All companies host some kind of malware

One hundred percent of companies end up calling malicious malware hosts, according to Cisco’s 2014 Annual Security Report.

06/23/2014


One hundred percent of companies end up calling malicious malware hosts, according to Cisco's 2014 Annual Security Report. Cisco also believes that the length of time that such activity persists means network penetrations end up undetected.

Java is the leader of endpoint vulnerabilities, Cisco said, with far more exploits than either Flash or PDF: 91% of the live endpoint exploits detected by the Sourcefire FireAMP system attacked Java. Adobe Reader only managed 3% of detections (equal to Excel), with Word exploits at 2% and PowerPoint exploits at 1%.

Mobile malware is an emerging but still small part of the threat market, with Cisco saying it made up just 1.2% of the Web malware encounters it recorded. Android is far and away the most popular target at 99% of the attacks. Spyware and adware are emerging as Android threats, the report said.

Cisco said companies can expect distributed denial of service (DDoS) campaigns to last longer, with the company's CSO John Stewart quoted in the report as saying we should "expect future campaigns to be even more extensive and to last for extended periods." As an added twist, DDoS campaigns act as a diversion for other attacks such as fraud. All of this, the report said, will end up exacerbated by an ever-more acute skills shortage in the security industry.

Below are key findings from the Cisco 2014 Annual Security Report:

Attacks against infrastructure are targeting significant resources across the Internet.

  • Malicious exploits are gaining access to web hosting servers, name servers, and data centers. This suggests the forming of uberbots that seek high-reputation and resource-rich assets.
  • Buffer errors are a leading threat, at 21% of the Common Weakness Enumeration (CWE) threat categories.
  • Malware encounters are shifting toward electronics manufacturing and the agriculture and mining industries at about six times the average encounter rate across industry verticals.

Malicious actors are using trusted applications to exploit gaps in perimeter security.

  • Spam continues its downward trend, although the proportion of maliciously intended spam remains constant.
  • Java comprises 91% of web exploits; 76% of companies using Cisco Web Security services are running Java 6, an end-of-life, unsupported version.
  • "Watering hole" attacks are targeting specific industry-related websites to deliver malware.

Investigations of multinational companies show evidence of internal compromise. Suspicious traffic is emanating from their networks and attempting to connect to questionable sites (100% of companies are calling malicious malware hosts).

  • Indicators of compromise suggest network penetrations may be undetected over long periods.
  • Threat alerts grew 14% year over year; new alerts (not updated alerts) are on the rise.
  • 99% of all mobile malware in 2013 targeted Android devices. Android users also have the highest encounter rate (71%) with all forms of web-delivered malware.

Cisco plays a critical role in evaluating threats, given the prevalence of its solutions and the breadth of its security intelligence:

  • 16 billion web requests are inspected every day through Cisco Cloud Web Security
  • 93 billion emails are inspected every day by Cisco's hosted email solution
  • 200,000 IP addresses are evaluated daily
  • 400,000 malware samples are evaluated daily
  • 33 million endpoint files are evaluated every day by FireAMP
  • 28 million network connects are evaluated every day by FireAMP

This results in the following threats being detected by Cisco:

  • 4.5 billion emails are blocked every day
  • 80 million web requests are blocked every day
  • 6,450 endpoint file detections occur every day in FireAMP
  • 3,186 endpoint network detections occur every day in FireAMP
  • 50,000 network intrusions are detected every day

Gregory Hale is the editor and founder of Industrial Safety and Security Source (ISSSource.com), a news and information website covering safety and security issues in the manufacturing automation sector. This content originally appeared on ISSSource.com. Edited by Brittany Merchut, Project Manager, CFE Media, bmerchut(at)cfemedia.com 



No comments
The Top Plant program honors outstanding manufacturing facilities in North America. View the 2015 Top Plant.
The Product of the Year program recognizes products newly released in the manufacturing industries.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
Strategic outsourcing delivers efficiency; Sleeve bearing clearance; Causes of water hammer; Improve air quality; Maintenance safety; GAMS preview
World-class maintenance: The three keys to success - Deploy people, process and technology; 2016 Lubrication Guide; Why hydraulic systems get hot
Your leaks start here: Take a disciplined approach with your hydraulic system; U.S. presence at Hannover Messe a rousing success
Flexible offshore fire protection; Big Data's impact on operations; Bridging the skills gap; Identifying security risks
The digital oilfield: Utilizing Big Data can yield big savings; Virtualization a real solution; Tracking SIS performance
Getting to the bottom of subsea repairs: Older pipelines need more attention, and operators need a repair strategy; OTC preview; Offshore production difficult - and crucial
Applying network redundancy; Overcoming loop tuning challenges; PID control and networks
Putting COPS into context; Designing medium-voltage electrical systems; Planning and designing resilient, efficient data centers; The nine steps of designing generator fuel systems
Package boilers; Natural gas infrared heating; Thermal treasure; Standby generation; Natural gas supports green efforts

Annual Salary Survey

Before the calendar turned, 2016 already had the makings of a pivotal year for manufacturing, and for the world.

There were the big events for the year, including the United States as Partner Country at Hannover Messe in April and the 2016 International Manufacturing Technology Show in Chicago in September. There's also the matter of the U.S. presidential elections in November, which promise to shape policy in manufacturing for years to come.

But the year started with global economic turmoil, as a slowdown in Chinese manufacturing triggered a worldwide stock hiccup that sent values plummeting. The continued plunge in world oil prices has resulted in a slowdown in exploration and, by extension, the manufacture of exploration equipment.

Read more: 2015 Salary Survey

Maintenance and reliability tips and best practices from the maintenance and reliability coaches at Allied Reliability Group.
The One Voice for Manufacturing blog reports on federal public policy issues impacting the manufacturing sector. One Voice is a joint effort by the National Tooling and Machining...
The Society for Maintenance and Reliability Professionals an organization devoted...
Join this ongoing discussion of machine guarding topics, including solutions assessments, regulatory compliance, gap analysis...
IMS Research, recently acquired by IHS Inc., is a leading independent supplier of market research and consultancy to the global electronics industry.
Maintenance is not optional in manufacturing. It’s a profit center, driving productivity and uptime while reducing overall repair costs.
The Lachance on CMMS blog is about current maintenance topics. Blogger Paul Lachance is president and chief technology officer for Smartware Group.
This article collection contains several articles on the vital role that compressed air plays in manufacturing plants.
This article collection contains several articles on the Industrial Internet of Things (IIoT) and how it is transforming manufacturing.
This article collection contains several articles on strategic maintenance and understanding all the parts of your plant.
click me