Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • IT Management

    Cisco Mid-Year Security Report: Bad Guys Getting Badder

    Written by

    Chris Preimesberger
    Published July 30, 2015
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      While enterprise and personal data security vendors are making significant headway in toughening up their products against relentless attacks from shadowy bad actors around the globe, those bad guys also are becoming more sophisticated.

      Cisco Systems came out with its biannual security whitepaper report July 28, and the key message from it is this: Enterprises can make a jump ahead, but the hackers are still two jumps ahead — and getting nastier in their fraudulent behavior.

      “At a high level, we’re seeing big changes in attack behavior,” Craig Williams, Security Outreach Manager at Cisco Systems and one of the authors of the report, told eWEEK. “Our adversaries are becoming more agile and are adapting faster to the security industry than ever before. We’re seeing this with exploit kits, ransomware and others. The reason for this, we think, is that it’s so much easier to monetize malware these days.

      “In years previous, bad guys would sell the accounts, a couple at a time, and now that we have things like crypto-currencies, such as Bitcoin, it’s significantly easier for adversaries to monetize directly from their victims.”

      Hackers getting more money per victim

      Bad actors also are generally getting more money per victim, Williams said. “At a minimum, ransomware is now a couple hundred dollars (to pay the ransom and get the data back). Instead of a couple hundred dollars per 1,000 users, it’s a couple hundred per user,” Williams said.

      The main problem with enterprise and personal data security now is that users have a plethora of security products that don’t interact well and that leave holes open for hackers to walk through.

      “The users are left with what we call this ‘sprawl of security,’ meaning devices that don’t communicate well and don’t share intelligence,” Williams said. “These allow the bad guys blind spots to hide in. Does anybody have an IPS (intrusion prevention system) or anti-malware solution that can talk to their firewall? Until we have an integrated threat defense, those problems are going to allow adversaries easier access to networks.”

      Current Troubling Trends

      Some of the top troubling trends cited in the Cisco mid-year update include:

      –Expanding use of ransomware, which is making a successful business out of holding data hostage until targeted users pay up.

      –Highly-effective exploit kits such as Angler, which use vulnerabilities in Flash to compromise systems. An exploit kit is an off-the-shelf software package containing easy-to-use packaged attacks on known and unknown (zero-day) vulnerabilities. These toolkits exploit client-side vulnerabilities, typically targeting the Web browser and applications that can be accessed by the Web browser. Angler continues to lead the exploit kit market in terms of overall sophistication and effectiveness.

      –Increasing creativity by malware authors, who are even going so far as to include text excerpts from classic literature like Jane Austen’s novel “Sense and Sensibility” in their code efforts to throw off antivirus detection software. Antivirus and other security solutions are more likely to categorize these pages as legitimate after “reading” such text.

      –Exploits of Adobe Flash vulnerabilities are increasing. They are regularly integrated into widely used exploit kits such as Angler and Nuclear. Mozilla.org, for example, has disallowed its popular browser, Firefox, from downloading new versions of Flash for these security reasons.

      –Operators of crime ware, like ransomware, are hiring and funding professional development teams to help them make sure their tactics remain profitable.

      –Criminals are turning to the anonymous Web network Tor and the Invisible Internet Project (I2P) to relay command-and-control communications while evading detection.

      –Adversaries are once again using Microsoft Office macros to deliver malware. It’s an old tactic that fell out of favor, but it’s being taken up again as malicious actors seek new ways to thwart security protections.

      –Malware authors are increasing their use of techniques such as sandbox detection to conceal their presence on networks.

      –Spam volume is increasing in the United States, China and the Russian Federation, but remained relatively stable in other regions in the first five months of 2015.

      –The security industry is paying more attention to mitigating vulnerabilities in open-source solutions.

      –Continuing a trend covered in the Cisco 2015 Annual Security Report, exploits involving Java have been on the decline in the first half of 2015.

      Chris Preimesberger
      Chris Preimesberger
      https://www.eweek.com/author/cpreimesberger/
      Chris J. Preimesberger is Editor Emeritus of eWEEK. In his 16 years and more than 5,000 articles at eWEEK, he distinguished himself in reporting and analysis of the business use of new-gen IT in a variety of sectors, including cloud computing, data center systems, storage, edge systems, security and others. In February 2017 and September 2018, Chris was named among the 250 most influential business journalists in the world (https://richtopia.com/inspirational-people/top-250-business-journalists/) by Richtopia, a UK research firm that used analytics to compile the ranking. He has won several national and regional awards for his work, including a 2011 Folio Award for a profile (https://www.eweek.com/cloud/marc-benioff-trend-seer-and-business-socialist/) of Salesforce founder/CEO Marc Benioff--the only time he has entered the competition. Previously, Chris was a founding editor of both IT Manager's Journal and DevX.com and was managing editor of Software Development magazine. He has been a stringer for the Associated Press since 1983 and resides in Silicon Valley.
      Linkedin Twitter

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×