Cisco 2015 Midyear Security Report Slide Deck

28
2015 Midyear Security Report Download at http :// cs.co /MSR15SL

Transcript of Cisco 2015 Midyear Security Report Slide Deck

Page 1: Cisco 2015 Midyear Security Report Slide Deck

2015 Midyear Security Report

Download at http://cs.co/MSR15SL

Page 2: Cisco 2015 Midyear Security Report Slide Deck

2© 2015 Cisco and/or its affiliates. All rights reserved.

Changes in Attack Behavior

Speed Agility Adaptability Destruction

Page 3: Cisco 2015 Midyear Security Report Slide Deck

3© 2015 Cisco and/or its affiliates. All rights reserved.

Patchwork of Security Products Creates Complex Environment for Organizations

Large Well-Established Players

Only better information sharing in the security industry will enable integration of solutions from niche innovators and long-standing players.

Organizations are Caught in Between

Niche Vendors

Page 4: Cisco 2015 Midyear Security Report Slide Deck

4© 2015 Cisco and/or its affiliates. All rights reserved.

• Blocked threats: 19,692,200,000 threats per day

• Blocked threats w/ spam: 2,557,767 blocks/sec

• Web requests per day: 16.9 billion requests per day

A View Across Cisco’s Global Telemetry

Page 5: Cisco 2015 Midyear Security Report Slide Deck

5© 2015 Cisco and/or its affiliates. All rights reserved.

Speed meets new levels of sophistication.

Malicious Actors Are More Innovative and Quicker to Adapt

Page 6: Cisco 2015 Midyear Security Report Slide Deck

6© 2015 Cisco and/or its affiliates. All rights reserved.

Adversaries’ Agility is Their Strength

Constant upgrades increased Angler penetration rate to 40% Twice as effective than other exploit kits in 2014

Compromised System

Flash Vulnerabilities

Retargeting

Ransomware

AnglerContinually throwing different

‘hooks’ in the water to increase the chances of compromise

Encrypted Malicious Payload MacrosSocial

Engineering

IP Changing Domain Shadowing

More Being

Developed

Daily

TTD

SecurityMeasures

Web Blocking IP Blocking Retrospective Analysis Antivirus Endpoint SolutionsEmail Scanning

Kevin Parra
I changed penetration to compromise
Page 7: Cisco 2015 Midyear Security Report Slide Deck

7© 2015 Cisco and/or its affiliates. All rights reserved.

Patching: A Window of OpportunityUsers not moving quickly to the latest Flash versions or updating the patches creates an opportunity for Angler and other exploits to target the vulnerability.

Page 8: Cisco 2015 Midyear Security Report Slide Deck

8© 2015 Cisco and/or its affiliates. All rights reserved.

RombertikMalware evolves to not only steal data—if detected, it can destroy the targeted system.

Destructive if Modified• Destroy master

boot record

• Render computer inoperable on restart

Gain Access• Spam

• Phishing

• Social engineering

Evade Detection• Write random data to memory

960 million times

Extract User Data• Deliver user information

back to adversaries

Anti-Analysis Persistence Malicious Behavior

Page 9: Cisco 2015 Midyear Security Report Slide Deck

9© 2015 Cisco and/or its affiliates. All rights reserved.

The Top Vulnerability Categories Are Persistent

CWE-119Buffer Errors

471

CWE-20Input Validation

244CWE-399Resource

Management Errors

238

CWE-200 Information

Leak/Disclosure

138

CWE-264Permissions, Privileges &

Access Control

155

Page 10: Cisco 2015 Midyear Security Report Slide Deck

10© 2015 Cisco and/or its affiliates. All rights reserved.

Malvertising UpdateAdware MultiPlug abandons its URL-encoding scheme for evading detection and increased its effectiveness at compromising users

Numbers of Compromised Users:New URL Scheme vs. Old URL Scheme

The new URL scheme dramatically outpaces the old one.

Page 11: Cisco 2015 Midyear Security Report Slide Deck

11© 2015 Cisco and/or its affiliates. All rights reserved.

The “version”: the number of times that Cisco updated alerts as multiple vendors attempted to identify and correct these vulnerabilities in their products

9Versions

Open SSL(FREAK)

1Version

QEMU Virtual Floppy Disk Controller(VENOM)

22Versions

Open SSL (Heartbleed)

25Versions

GNU Bash (Shellshock)

15Versions

GNU C glibc(Ghost)

Patch management processes minimize awareness, coordination and implementation nightmares

Open-Source Patching: Software Supply Chain Management is Critical

32Versions

SSL 3.0 Fallback(POODLE)

Page 12: Cisco 2015 Midyear Security Report Slide Deck

12© 2015 Cisco and/or its affiliates. All rights reserved.

Web-Based Attacks Have Been Holding Steady

Java PDF FlashSilverlight

December 2014–May 2015

Page 13: Cisco 2015 Midyear Security Report Slide Deck

13© 2015 Cisco and/or its affiliates. All rights reserved.

The Evolution of Ransomware: Data, Not Systems, Are the Targets

TORRansomware is now completely automated through the anonymous web network.

$300-$500Adversaries have done their market research. Ransoms are not exorbitant.

Personal Files

Financial Data

Emails

Photo

Page 14: Cisco 2015 Midyear Security Report Slide Deck

14© 2015 Cisco and/or its affiliates. All rights reserved.

Dridex: Operationalizing Fast FluxThe damage is done and the campaign has moved on before antivirus detection.

Campaign StartDetected By

Outbreak FiltersAntivirus Engine

Finally Detects DridexBut Adversaries Have

Accomplished Penetration and Have Moved on

Page 15: Cisco 2015 Midyear Security Report Slide Deck

15© 2015 Cisco and/or its affiliates. All rights reserved.

Risk of Malware Encounters by Vertical IndustriesAlthough the electronics industry has the highest attack-to-traffic ratio, no industry is immune to attack.

It is only a matter of time before attackers see the potential in high-volume,low–block rate verticals.

Page 16: Cisco 2015 Midyear Security Report Slide Deck

16© 2015 Cisco and/or its affiliates. All rights reserved.

Countries with higher block ratios have many Web servers and compromised hosts on networks within their borders.

Russia 0.936

Japan 1.134China 4.126

Hong Kong 6.255

France 4.197

Germany 1.277

Poland 1.421

Canada 0.863

U.S. 0.760

Brazil 1.135

Malware on a Global ScaleMalicious actors do not respect country boundaries. Malware Traffic

Expected Traffic

Page 17: Cisco 2015 Midyear Security Report Slide Deck

17© 2015 Cisco and/or its affiliates. All rights reserved.

Time to DetectionThe current industry TTD rate of 200 days is not acceptable.

46200 VSHOURSDAYS

Industry Cisco

Page 18: Cisco 2015 Midyear Security Report Slide Deck

18© 2015 Cisco and/or its affiliates. All rights reserved.

Analysis and Observations

Reducing the Window of Exposure

Page 19: Cisco 2015 Midyear Security Report Slide Deck

19© 2015 Cisco and/or its affiliates. All rights reserved.

The Dilemma

Build Buy Be Left Behind

Page 20: Cisco 2015 Midyear Security Report Slide Deck

20© 2015 Cisco and/or its affiliates. All rights reserved.

Global Governance Not Ready to Deal with Cyber Challenges and Geopolitical InterestsThree examples of efforts that, while steps in the right direction, could create difficulties in practice:

Better harmonization in rule making is required to keep pace with the bad actors.

Big Picture Approach Shared Access Approach Tighter Control Approach

Page 21: Cisco 2015 Midyear Security Report Slide Deck

21© 2015 Cisco and/or its affiliates. All rights reserved.

Customers Must Demand Trustworthy Products from Their VendorsVendors need to be held accountable for vetting security products end to end.

Secure Development Secure Hardware Secure Deployment Secure Supply Chain and Lifecycle

Page 22: Cisco 2015 Midyear Security Report Slide Deck

22© 2015 Cisco and/or its affiliates. All rights reserved.

Services Fill the Gap

With the speed and variation of attacks increasing and the security talent pool shrinking, many organizations will rely more on outside vendors for the expertise to manage the risk environment.

PersonnelAssessments

Automation/ Analytics

Emerging Business Models Flexibility

Privacy Policy

Page 23: Cisco 2015 Midyear Security Report Slide Deck

23© 2015 Cisco and/or its affiliates. All rights reserved.

Point Solutions Do Not Keep Pace.

The Need for anIntegrated Threat Defense

Page 24: Cisco 2015 Midyear Security Report Slide Deck

24© 2015 Cisco and/or its affiliates. All rights reserved.

Attackers Are Exploiting Point Solutions with Increasing Speed

NGIPS

Malware

Sandbox

IAM

Antivirus

IDSFirewall

VPN

Email

NGFW

Data

Page 25: Cisco 2015 Midyear Security Report Slide Deck

25© 2015 Cisco and/or its affiliates. All rights reserved.

Data

Attackers Are Exploiting Point Solutions with Increasing Speed

NGIPS

MalwareSandbox

IAM

Antivirus

IDSFirewall

VPN

Email

NGFW

Time to detection:

200 Days

Page 26: Cisco 2015 Midyear Security Report Slide Deck

26© 2015 Cisco and/or its affiliates. All rights reserved.

Only an Integrated Threat Defense Can Keep Pace

Data

Systemic Response

Time to detection: as little as

46 Hours

Page 27: Cisco 2015 Midyear Security Report Slide Deck

27© 2015 Cisco and/or its affiliates. All rights reserved.

• Adversaries rapidly refine their ability to evade detection

• Point solutions create weak points in security defenses

• An integrated threat defense built on trustworthy products

and services is the best defense

Conclusion

Page 28: Cisco 2015 Midyear Security Report Slide Deck

28© 2015 Cisco and/or its affiliates. All rights reserved.

Download your copy >> http://cs.co/MSR15SL

2015 Midyear Security Report