Cisco Annual Security Report Documents Unprecedented Growth of Advanced Attacks and Malicious Traffic
(M2 PressWIRE Via Acquire Media NewsEdge) SAN JOSE, Calif., -- -- The Cisco 2014 Annual Security Report , released today, reveals that threats designed to take advantage of users' trust in systems, applications and personal networks have reached startling levels. According to the report, a worldwide shortage of nearly a million skilled security professionals is impacting organizations' abilities to monitor and secure networks, while overall vulnerabilities and threats reached their highest levels since 2000.
The report's findings offer a vivid picture of rapidly evolving security challenges facing businesses, IT departments and individuals. Attacker methods include socially engineered theft of passwords and credentials, hide-in-plain-sight infiltrations, and exploitation of the trust required for economic transactions, government services and social interactions.
- Increased sophistication and proliferation of the threat landscape. Simple attacks that caused containable damage have given way to organized cybercrime operations that are sophisticated, well-funded, and capable of significant economic and reputational damage to public and private sector victims .
- Increased complexity of threats and solutions due to rapid growth in intelligent mobile device adoption and cloud computing provide a greater attack surface than ever before. New classes of devices and new infrastructure architectures offer attackers opportunities to exploit unanticipated weaknesses and inadequately defended assets.
- Cybercriminals have learned that harnessing the power of Internet infrastructure yields far more benefits than simply gaining access to individual computers or devices. These infrastructure-scale attacks seek to gain access to strategically positioned web hosting servers, nameservers and data centers--with the goal of proliferating attacks across legions of individual assets served by these resources. By targeting Internet infrastructure, attackers undermine trust in everything connected to or enabled by it.
- Overall vulnerabilities and threats reached the highest level since initial tracking began in May 2000. As of Oct. 2013, cumulative annual alert totals increased 14 percent year-over-year from 2012.
- The report indicates a shortage of more than a million security professionals across the globe in 2014. The sophistication of the technology and tactics used by online criminals--and their nonstop attempts to breach networks and steal data--have outpaced the ability of IT and security professionals to address these threats. Most organizations do not have the people or the systems to continuously monitor extended networks and detect infiltrations, and then apply protections, in a timely and effective manner.
- One-hundred percent of a sample of 30 of the world's largest multinational company networks generated visitor traffic to Web sites that host malware . Ninety-six percent of networks reviewed communicated traffic to hijacked servers. Similarly, 92 percent transmitted traffic to Web pages without content, which typically host malicious activity.
- Distributed Denial of Service (DDoS) attacks --which disrupt traffic to and from targeted websites and can paralyze ISPs--have increased in both volume and severity. Some DDoS attacks seek to conceal other nefarious activity, such as wire fraud before, during or after a noisy and distracting DDoS campaign.
- Multipurpose Trojans counted as the most frequently encountered web-delivered malware, at 27 percent of total encounters in 2013. Malicious scripts, such as exploits and iframes, formed the second most frequently encountered category at 23 percent. Data theft Trojans such as password stealers and backdoors made up 22 percent of total web malware encounters. The steady decline in unique malware hosts and IP addresses--down 30 percent between Jan. 2013 and Sept. 2013--suggests that malware is being concentrated in fewer hosts and fewer IP addresses.
- Java continues to be the most frequently exploited programming language targeted by online criminals. Data from Sourcefire, now a part of Cisco, shows that Java exploits make up the vast majority (91 percent) of Indicators of Compromise (IOCs).
- Ninety-nine percent of all mobile malware targeted Android devices. At 43.8 percent, Andr/Qdplugin-A was the most frequently encountered mobile malware, typically via repackaged copies of legitimate apps distributed via non-official marketplaces.
- Specific business sectors , such as the pharmaceutical and chemical industry and the electronics manufacturing industry, have historically had high malware encounter rates. In 2012 and 2013, there was remarkable growth in malware encounters for the agriculture and mining industry--formerly a relatively low-risk sector. Malware encounters also continued to rise in the energy, oil and gas sectors.
- John N. Stewart, senior vice president, chief security officer , Threat Response Intelligence and Development, Cisco, said: "Although the Cisco Annual Security Report paints a grim picture of the current state of cyber security, there is hope for restoring trust in people, institutions and technologies -- and that starts with empowering defenders with real-world knowledge about expanding attack surfaces. To truly protect against all of these possible attacks, defenders must understand the attackers, their motivations and their methods -- before, during and after an attack."
Cisco will host a Live Broadcast on Friday, Jan. 17 at 10:30 AM PT with Chief Security Officer and Senior Vice President John N. Stewart and Threat Technical Leader Levi Gundert, to discuss and answer questions about the report in real time. Submit questions and access the broadcast here: http://newsroom.cisco.com/feature-content?type=webcontent&articleId=1308596
Access the full Cisco Annual Security Report here: http://www.cisco.com/web/offers/lp/2014-annual-security-report/
Video: John N. Stewart on Trust: https://www.youtube.com/watch?v=BrsL0rJPXMk
Join the security conversation on Twitter by following @CiscoSecurity. You can like Cisco Security on Facebook at http://facebook.com/ciscosecurity
Read Cisco Blogs
About the Report
The 2014 Cisco Annual Security Report highlights the most important security trends of the year and provides tips and guidance to keep enterprise technology environments more secure. Cisco stays ahead of and shares the latest threats by using real-time threat intelligence from Cisco Security Intelligence Operations (SIO), and this year's report also incorporates Sourcefire telemetry. Cisco SIO is the world's largest cloud-based security ecosystem, using more than 75 terabits of live data feeds from deployed Cisco email, web, firewall and intrusion prevention system (IPS) solutions.
Cisco (NASDAQ: CSCO) is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. For ongoing news, please go to http://thenetwork.cisco.com .
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks . Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company.
Doron Aronson Cisco Systems, Inc. +1 408 424 3762 firstname.lastname@example.org
Investor Relations Contacts
John Choi Cisco 408-526-6651 email@example.com
Industry Analyst Relations
Trevor Bratton Cisco 949-823-1212 firstname.lastname@example.org
Third Party Contacts
(c) 2014 M2 COMMUNICATIONS
[ InfoTech Spotlight's Homepage ]