The Cisco 2015 Annual Security Report released recently, which examines both threat intelligence and cybersecurity trends, reveals that organizations must adopt an ‘all hands on deck’ approach to defend against cyberattacks.
Attackers have become more proficient at taking advantage of gaps in security to evade detection and conceal malicious activity. Defenders, namely, security teams, must constantly improve their approach to protect their organization from these increasingly sophisticated cyber attack campaigns, Cisco said. These issues are further complicated by the geopolitical motivations of the attackers and conflicting requirements imposed by local laws with respect to data sovereignty, data localization and encryption.
Cyber criminals are expanding their tactics and adapting their techniques to carry out cyber attack campaigns in ways that make it harder to detect and analyze. The top three trends last year that Cisco’s threat intelligence has identified are:
- Snowshoe Spam:Emerging as a preferred strike method, attackers are sending low volumes of spam from a large set of IP addresses to avoid detection, creating an opportunity to leverage compromised accounts in multiple ways.
- Web Exploits Hiding in Plain Sight: Widely used exploit kits are getting dismantled by security companies in short order. As a result, online criminals are using other less common kits to successfully carry out their tactics – a sustainable business model as it does not attract too much attention.
In Asia-Pacific, China, Japan, and India (APJC), adversaries have been relying heavily on scams, malicious scripts, and web-based exploits over the past year to compromise users in all verticals. Cisco Security Research cites skyrocketing land and housing prices, recent natural disasters, and heavy export and manufacturing activity in APJC as factors for adversaries targeting users in that region who work in or do business with the automotive, insurance, real estate and land management, and transportation and shipping industries.
Users are caught in the middle. Not only are they the targets, but end-users are unknowingly aiding cyber-attacks. Throughout 2014, Cisco threat intelligence research revealed that attackers have increasingly shifted their focus from seeking to compromise servers and operating systems to seeking to exploit users at the browser and email level. Users downloading from compromised sites contributed to a 228% increase in Silverlight attacks, mainly through Fiesta, Angler and Rig exploit kits, along with a 250% increase in spam and malvertising exploits. However, this number still low in volume of attacks when measured against PDF, Java & Flash.
Results from the Cisco Security Capabilities Benchmark Study, which surveyed Chief Information Security Officers (CISOs) and Security Operations (SecOps) executives at 1700 companies in nine countries reveals a widening gap in defender perceptions of their likely security capabilities. Specifically, the study indicates that 75% of CISOs see their security tools as very or extremely effective. However, less than 50% of respondents use standard tools such as patching and configuration to help prevent security breaches and ensure that they are running the latest versions. Heartbleed was the landmark vulnerability last year, yet 56% of all installed OpenSSL versions are over four years old. That is a strong indicator that security teams are not patching.
While many defenders believe their security processes are optimized—and their security tools are effective—in truth, their security readiness likely needs improvement.
The report findings conclude that it’s time for corporate boards to take a role in setting security priorities and expectations. The Cisco “Security Manifesto”, a formal set of security principles as a foundation to achieving security, can help corporate boards, security teams and users in an organization better understand and respond to the cybersecurity challenges of today’s world. It can serve as a baseline for organizations as they strive to become more dynamic in their approach to security and more adaptive and innovative than adversaries. The principles are:
- Security must support the business.
- Security must work with existing architecture – and be usable.
- Security must be transparent and informative.
- Security must enable visibility and appropriate action.
- Security must be viewed as a “people problem.”
[Download PDF]- Cisco Annual Security Research 2015 report