New Threats Emerging: Cisco Report

Tuesday, August 19, 2014 @ 06:08 PM gHale


Pharmaceutical and chemical industries saw the biggest increase in cyber attacks so far this year, a new report said.

The new mid-year report from Cisco on the state of cyber security also looks at new ways hackers are gaining access to corporate and private computers.

RELATED STORIES
Social Network Security Risks Rampant
Faux Security Program is a RAT
Android RAT can Take Control
APT: In Action for Six Years
IoT Devices Vulnerable to Attacks: Report

Of the 16 multinational corporations surveyed, 90 percent of their computer systems were reaching out to corrupted IP hosts on the Internet, according to the Cisco 2014 Midyear Security Report.

There were 1,633 software vulnerabilities discovered in the first half of the year with 28 of them actively exploited, said Levi Gundert, senior expert on Cisco’s threat research, analysis and communications team.

In addition to the pharmaceutical and chemical industries seeing increases in activity, publishing and media were right behind. Nation-states, as well as criminals, are behind these attacks, although it isn’t always clear what their motivation may be, he said. The agriculture industry in the Asia-Pacific region also saw an increase in attacks.

“Mal-vertising” is the new buzzword as hackers use popular advertising exchanges to plant malware on unsuspecting users’ computers, Gundert said. Companies such as Google or AdNexus place the ads in slots on popular websites.

“Bad guys insert advertisements that do nothing but redirect users to the exploit kit landing site,” he said. “The websites don’t control it. The advertising exchange controls it,” he said. A computer landing on such a site can end up infected with malware without the user clicking on the ad, he said.

The Senate Homeland Security and Governmental Affairs permanent subcommittee on investigations released a report about mal-vertising in May.

Just as an advertiser can target a specific demographic, hackers using mal-vertising can do the same.

In other information from the report, Java continues to be the software favored by those searching for vulnerabilities, Gundert said, with 93 percent of web exploits using it. Just updating Java isn’t always possible for companies, some of which base their enterprise applications on the software. Doing so could “break” their applications.

In this day of automated technology even for the bad guys, there are a host of new toolkits that allow almost anyone with criminal intent to break into computers. Exploit kits are software packages hackers can purchase for as little as $1,500. They are easy to use. All it takes are basic computer skills to create and launch malware. Blackhole was the most popular kit until its creator ended up arrested last fall.

Since that arrest, there has been a decrease in the amount of traffic driven by exploit kits, but other developers are offering new products, he said.

New exploit kit creators are competing with each other on price and customer service. They have turned their enterprises into a software as a service model. Users can log into a control panel, see how many computers in which countries now suffer from infection and which applications caused it.

Click here to register to download the report.



Leave a Reply

You must be logged in to post a comment.