This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Subscribe
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2018
      • ASIS 2017
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
  • InfoCenters
    • Video Management Systems
  • Contact
    • Editorial Guidelines
  • Advertise
Home » Cisco Security Report Shows Unprecedented Growth of Advanced Attacks and Malicious Traffic
Cyber Security NewsBanking/Finance/InsuranceConstruction, Real Estate, Property ManagementInfrastructure:Electric,Gas & WaterGovernment: Federal, State and LocalHospitals & Medical CentersPorts: Sea, Land, & AirSecurity NewswireRetail/Restaurants/ConvenienceTransportation/Logistics/Supply Chain/Distribution/ Warehousing

Cisco Security Report Shows Unprecedented Growth of Advanced Attacks and Malicious Traffic

New Newswire Feature Image 3/8/2012
January 16, 2014
KEYWORDS cyber security / cybercrime / education and training / security threats
Reprints
No Comments

The Cisco 2014 Annual Security Report reveals that threats designed to take advantage of users’ trust in systems, applications and personal networks have reached startling levels.

According to the report, a worldwide shortage of nearly a million skilled security professionals is impacting organizations’ abilities to monitor and secure networks, while overall vulnerabilities and threats reached their highest levels since 2000.

The report reveals an increased sophistication and proliferation of the threat landscape. Simple attacks that caused containable damage have given way to organized cybercrime operations that are sophisticated, well-funded, and capable of significant economic and reputational damage to public and private sector victims.

In addition, there is an increased complexity of threats and solutions due to rapid growth in intelligent mobile device adoption and cloud computing that provide a greater attack surface than ever before. New classes of devices and new infrastructure architectures offer attackers opportunities to exploit unanticipated weaknesses and inadequately defended assets.

The report also reveals that cybercriminals have learned that harnessing the power of Internet infrastructure yields far more benefits than simply gaining access to individual computers or devices. These infrastructure-scale attacks seek to gain access to strategically positioned web hosting servers, nameservers and data centers—with the goal of proliferating attacks across legions of individual assets served by these resources. By targeting Internet infrastructure, attackers undermine trust in everything connected to or enabled by it.

Other report findings include:  

Overall vulnerabilities and threatsreached the highest level since initial tracking began in May 2000. As of Oct. 2013, cumulative annual alert totals increased 14 percent year-over-year from 2012.

 

  • The report indicates a shortage of more than a million security professionalsacross the globe in 2014. The sophistication of the technology and tactics used by online criminals—and their nonstop attempts to breach networks and steal data—have outpaced the ability of IT and security professionals to address these threats. Most organizations do not have the people or the systems to continuously monitor extended networks and detect infiltrations, and then apply protections, in a timely and effective manner.
  •  

  • One-hundred percent of a sample of 30 of the world’s largest multinational company networks generated visitor traffic to Web sites that host malware. Ninety-six percent of networks reviewed communicated traffic to hijacked servers. Similarly, 92 percent transmitted traffic to Web pages without content, which typically host malicious activity.
  •  

  • Distributed Denial of Service (DDoS) attacks—which disrupt traffic to and from targeted websites and can paralyze ISPs—have increased in both volume and severity. Some DDoS attacks seek to conceal other nefarious activity, such as wire fraud before, during or after a noisy and distracting DDoS campaign.
  •  

  • Multipurpose Trojans counted as the most frequently encounteredweb-delivered malware, at 27 percent of total encounters in 2013. Malicious scripts, such as exploits and iframes, formed the second most frequently encountered category at 23 percent. Data theft Trojans such as password stealers and backdoors made up 22 percent of total web malware encounters. The steady decline in unique malware hosts and IP addresses—down 30 percent between Jan. 2013 and Sept. 2013—suggests that malware is being concentrated in fewer hosts and fewer IP addresses.
  •  
  • Java continues to be the most frequently exploitedprogramming language targeted by online criminals.Data from Sourcefire, now a part of Cisco, shows that Java exploits make up the vast majority (91 percent) of Indicators of Compromise (IOCs).
  •  
  • Ninety-nine percent of all mobile malwaretargeted Android devices. At 43.8 percent, Andr/Qdplugin-A was the most frequently encountered mobile malware, typically via repackaged copies of legitimate apps distributed via non-official marketplaces.
  • Subscribe to Security Magazine

    Related Articles

    Internet Security Threat Report Reveals 81 Percent Increase in Malicious Attacks

    Cisco 2017 Midyear Cybersecurity Report predicts New “Destruction of Service” Attacks

    McAfee Labs Forecasts Growth in Mobile Ransomware and Security-Aware Attacks in 2014

    Cisco Midyear Security Report Highlights Weak Links in Dynamic Threat Landscape

    You must login or register in order to post a comment.

    Report Abusive Comment

    Subscribe For Free!
    • Print & Digital Edition Subscriptions
    • Security eNewsletter & Other eNews Alerts
    • Online Registration
    • Mobile App
    • Subscription Customer Service

    More Videos

    Popular Stories

    security-center

    The Top 5 Reasons Why Your Security Program Needs Intelligence Personnel

    Globe

    Which Countries Have the Worst and Best Cybersecurity?

    SEC0219-cover-Feat-slide_900px

    The Road to CSO: Meet Microsoft's New Security Leader

    Cyber Doors

    2018 Set a New Record for Security Vulnerabilities

    cyber-SMB

    8 Vulnerabilities Penetration Testers Recommend You Address in 2019

    20180222ENR_Skyward_Drones_360x184customcontent

    Events

    February 19, 2019

    Drones and Surveillance at MetLife Stadium

    Unmanned aerial systems pose a legitimate threat to sporting events in America. The devices are not only becoming cheaper and easier to own, but technology has advanced to such a point that virtually anyone — hobbyist or terrorist — can fly one. MetLife Stadium is home of the New York Jets and New York Giants, in addition to numerous entertainment events and concerts each year.

    February 26, 2019

    Harness Real-time Public Information to Improve Active Shooter Response

    Corporate security teams hope never to respond to an active shooter situation. But given today’s realities, companies spend a great deal of time developing guidelines, holding training sessions, and carrying out drills to ensure that their staff will be prepared in case an active shooter event occurs.
    View All Submit An Event

    Poll

    Employee Background Screening

    How Often Does Your Organization Conduct Background Screening on Employees?
    View Results Poll Archive

    Products

    Effective Security Management, 6th Edition

    Effective Security Management, 6th Edition

     Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

    See More Products
    Security-500

    Security Magazine

    SEC-Feb-2019-Cover_144px

    2019 February

    In Security’s February 2019 issue, meet Brian Tuskan, Microsoft's New Security Leader. Learn how he has used technology, his reputation, networking and a desire to help people to become Microsoft’s new CSO. Read about the Next Generation of White Hat Hackers, How to Evaluate Security's Role, and more.

    View More Subscribe
    • More
      • Market Research
      • Custom Content & Marketing Services
      • Security Group
      • Editorial Guidelines
      • Privacy Policy
      • Survey And Sample
    • Want More
      • Subscribe
      • Connect
      • Partners

    Copyright ©2019. All Rights Reserved BNP Media.

    Design, CMS, Hosting & Web Development :: ePublishing