cisco partner and threat intelligence provider, have observed being used in malware backdoor C2 schemas14 in the last few years. (Note: These types of services face a dilemma in combatting abuse, as making it more difficult for users to set up accounts and use their services can adversely affect their ability to generate revenue.) Figure 18 Examples of legitimate services abused by malware for C2 Figure 18 Examples of legitimate services abused by malware for C2 Source: Anomali Google Docs Google Code Google Translate Google Apps Script Google Calendar Google Plus Gmail Blogger Live.com Hotmail.com Microsoft TechNet Microsoft Answers Microsoft Social OneDrive Yahoo Answers Babelfish Pastebin Amazon GitHub Twitter Dropbox
  • 25. 25 Cisco 2018 Annual Cybersecurity Report | The attack landscape According to Anomali’s research, advanced persistent threat (APT) actors and state-sponsored groups were among the first adversaries to use legitimate services for C2; however, the technique is now embraced by a broader range of sophisticated adversaries in the shadow economy. Using legitimate services for C2 appeals to malicious actors because it’s easy to: •• Register new accounts on these services. •• Set up a web page on the publicly accessible Internet. •• Usurp encryption for C2 protocols. (Instead of setting up C2 servers with encryption or building encryption into malware, attackers can simply adopt the SSL certificate of a legitimate service.) •• Adapt and transform resources on the fly. (Attackers can reuse implants across attacks without reusing DNS or IP addresses, for instance.) •• Reduce the likelihood of “burning” infrastructure. (Adversaries that use legitimate services for C2 don’t need to hard-code malware with IP addresses or domains. When their operation is complete, they can simply take down their legitimate services pages—and no one will ever know the IP addresses.) •• Attackers benefit from this technique because it allows them to reduce overhead and improve their return on investment. For defenders, adversaries’ use of legitimate services for C2 presents some significant challenges: Legitimate services are difficult to block Can organizations, from a mere business perspective, even consider blocking parts of legitimate Internet services like Twitter or Google? 15 For details on these experimental methodologies, and more information about how adversaries use legitimate services for C2, download the Anomali research paper, Rise of Legitimate Services for Backdoor Command and Control, available at: anomali.cdn.rackfoundry.net/files/anomali-labs-reports/legit-services.pdf. Legitimate services are often encrypted and innately difficult to inspect SSL decrypting is expensive and not always possible at enterprise scale. So, malware hides its communication inside of encrypted traffic, making it difficult, if not impossible, for security teams to identify malicious traffic. Use of legitimate services subverts domain and certificate intelligence, and complicates attribution Adversaries don’t need to register domains because the legitimate service account is considered the initial C2 address. Also, they’re not likely to continue registering SSL certificates or using self-signed SSL certificates for C2 schemas. Both trends obviously will have a negative impact on indicator feeds for reputation filtering and indicator blacklisting, which are based on newly generated and newly registered domains and the certificates and IP addresses connected to them. Detecting the use of legitimate services for C2 is difficult. However, Anomali’s threat researchers recommend that defenders consider applying some experimental methodologies. For example, defenders may identify malware using legitimate services for C2 by looking for: •• Non-browser, non-app connections to legitimate services •• Unique or low page response sizes from legitimate services •• High certificate exchange frequencies to legitimate services •• Bulk sandboxing samples for suspicious DNS calls to legitimate services All these unique behaviors merit further investigation of the source programs and processes.15
  • 26. 26 Cisco 2018 Annual Cybersecurity Report | The attack landscape Extracting optimal value from resources Cisco security researchers analyzed newly seen unique query names (domains) associated with DNS queries made over a seven-day period in August 2017. Note that “newly seen” in this discussion has no bearing on when a domain was created; it relates to when a domain was first “seen” by Cisco cloud security technology during the period of observation. The purpose of this research was to gain more insight into how often adversaries use, and reuse, registered-level domains (RLDs) in their attacks. Understanding threat actor behavior at the domain level can help defenders identify malicious domains, and related subdomains, that should be blocked with first-line-of-defense tools like cloud security platforms. So that our researchers could focus solely on the core group of unique RLDs—about 4 million in total—subdomains were stripped from the sample of newly seen domains. Only a small percentage of the RLDs in that sample was categorized as malicious. Of the RLDs that were malicious, more than half (about 58 percent) were reused, as Figure 19 shows. That finding suggests that, while most attackers build new domains for their campaigns, many are focused on trying to get the best return on their investments by launching multiple campaigns from a single domain. Domain registration can be costly, especially at the scale most attackers require to execute their campaigns and evade detection. One-fifth of malicious domains quickly put into use Adversaries may sit on domains for days, months, or even years after registering them, waiting for the right time to use them. However, Cisco threat researchers observed that a significant percentage of malicious domains—about 20 percent—were used in campaigns less than one week after they were registered (see Figure 20). Figure 19 Percent of new vs. reused domains ReusedNew 42.4% 57.6% Figure 19 Percentage of new vs. reused domains Source: Cisco Security Research Figure 20 RLD registration times Registered More Than a Week from First Seen Registered Less Than a Week from First Seen 19.5% 80.5% Figure 20 RLD registration times Source: Cisco Security Research
  • 27. 27 Cisco 2018 Annual Cybersecurity Report | The attack landscape Many new domains tied to malvertising campaigns Most malicious domains we analyzed were associated with spam campaigns—about 60 percent. Nearly one-fifth of the domains were connected to malvertising campaigns (see Figure 21). Malvertising has become an essential tool for directing users to exploit kits, including those that distribute ransomware. Well-worn, domain-related techniques for creating malvertising campaigns include domain shadowing. In this technique, attackers steal legitimate domain account credentials to create subdomains directed at malicious servers. Another tactic is the abuse of free, dynamic DNS services to generate malicious domains and subdomains. That allows threat actors to deliver malicious payloads from constantly changing hosting IPs, either infected users’ computers or compromised public websites. Domains reuse infrastructure resources The malicious RLDs in our sample also appeared to reuse infrastructure resources, such as registrant email addresses, IP addresses, autonomous system numbers (ASNs), and nameservers (see Figure 22). This is further evidence of adversaries trying to get the most value from their investments in new domains and preserve resources, according to our researchers. For example, an IP address can be used by more than one domain. So, an attacker laying the groundwork for a campaign might decide to invest in a few IP addresses and an array of domain names instead of servers, which cost more. Figure 21 Malicious categorizations Spam Malvertising Other 20.9% 19.6% 59.6% Figure 21 Malicious categorizations Source: Cisco Security Research Figure 22 Reuse of infrastructure by malicious RLDs Used Multiple Times Used Once 43.0% 57.0% W W WW W W 8.7% 32.2% 67.8% IP Reuse Registrant Reuse ASN Reuse Nameserver Reuse 10.6% 91.3% 89.4% Figure 22 Reuse of infrastructure by malicious RLDs Source: Cisco Security Research
  • 28. 28 Cisco 2018 Annual Cybersecurity Report | The attack landscape The resources that RLDs reuse give clues to whether the domain is likely to be malicious. For example, reuse of registrant emails or IP addresses occurs infrequently, so a pattern of reuse on either front suggests suspicious behavior. Defenders can have a high degree of confidence in blocking those domains, knowing that doing so probably will have no negative impact on business activity. Static blocking of ASNs and nameservers is not likely to be feasible in most cases. However, patterns of reuse by RLDs are worthy of further investigation to determine whether certain domains should be blocked. Using intelligent, first-line-of-defense cloud security tools to identify and analyze potentially malicious domains and subdomains can help security teams follow the trail of an attacker and answer questions, such as: •• What IP address does the domain resolve to? •• What ASN is associated with that IP address? •• Who registered the domain? •• What other domains are associated with that domain? The answers can help defenders not only refine security policies and block attacks, but also prevent users from connecting to malicious destinations on the Internet while they’re on the enterprise network. DevOps technologies at risk for ransomware attacks 16 After MongoDB, Ransomware Groups Hit Exposed Elasticsearch Clusters, by Lucian Constantin, IDG News Service, January 13, 2017: pcworld.com/article/3157417/security/after-mongodb-ransomware-groups-hit-exposed-elasticsearch-clusters.html. 2017 saw the emergence of DevOps ransomware attacks, beginning with a campaign in January that targeted open- source database platform, MongoDB.16 Attackers encrypted public MongoDB instances and demanded ransom payments for decryption keys and software. Soon after, they set their sights on compromising databases, such as CouchDB and Elasticsearch, with server-targeted ransomware. Rapid7 is a Cisco partner and provider of security data and analytics solutions. As Rapid7 researchers explained in our Cisco 2017 Midyear Cybersecurity Report, DevOps services are often deployed improperly, or left open intentionally for convenient access by legitimate users—leaving these services open for attack. Rapid7 performs regular Internet sweeps for DevOps technologies and catalogs both open instances and ransomed instances. Some of the DevOps services they encounter during their sweeps may contain personally identifiable information (PII), based on the names of the tables exposed to the Internet. To reduce their risk of exposure to DevOps ransomware attacks, organizations that use public Internet instances of DevOps technologies should: •• Develop solid standards for secure deployment of DevOps technologies •• Maintain active awareness of public infrastructure used by the company •• Keep DevOps technologies up to date and patched •• Conduct vulnerability scans For more details on Rapid7’s research, see “Don’t let DevOps technologies leave the business exposed,” in the Cisco 2017 Midyear Cybersecurity Report.
  • 29. 29 Cisco 2018 Annual Cybersecurity Report | The attack landscape Insider threats: Taking advantage of the cloud 17 Cisco 2017 Midyear Cybersecurity Report: cisco.com/c/m/en_au/products/security/offers/cybersecurity-reports.html. In previous security reports, we have discussed the value of OAuth permissions and super-user privileges to enforce who can enter networks, and how they can access data.17 To further examine the impact of user activity on security, Cisco threat researchers recently examined data exfiltration trends. They employed a machine-learning algorithm to profile 150,000 users in 34 countries, all using cloud service providers, from January to June 2017. The algorithm accounted for not only the volume of documents being downloaded, but also variables such as the time of day of downloads, IP addresses, and locations. After profiling users for six months, our researchers spent 1.5 months studying abnormalities. flagging 0.5 percent of users for suspicious downloads. That’s a small amount, but these users downloaded, in total, more than 3.9 million documents from corporate cloud systems, or an average of 5200 documents per user during the 1.5-month period. Of the suspicious downloads, 62 percent occurred outside of normal work hours; 40 percent took place on weekends. Cisco researchers also conducted a text-mining analysis on the titles of the 3.9 million suspiciously downloaded documents. One of the most popular keywords in the documents’ titles was “data.” The keywords most commonly appearing with the word “data” were “employee” and “customer.” Of the types of documents downloaded, 34 percent were PDFs and 31 percent were Microsoft Office documents (see Figure 23). Applying machine-learning algorithms offers a more nuanced view of cloud user activity beyond just the number of downloads. In our analysis, 23 percent of the users we studied were flagged more than three times for suspicious downloads, usually starting with small numbers of documents. The volume slowly increased each time, and eventually, these users showed sudden and significant spikes in downloads (Figure 24). Machine-learning algorithms hold the promise of providing greater visibility into the cloud and user behavior. If defenders can start predicting user behavior in terms of downloads, they can save the time it might take to investigate legitimate behavior. They can also step in to stop a potential attack or data-exfiltration incident before it happens. Figure 24 Machine-learning algorithms capture suspicious user download behavior 0 1K 2K 3K 4K 5K 6K 7K 8K May June Figure 24 Machine-learning algorithms capture user download behavior 2017 Suspicious ActivityUser Activity NumberofFilesDownloaded Source: Cisco Security Research Figure 23 Most commonly downloaded documents 31% Office 23% Media 4% Programming, Data, and Scripts (PD&S) 8% Others 34% PDFs Figure 23 Most commonly downloaded documents Source: Cisco Security Research
  • 30. 30 Cisco 2018 Annual Cybersecurity Report | The attack landscape Cisco 2018 Security Capabilities Benchmark Study: Security viewed as a key benefit of hosting networks in the cloud The use of on-premises and public cloud infrastructure is growing, according to the Cisco 2018 Security Capabilities Benchmark Study, although many organizations still host networks on-premises. In the 2017 study, 27 percent of security professionals said they are using off-premises private clouds, compared with 25 percent in 2016 and 20 percent in 2015 (Figure 25). Fifty-two percent said their networks are hosted on-premises as part of a private cloud. Of those organizations using the cloud, 36 percent host 25 to 49 percent of their infrastructure in the cloud, while 35 percent host 50 to 74 percent of their infrastructure in the cloud (Figure 26). Security is the most common benefit of hosting networks in the cloud, according to the security personnel respondents. Among them, 57 percent said they host networks in the cloud because of better data security; 48 percent, because of scalability; and 46 percent, because of ease of use (see Figure 27). Respondents also said that, as more infrastructure is moved to the cloud, they may look to invest in cloud access security brokers (CASBs) to add extra security to cloud environments. Figure 25 More organizations are using private clouds 2014 (n=1727), 2015 (n=2417), 2016 (n=2887), 2017 (n=3625) 50% Off-Premises Private Cloud On-Premises as Part of a Private Cloud 52% 50% 51% 18% 27% 25% 20% 2017 2016 2015 2014 Figure 25 More organizations are using private clouds Source: Cisco 2018 Security Capabilities Benchmark Study Figure 26 53% of organizations host at least 50% of infrastructure in the cloud Percent of Infrastructure Hosted in the Cloud Source: Cisco 2018 Security Capabilities Benchmark Study 35% 36% 11%18% 1-24% 25-49% 50-74% More Than 75% Figure 26 Fifty-three percent of organizations host at least half of infrastructure in the cloud Figure 27 Fifty-seven percent believe the cloud offers better data security Source: Cisco 2018 Security Capabilities Benchmark Study Cloud Offers Better Data Security Scalability Ease of Use Ease of Collaboration with External Parties Regulation or Compliance Requirements Not Core to Business, so Outsourcing Is Preferable Operational Expenditures Preferred Over Capital Lack of Internal IT Workforce 57% 48% 46% 41% 39% 39% 37% 14% Figure 27 57% believe the cloud offers better data security Download the 2018 graphics at: cisco.com/go/acr2018graphics
  • 31. 31 Cisco 2018 Annual Cybersecurity Report | The attack landscape IoT AND DDoS ATTACKS The IoT is still evolving, but adversaries are already exploiting security weaknesses in IoT devices to gain access to systems—including industrial control systems that support critical infrastructure. IoT botnets are also growing in both size and power, and are increasingly capable of unleashing powerful attacks that could severely disrupt the Internet. Attackers’ shift toward greater exploitation of the application layer indicates that this is their aim. But many security professionals aren’t aware of, or they dismiss, the threat that IoT botnets pose. Organizations keep adding IoT devices to their IT environments with little or no thought about security, or worse, take no time to assess how many IoT devices are touching their networks. In these ways, they’re making it easy for adversaries to take command of the IoT. Few organizations see IoT botnets as an imminent threat—but they should 18 For more details on Radware’s IoT botnet research, see “The IoT is only just emerging but the IoT botnets are already here,” p. 39, Cisco 2017 Midyear Cybersecurity Report: cisco.com/c/m/en_au/products/security/offers/cybersecurity-reports.html. As the IoT expands and evolves, so too are IoT botnets. And as these botnets grow and mature, attackers are using them to launch DDoS attacks of increasing scope and intensity. Radware, a Cisco partner, offered an analysis of three of the largest IoT botnets—Mirai, Brickerbot, and Hajime—in the Cisco 2017 Midyear Cybersecurity Report, and revisits the IoT botnet topic in our latest report to underscore the severity of this threat.18 Their research shows that only 13 percent of organizations believe that IoT botnets will be a major threat to their business in 2018. IoT botnets are thriving because organizations and users are deploying low-cost IoT devices rapidly and with little or no regard for security. IoT devices are Linux- and Unix-based systems, so they are often targets of executable and linkable format (ELF) binaries. They are also less challenging to take control of than a PC, which means it’s easy for adversaries to quickly build a large army. IoT devices operate on a 24-hour basis and can be called into action at a moment’s notice. And as adversaries increase the size of their IoT botnets, they are investing in more sophisticated code and malware and shifting to more advanced DDoS attacks. Application DDoS overtakes network DDoS Application layer attacks are on the rise while network layer attacks are declining (see Figure 28). Radware researchers suspect this shift can be attributed to growth in IoT botnets. The trend is concerning because the application layer is so diverse, and has so many devices within it, which means attacks targeting this layer could potentially shut down large portions of the Internet. Figure 28 Application DDoS attacks increased in 2017 37% HTTP 35% TCP-SYN Flood 28% HTTPS 33% DNS 23% UDP 18% ICMP 12% TCP-Other 10% IPv6 4% Other Network: 51%Application: 64% Which of the following attack vectors have you experienced this year? Figure 28 Application DDoS attacks increased in 2017 Source: Radware 7% VoIP 23% SMTP
  • 32. 32 Cisco 2018 Annual Cybersecurity Report | The attack landscape More attackers are turning to the application layer because there is little left to exploit in the network layer, according to Radware researchers. IoT botnets are also less resource- intensive than PC botnets to build. That means adversaries can invest more resources in developing advanced code and malware. The operators of the multivector botnet Mirai, which is known for advanced application attacks, are among those making that type of investment. “Burst attacks” increasing in complexity, frequency, and duration One of the most significant DDoS attack trends Radware observed in 2017 was an increase in short-burst attacks, which are becoming more complex, frequent, and persistent. Forty-two percent of organizations in Radware’s investigation experienced this type of DDoS attack in 2017 (Figure 29). In most of the attacks, the recurring bursts lasted only a few minutes. Burst tactics are typically aimed at gaming websites and service providers due to their targets’ sensitivity to service availability and their inability to sustain such attack maneuvers. Timely or random bursts of high traffic rates over a period of days or even weeks can leave these organizations with no time to respond, causing severe service disruptions. Radware researchers say that burst attacks: •• Are composed of multiple changing vectors. The attacks are geographically distributed and manifest as a sustained series of precise and high-volume SYN floods, ACK floods, and User Datagram Protocol (UDP) floods on multiple ports. •• Combine high-volume attacks with varying durations— from two to 50 seconds of high burst-traffic with intervals of approximately five to 15 minutes. •• Are often combined with other long-duration DDoS attacks. Growth in reflection amplification attacks Another DDoS trend Radware observed during 2017 is growth in reflection amplification DDoS attacks as a major vector against a wide spectrum of services. According to Radware, two in five businesses experienced a reflection amplification attack in 2017. One-third of those organizations reported that they were unable to mitigate these attacks. A reflection amplification attack uses a potentially legitimate third-party component to send attack traffic to a target, concealing the attacker’s identity. Attackers send packets to the reflector servers with a source IP address set to the target user’s IP. That makes it possible to indirectly overwhelm the target with response packets and exhaust the target’s utilization of resources (see Figure 30). Figure 29 Experience with DDoS attacks in recurring bursts Experienced Short-Burst DDoS Attacks in 2017 Lasted Seconds Lasted a Few Minutes Lasted 15-30 Minutes Not Hit by Burst Attacks 58%9% 15%18% 42% Figure 29 Experience with DDoS attacks in recurring bursts Source: Radware Figure 30 Reflection amplification attack Source: Radware Third-Party Component Attacker Target Figure 30 Reflection amplification attack
  • 33. 33 Cisco 2018 Annual Cybersecurity Report | The attack landscape To successfully execute a reflection amplification attack, adversaries need to have a larger bandwidth capacity than their targets. Reflector servers make that possible: the attacker simply reflects the traffic from one or more third- party machines. Since these are ordinary servers, this type of attack is particularly difficult to mitigate. Common examples include: DNS amplification reflective attacks This sophisticated denial of service attack takes advantage of a DNS server’s behavior to amplify the attack. A standard DNS request is smaller than the DNS reply. In a DNS amplification reflective attack, the attacker carefully selects a DNS query that results in a lengthy reply that’s up to 80 times longer than the request (for example, “ANY”). The attacker sends this query using a botnet to third-party DNS servers while spoofing the source IP address with the target user’s IP address. The third-party DNS servers send their responses to the target’s IP address. With this attack technique, a relatively small botnet can channel a volumetric flood of large responses toward the target. NTP reflection This type of amplification attack exploits publicly accessible Network Time Protocol (NTP) servers to overwhelm and exhaust defenders with UDP traffic. NTP is an old networking protocol for clock synchronization between computer systems over packet-switched networks. It is still widely used across the Internet by desktops, servers, and even phones to keep their clocks in sync. Several old versions of NTP servers contain a command called monlist, which sends the requester a list of up to the last 600 hosts that connected to the queried server. In a basic scenario, the attacker repeatedly sends the “get monlist” request to a random NTP server and spoofs the source IP address for the requesting server as the target server. NTP server responses are then directed to the target server to cause a significant increase in UDP traffic from source port 123. SSDP reflection This attack exploits the Simple Service Discovery Protocol (SSDP), which is used to allow Universal-Plug-and-Play (UPnP) devices to broadcast their existence. It also helps to enable discovery and control of networked devices and services, such as cameras, network-attached printers, and many other types of electronic equipment. Once a UPnP device is connected to a network, and after it receives an IP address, the device is able to advertise its services to other computers in the network by sending a message in a multicast IP. When a computer gets the discovery message about the device, it makes a request for a complete description of the device services. The UPnP device then responds directly to that computer with a complete list of any services it has to offer. As with NTP and DNS amplified DDoS attacks, the attacker can use a small botnet to query that final request for the services. The attacker then spoofs the source IP to the target user’s IP address and aims the responses directly at the target.
  • 34. 34 Cisco 2018 Annual Cybersecurity Report | The attack landscape Figure 31 Overview of infrastructure blind spots across various industriesFigure 31 Overview of infrastructure blind spots across various industries Healthcare Tech FinanceGovernmentLumeta Actual Customers Presumed endpoints Endpoint visibility gap Unmanaged networks Unauthorized or unsecured forwarding devices Known but unreachable networks Leak paths to Internet identified on deployment 3000 220120 9400 33,256 454 16,828 520 42075 2026 3278 77124 5 12% 50%33% 43% 150,000 600,00060,000 8000 Discovered endpoints 170,000 1,200,00089,860 14,000 Source: Lumeta Defenders must remediate “leak paths” A “leak path,” as defined by Cisco partner Lumeta, is a policy or segmentation violation or unauthorized or misconfigured connection created to the Internet on an enterprise network, including from the cloud, that allows traffic to be forwarded to a location on the Internet—such as a malicious website. These unexpected connections can also occur internally between two different network segments that should not be communicating with each other. For example, in critical infrastructure environments, an unexpected leak path between the manufacturing floor and business IT systems could indicate malicious activity. Leak paths can also stem from improperly configured routers and switches. Devices that don’t have permissions set up correctly, or are left open and unmanaged, are vulnerable to attackers. Devices and networks related to rogue or shadow IT are also fertile ground for adversaries to establish leak paths because they tend to be unmanaged and unpatched. Lumeta estimates that about 40 percent of the dynamic networks, endpoints, and cloud infrastructure in enterprises is leading to significant infrastructure blind spots and lack of real-time awareness for security teams. Detection of existing leak paths are critical as they can be exploited at any time. However, newly created leak paths are important to detect in real time since they are immediate indicators of compromise and are associated with most advanced attacks, including ransomware. Lumeta’s recent analysis of IT infrastructure at more than 200 organizations across several industries underscores the endpoint visibility gap. It also shows that many companies significantly underestimate the number of endpoints in their IT environments (see Figure 31). Lack of awareness about the number of IP-enabled IoT devices connected to the network is often a key reason for underestimation of endpoints.
  • 35. 35 Cisco 2018 Annual Cybersecurity Report | The attack landscape Lumeta’s researchers suggest that leak paths are on the rise, especially in cloud environments, where there is less network visibility and fewer security controls in place. Malicious actors don’t always immediately use the leak paths they create or find. When they do return to these channels, they use them to install malware or ransomware, steal information, and more. Researchers with Lumeta say one reason leak paths often remain undetected is because threat actors are adept at encrypting and obfuscating their activity—by using TOR, for example. They also are careful to use leak paths judiciously, so as not to alert security teams to their activity. Lumeta researchers say security team skills gaps, namely the lack of fundamental knowledge about networks, can interfere with organizations’ ability to investigate and remediate leak path issues in a timely manner. Better collaboration between security and network teams can help expedite investigations and remediation of leak paths. Tools for automation that provide network context can also give security analysts insight into potential leak path issues. In addition, implementing appropriate segmentation policies can help security teams quickly determine whether unexpected communication between networks or devices is malicious. Cisco 2018 Security Capabilities Benchmark Study: Lack of security personnel prevents many organizations from implementing new cyber capabilities Severe staff shortages remain a major issue for defenders. As noted above, skills gaps can interfere with an organization’s ability to investigate and remediate certain types of threats. Also, without the right talent in place, defenders can’t deploy new technology and processes that could help to strengthen their security postures (Figure 32). Many security professionals interviewed for the Cisco 2018 Security Capabilities Benchmark Study said that, ideally, they would automate or outsource more of their routine activities, so they could redirect staff to higher-value activities. Figure 32 Key capabilities defenders would add, if staffing levels improved 19% Endpoint Forensics 17% Cloud Access Security Broker (CASB) 17% Web Application Firewall 16% Intrusion Prevention 16% Multifactor Authentication 16% Mobility Security 15% Encryption/ Privacy/ Data Protection 16% Firewall 16% Endpoint Protection/ Antivirus 16% Network Forensics Figure 32 Key capabilities defenders would add, if staffing levels improved Source: Cisco 2018 Security Capabilities Benchmark Study Download the 2018 graphics at: cisco.com/go/acr2018graphics
  • 36. 36 Cisco 2018 Annual Cybersecurity Report | The attack landscape Industrial control systems vulnerabilities place critical infrastructure at risk Industrial control systems (ICS) are at the heart of all manufacturing and process control systems. ICS connect to other electronic systems that are part of the control process, creating a highly connected ecosystem of vulnerable devices that a wide range of attackers is eager to compromise. Threat actors who want to target ICS to cripple critical infrastructure are actively engaged in research and creating backdoor pivot points to facilitate future attacks, according to TrapX Security, a Cisco partner that develops deception- based cybersecurity defenses. Among the potential cyber attackers are experts with advanced knowledge of IT systems, ICS architectures, and the processes they support. Some also know how to program product lifecycle management (PLM) controllers and subsystems. Threat researchers with TrapX recently conducted investigations into several cyber attacks that targeted customers’ ICS to help highlight unexpected problems with ICS cyber defense. Two of the incidents, described below, took place in 2017 and remain under investigation. Target: Large international water treatment and waste processing company Attackers used the company’s demilitarized zone (DMZ) server as a pivot point to compromise the internal network. The security operations team received alerts from deception security technology embedded in the network DMZ. This physical or logical subnetwork bridges internal networks from untrusted networks, such as the Internet, protecting other internal infrastructure. The investigation found that: •• The DMZ server was breached due to a misconfiguration that allowed RDP connections. •• The server was breached and controlled from several IPs, which were connected to political hacktivists hostile to the plant. •• The attackers were able to launch multiple major attacks against several of the company’s other plants from the compromised internal network. Target: Power plant This power plant’s critical assets include a very large ICS infrastructure and the necessary supervisory control and data acquisition (SCADA) components that manage and run their processes. The plant is considered critical national infrastructure and subject to scrutiny and oversight by the responsible national security agency. It is therefore considered a high-security installation. The CISO involved decided to implement deception technology to protect the plant’s standard IT resources from ransomware attacks. The technology was also distributed within the ICS infrastructure. Soon after, the security operations team received several alerts that indicated a breach to the systems within the critical infrastructure plant operations. Their immediate investigation concluded: •• A device in the process control network was attempting to interact with the deception traps, which were camouflaged as PLM controllers. This was an active attempt to map and understand the exact nature of each PLM controller within the network. •• The compromised device would normally have been closed, but a vendor performing maintenance failed to close the connection when finished. That oversight left the process control network vulnerable to attackers. •• The information adversaries were collecting is exactly the type needed to disrupt plant activity and potentially cause great damage to ongoing plant operations.
  • 37. 37 Cisco 2018 Annual Cybersecurity Report | The attack landscape Recommendations Many ICS breaches begin with the compromise of vulnerable servers and computing resources within the corporate IT network. Threat researchers with TrapX recommend that organizations take the following actions to reduce risk and help ensure the integrity of operations within their facilities: •• Review vendors and systems, and see that all patches and updates are applied promptly. (If patches are not available, consider migrating to new technology.) •• Reduce the use of USB memory sticks and DVD drives. •• Isolate ICS systems from IT networks. Don’t allow any direct connections between the two. That includes network connections, laptops, and memory sticks. •• Implement policies that severely limit the use of the ICS networks for anything other than essential operations. Reduce accessibility to ICS workstations and monitors with external Internet browser access. Assume these policies will fail and plan accordingly. •• Research and eliminate all embedded passwords or default passwords in your production network. And wherever possible, implement two-factor authentication. •• Review plans for disaster recovery following a major cyber attack. For additional case studies, see the TrapX Security research paper, Anatomy of an Attack: Industrial Control Systems Under Siege. Cisco 2018 Security Capabilities Benchmark Study: More OT and IoT attacks on the horizon Attacks targeting operational technology (OT) such as ICS and IoT devices are still uncommon enough that many security professionals haven’t experienced them firsthand. But according to research for the Cisco 2018 Security Capabilities Benchmark Study, security professionals fully expect such attacks to occur, and are trying to determine how they will respond to them. Security professionals recognize that these systems often have few protections and unpatched and out-of-date software, making them vulnerable to attacks. “We still have OT devices that are 25 years old, and compressors and machines that are 40 years old,” said one respondent. “IT professionals are used to the schedule. [They say,] ‘Tell me when Windows X is no longer supported,’ or ‘Hey, this Oracle version is going EOL [end of life].’ There’s no such thing in the OT environment.” Few security professionals can speak confidently on issues relating to securing OT in their organizations. That is either because they don’t have or anticipate adding much OT, or because IoT implementations are new. Of these professionals, 31 percent said their organizations have already experienced cyber attacks on OT infrastructure, while 38 percent said they expect attacks to extend from IT to OT in the next year (Figure 33). Figure 33 Thirty-one percent of organizations have experienced cyber attacks on OT infrastructure Source: Cisco 2018 Security Capabilities Benchmark Study Have Already Seen Cyber Attacks in OT Expect Cyber Attacks to Extend into OT Expect Cyber Attacks in OT, but Not in the Next Year Believe Cyber Attacks Will Remain Focused on IT 38% 20% 10% 31% Figure 33 Thirty-one percent of organizations have experienced cyber attacks on OT infrastructure Download the 2018 graphics at: cisco.com/go/acr2018graphics
  • 38. 38 Cisco 2018 Annual Cybersecurity Report | The attack landscape VULNERABILITIES AND PATCHING Amid the chaos of security concerns, defenders may lose sight of vulnerabilities affecting their technology. But you can be sure attackers are paying attention, and calculating how to exploit these potential weaknesses to launch attacks. There was a time when patching known vulnerabilities within 30 days was considered best practice. Now, waiting that long to remediate could increase an organization’s risk of being targeted for attack because threat actors are moving faster to release and use active exploits of vulnerabilities. Organizations also must avoid neglecting small but significant security gaps that could benefit adversaries, especially during the reconnaissance phase of attacks when they are searching for pathways into systems. Prevalent vulnerabilities in 2017 included buffer overflow errors, Apache Struts Buffer overflow errors topped the list of Common Weakness Enumeration (CWE) vulnerabilities tracked by Cisco in 2017, although other categories showed movement up and down. Input validation vulnerabilities increased, while buffer errors declined (Figure 34). Figure 34 CWE threat category activity Figure 34 CWE threat category activity ChangeJan-Sep 2016 Jan-Sep 2017Threat Category CWE-119: Buffer errors CWE-20: Input validation CWE-264: Permissions, privileges and access CWE-200: Information leak/disclosure 125 +100%250 137 +18%163 227 +15%268 493 (-22%)403 CWE-310: Cryptographic issues CWE-78: OS Command injections CWE-59: Link following 5 0 7 +114%15 27 (-37%)17 Source: Cisco Security Research
  • 39. 39 Cisco 2018 Annual Cybersecurity Report | The attack landscape In examining critical advisories (Figure 35), Apache Struts vulnerabilities were still prominent in 2017. Apache Struts is an open-source framework for creating Java applications that is widely used. Apache Struts vulnerabilities were implicated in security breaches in 2017 that involved major data brokers. While Apache tends to identify vulnerabilities and offer patches quickly, infrastructure solutions such as Apache Struts can be challenging to patch without disrupting network performance. As discussed in previous Cisco security 19 Cisco 2017 Midyear Cybersecurity Report: cisco.com/c/m/en_au/products/security/offers/cybersecurity-reports.html. reports,19 third-party or open-source software vulnerabilities can require manual patching, which may not be done as frequently as automated patching from standard software vendors. That gives malicious actors a greater window of time to launch attacks. Deep scanning of operating systems down to the library or individual file level can provide organizations with inventories of the components of open-source solutions. Figure 35 Critical advisories and attack activities Attack Activities Mar 7th WikiLeaks Vault 7 Release Multiple CVEs Operation Cloud Hopper Sustained Global Campaigns Apr 6th Shadow Brokers Group Disclosure of Equation Exploits Apr 8th MS17-010 Multiple CVEs WannaCry Activity May 17st Critical Vulnerabilities CVE-2017-3733 CVE-2017-5638 Oracle CPU, OIT Vulnerabilities Jan 18th OpenSSL Vulnerabilities Jan 26th OpenSSL Vulnerabilities Feb 6th Apache Struts 2 Remote Code Execution Vulnerabilities Mar 6th Multiple CVEs Multiple CVEs Multiple CVEs CVE-2017-0145 CVE-2017-0108 CVE-2017-7269 Microsoft Windows Graphics Mar 14th CVE-2017-0199 Microsoft Office (Dridex Exploiting) Apr 11th CVE-2017-9805 Apache Struts REST Plug-in XML Processing Arbitrary Code Execution Vulnerability Sep 6th CVE-2017-8759 Microsoft .NET Framework Arbitrary Code Execution Vulnerability Sep 12th Microsoft Windows Server Message Block Service Arbitrary Code Execution Vulnerabilities Mar 14th Network Time Protocol Vulnerabilities Mar 21st Microsoft Internet Information Services (IIS) WebDAV Mar 29th Figure 35 Critical advisories and attack activities Source: Cisco Security Research Download the 2018 graphics at: cisco.com/go/acr2018graphics
  • 40. 40 Cisco 2018 Annual Cybersecurity Report | The attack landscape IoT and library vulnerabilities loomed larger in 2017 Between October 1, 2016, and September 30, 2017, Cisco threat researchers discovered 224 new vulnerabilities in non- Cisco products, of which 40 vulnerabilities were related to third-party software libraries included in these products, and 74 were related to IoT devices (Figure 36). The relatively large number of vulnerabilities in libraries points to the need to delve deeper into third-party solutions that provide the framework for many enterprise networks. Defenders should assume that third-party software libraries can be targets for attackers; it’s not enough to simply make sure the latest version of the software is running, or that no open CVEs (common vulnerabilities) have been reported. Security teams should check frequently for patches, and review the security practices of third-party vendors. Teams could, for example, request that vendors provide secure development lifecycle statements. Another best practice for vetting third-party software is helping to ensure that auto-update or check-for-update features are running securely. For example, when an update is initiated, security professionals should be certain that the communication for that software occurs over a secure channel (such as SSL), and that the software is digitally signed. Both are needed: If only digital signatures are used, but not a secure channel, an attacker could intercept traffic and potentially replace an update with an older version of the software that is digitally signed, but may contain vulnerabilities. If only a secure channel is used, an attacker could potentially compromise the vendor’s update server and replace the update with malware. Spectre and Meltdown vulnerabilities: proactive preparation can accelerate remediation The January 2018 announcement of the Spectre and Meltdown vulnerabilities, which could allow attackers to compromise data on platforms running current-generation computer processors, raised concerns about security professionals’ ability to protect data from attacks. The vulnerabilities could allow attackers to view application data in memory on the chipset, with potential for widespread damage, since affected microprocessors are found in everything from mobile phones to server hardware. The threats posed by the Spectre and Meltdown vulnerabilities highlight the importance of communicating with security organizations about solutions such as patches—as well as ensuring that third-party providers, such as cloud and supply chain vendors, are adhering to best practices for remediating gaps in security posed by such vulnerabilities. Product security incident response teams, or PSIRTs (such as the Cisco PSIRT), are designed to respond quickly to vulnerability announcements, provide patches, and advise customers on how to avoid risks. Organizations need to plan for vulnerabilities like Spectre and Meltdown to happen, instead of hoping they won’t occur. The key is preparing for such announcements, and having systems in place to mitigate potential damage. For example, security teams should proactively inventory devices under their control, and document configurations in features in use, as some vulnerabilities are configuration-dependent and impact security only when certain features are activated. Security teams should also ask third-party vendors, such as cloud providers, about their update and patching processes. Organizations need to ask for transparency from their cloud providers in terms of how they remediate such vulnerabilities, and how quickly they respond to alerts. But in the end, the responsibility for preparedness falls on the organizations themselves; they must communicate with PSIRT organizations, and establish processes for quickly responding to vulnerabilities. For more information, read the Talos blog post on Spectre and Meltdown. Total Vulnerabilities: 224 IoT: 74 Third-Party Software Libraries: 40 Figure 36 Third-party library and IoT vulnerabilities, October 1, 2016-September 30, 2017 Source: Cisco Security Research Figure 36 Third-party library and IoT vulnerabilities
  • 41. 41 Cisco 2018 Annual Cybersecurity Report | The attack landscape Active exploits fuel race to remediate, except for IoT devices Qualys, Inc., a Cisco partner and provider of cloud-based security and compliance solutions, took a retrospective look at companies’ patch management behavior before and after the WannaCry campaign that affected many organizations across the world in May 2017. The ransomware cryptoworm WannaCry, which many security experts believe was designed to wipe data, took advantage of a Microsoft Windows security vulnerability called EternalBlue, which was leaked by the hacker group Shadow Brokers in mid-April 2017. (For more on this topic, see “They’re out there: Defenders should prepare to face new, self- propagating, network-based threats in 2018,” on page 6.) On March 14, 2017, Microsoft issued a security update (MS17-010) alerting users to a critical vulnerability in its Microsoft Windows SMB Server. Figure 37 shows how the number of devices detected with the vulnerability spikes, and then gradually declines between mid-March and mid-April as organizations scan their systems and apply the patch. However, a significant number of devices still remained unpatched as of mid-April. Then, on April 14, Shadow Brokers released the working exploit for targeting that known vulnerability in various versions of Microsoft Windows. Figure 37 shows that the number of devices detected with the vulnerability nearly doubled shortly thereafter. That happened as organizations learned of the exploit and its potential to impact both supported and unsupported versions of Windows through a remote check from Qualys that used a portion of the exploit code. But even after the exploit was released, widespread patching didn’t occur until mid-May, after the WannaCry attack made headlines around the world. Figure 37 shows the steep remediation curve after that campaign. By late May, few devices were left unpatched. Qualys’ research into its customers’ patching behavior indicates that it takes a major event to motivate many organizations to patch critical vulnerabilites—even knowledge of an active exploit is not enough to accelerate remediation. And in the case of the WannaCry campaign, businesses had access to the patch for the Microsoft vulnerability for two months before the ransomware attacks occurred. Another factor, as described by researchers with Cisco and Qualys partner Lumeta, was that unknown, unmanaged, rogue, and shadow IT endpoints were left unpatched. Attackers were able to leverage these blind spots. Without knowledge of these systems, vulnerabilty scanners were unable to evaluate and recommend patching of these systems, leaving them vulnerable to WannaCry. Figure 37 Patching behavior before and after WannaCry campaign Figure 37 Patching behavior before and after WannaCry campaign Source: Qualys 600K 500K 400K 300K 200K 100K NumberofDetections 2017 Mar Apr May MS17-010 Detections Microsoft Warns of Vulnerability Exploited Vulnerability Makes Headlines Remediation Activities Accelerate Due to Active Attacks by WannaCry Download the 2018 graphics at: cisco.com/go/acr2018graphics