Cybercrime is a real and serious issue for all types of businesses today, with attacks increasing in both complexity and frequency daily. Cisco detects and prevents an average of 320 million cyber-attacks each day; a figure which has grown substantially year after year. In today’s hyper-connected, digitised world, the rise of the Internet of Everything (IoE) – the networked connection of people, processes, data and ‘things’ – increases the likelihood of cyberattack as networks are expanding exponentially. As a result, there are essentially two types of companies today; those that have been hacked and those that don’t yet know they have been hacked.
Cisco’s threat intelligence team has investigated the current threat landscape and the ways in which adversaries are creating ever intelligent, resilient and evasive ways to breach systems and avoid detection. As detailed in Cisco’s Midyear Security Report (MSR), here is what we’ve seen in 2015 so far:
Angler attacks on the rise
Flash is back
Throughout the first half of 2015 we have seen a 62 percent rise in the number of Adobe Flash Player vulnerabilities, rising from 41 percent in 2014. One of the key reasons for this spike is that although Adobe frequently updates its Flash Player, users are struggling to keep on top of patches or are unaware that such updates exist altogether. In order to exploit vulnerabilities in outdated versions, adversaries are innovating rapidly to launch their attacks during this patching gap. As adversaries are integrating such techniques into widely used exploit kits, such as Angler and Nuclear, it is becoming ever more difficult for security teams to keep up.
Sense and Sensibility
Exploit kit authors are becoming increasingly crafty by incorporating texts from 19th century literature into landing pages that host their exploit kits. More specifically, we’ve seen authors using lines from Jane Austen’s classic Sense and Sensibility to conceal malicious content. Adding classic text, or even contemporary excerpts such as magazine articles or blogs, is more effective than the traditional technique of random text as antivirus solutions are more inclined to categorise the webpage as legitimate. Users themselves may be puzzled by such references on a webpage but not necessarily concerned, giving adversaries the chance to launch their attacks.
Ransomware has become an increasingly profitable business
Security as a process
These threats however, are only a portion of the cybersecurity challenges that organisations face today as the innovation race between adversaries and security vendors and teams is accelerating. Cybersecurity reportedly costs the global economy between $375bn and $575bn annually, and 2015 is proving to be a year of an unprecedented number of innovative and evasive cyberattacks.
Pre-empting and addressing all sources of risk is ever more pertinent with the transformation of the digital economy and the growth in the IoE. Although the IoE offers immense value for industries, businesses and individuals alike, this ever-expanding connectivity is equally, and unfortunately, creating opportunities for hackers too. Cisco estimates that by 2020 there will be more than 50 billion devices connected to the Internet, and as the network extends and its access points proliferate, cybercriminals are increasingly finding loopholes and vulnerabilities to exploit.
Complete visibility over the network is the only way to detect, let alone address, anomalous behaviour, yet worryingly, too many businesses are not fully aware of what devices and applications are on the network. It is therefore critical that organisations consider an integrated threat defense architecture, one which embeds security everywhere; across the entire network and all of its access points.
The most effective way to mitigate all sources of risk and deflect even the most sophisticated of threats is to adopt a holistic approach to security that addresses the entire threat continuum – before, during and after an attack. As opposed to deploying point product solutions on an ‘as when needed’ basis, organisations must treat security as a business process by systemically reviewing potential sources of risk and effectively aligning the right people, processes and technology to mitigate them.
Terry Greer-King is director, cyber security, at Cisco UK&I
Are you a security pro? Try our quiz!
Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector
Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…
Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…
Judge Kaplan praises former FTX CTO Gary Wang for his co-operation against Sam Bankman-Fried during…
Explore the future of work with the Silicon In Focus Podcast. Discover how AI is…
Executive hits out at the DoJ's “staggering proposal” to force Google to sell off its…