Cisco 2017 Midyear Cybersecurity Report

Cisco 2017 Midyear Cybersecurity Report

Cisco 2017 Midyear Cybersecurity Report 1 Executive Summary Table of Contents Executive Summary ..........................................................03 Vulnerabilities update: Rise in attacks following key disclosures ................................................................ 47 Major Findings ..................................................................05 Don’t let DevOps technologies leave the Introduction ......................................................................07 business exposed ............................................................ 50 Attacker Behavior .............................................................09 Organizations not moving fast enough to patch Exploit kits: Down, but not likely out ................................. 09 known Memcached server vulnerabilities ......................... 54 How defender behavior can shift attackers’ focus ...........11 Malicious hackers head to the cloud to shorten the path to top targets ..................................................... 56 Web attack methods provide evidence of a mature Internet ............................................................. 12 Unmanaged infrastructure and endpoints leave organizations at risk ......................................................... 59 Web block activity around the globe ................................ 13 Security Challenges and Opportunities Spyware really is as bad as it sounds............................... 14 for Defenders ...................................................................61 Decline in exploit kit activity likely influencing Security Capabilities Benchmark Study: global spam trends .......................................................... 18 Focus on verticals ............................................................ 61 Malicious email: A closer look at malware Company size affects approach to security ...................... 62 authors’ file type strategies .............................................. 19 Using services to bridge knowledge and talent gaps ....... 63 Worried about ransomware? Business email compromise may be a bigger threat ................................ 22 Outsourcing Service and Threat Alert Data by Country ........ 64 Malware evolution: A 6-month perspective ...................... 23 IoT security risks: Preparing for the future—and the now .......65 Threat intelligence from Talos: On the trail Security Capabilities Benchmark Study: of attacks and vulnerabilities ........................................... 24 Focus on select verticals.................................................. 66 Time to detection: The tug-of-war between Service providers ............................................................66 attackers and defenders tightens ..................................... 26 Public sector ...................................................................68 Time-to-evolve trends: Nemucod, Ramnit, Retail ...............................................................................70 Kryptik, and Fareit ............................................................ 28 Manufacturing .................................................................72 The expanding life spans—and overlap—of DGA domains ................................................. 33 Utilities ............................................................................74 Analyzing infrastructure broadens Healthcare .......................................................................76 knowledge of attacker tools ............................................. 34 Transportation .................................................................78 Supply chain attacks: One compromised Finance ...........................................................................80 vector can affect many organizations ............................... 36 Conclusion ........................................................................83 The IoT is only just emerging but the IoT botnets are already here .................................................. 39 Security leaders: It’s time to claim a seat at the top table ................................................................84 Extortion in cyberspace: Ransom denial of service (RDoS) ................................................................41 About Cisco ......................................................................86 The changing economics of malicious hacking ...............42 Cisco 2017 Midyear Cybersecurity Report contributors .......................................................... 86 Ransomed medical devices: It’s happening ..................... 42 Cisco 2017 Midyear Cybersecurity Vulnerabilities ...................................................................46 Report technology partners ............................................. 88 Geopolitical update: WannaCry attack underscores risk of hoarding knowledge about exploitable vulnerabilities .......... 46 Cisco 2017 Midyear Cybersecurity Report Executive Summary For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency. In these reports, we strive to alert defenders to the increasing sophistication of threats and the techniques that adversaries use to compromise users, steal information, and create disruption. With this latest report, however, we find we must raise our security perimeter that enterprises must defend. What they warning flag even higher. Our security experts are becoming can see even more clearly today, however, is how malicious increasingly concerned about the accelerating pace of actors are taking advantage of that ever-expanding attack change—and yes, sophistication—in the global cyber threat surface. The breadth and depth of recent ransomware attacks landscape. That is not to say defenders are not improving alone demonstrate how adept adversaries are at exploiting their ability to detect threats and prevent attacks, or to help security gaps and vulnerabilities across devices and networks users and organizations avoid or recover more quickly from for maximum impact. them. But we see two dynamics undermining their hard-won Lack of visibility into dynamic IT environments, the risks successes, hindering further progress, and helping to usher in presented by “shadow IT,” the constant barrage of security a new era of cyber risks and threats: alerts, and the complexity of the IT security environment are just some reasons resource-strapped security teams struggle to stay on top of today’s evasive and increasingly The escalating impact of security breaches potent cyber threats. Revenue generation is still the top objective of most threat actors. However, some adversaries now have the ability—and often now, it seems, the inclination—to lock systems and What we cover in this report destroy data as part of their attack process. As explained in The Cisco 2017 Midyear Cybersecurity Report explores the the “Introduction” to the Cisco 2017 Midyear Cybersecurity above dynamics through the discussion of: Report on page 7, our researchers see this more sinister activity as a precursor to a new and devastating type of attack Adversary tactics that is likely to emerge in the near future: Destruction of We examine select methods that threat actors are using to service (DeOS). compromise users and infiltrate systems. It is important for Within the past year, we have also observed adversaries defenders to understand changes in adversaries’ tactics employing Internet of Things (IoT) devices in DDoS attacks. so that they can, in turn, adapt their security practices and Botnet activity in the IoT space suggests some operators may educate users. Topics covered in this report include new be focused on laying the foundation for a wide-reaching, high- developments in malware, trends in web attack methods impact attack that could potentially disrupt the Internet itself. and spam, the risks of potentially unwanted applications (PUAs) like spyware, business email compromise (BEC), the changing economics of malicious hacking, and medical device The pace and scale of technology compromise. Our threat researchers also offer analysis of Our threat researchers have been monitoring for years how—and how quickly—some adversaries are evolving their how mobility, cloud computing, and other technology tools and techniques, and deliver an update on Cisco’s efforts advancements and trends are stretching and eroding the to reduce our Time to Detection (TTD) of threats. 3 Executive Summary Cisco 2017 Midyear Cybersecurity Report Vulnerabilities Opportunities for defenders In this report, we also provide an overview of vulnerabilities The Cisco 2017 Midyear Cybersecurity Report presents and other exposures that can leave organizations and users additional findings from Cisco’s latest Security Capabilities susceptible to compromise or attack. Weak security practices, Benchmark Study. We offer in-depth analysis of the key such as not moving swiftly to patch known vulnerabilities, security concerns of eight industry verticals: Service providers, not limiting privileged access to cloud systems, and leaving public sector, retail, manufacturing, utilities, healthcare, infrastructure and endpoints unmanaged, are discussed. Also transportation, and finance. Industry experts from Cisco offer in focus: Why the expanding IoT and the convergence of IT recommendations on how

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    90 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us