Cisco’s Annual Security Report Also Finds 2010 Marks First Year Internet Spam Volume Declined
SAN JOSE, Calif. – Jan. 20, 2011 – In a major cybercrime turning point, scammers have begun shifting their focus away from Windows-based PCs to other operating systems and platforms, including smart phones, tablet computers, and mobile platforms in general, according to the Cisco® 2010 Annual Security Report, released today. The report also finds that 2010 was the first year in the history of the Internet that spam volume decreased, that cybercriminals are investing heavily in “money muling,” and that users continue to fall prey to myriad forms of trust exploitation.
In response to the last decade of cyber-exploits targeting PC operating systems, PC platform and application vendors have shored up security in their products and taken a more aggressive approach to patching vulnerabilities. As a result, scammers are finding it harder to exploit platforms that were once their bread and butter — in particular, the Windows platform — and are looking elsewhere to make money. Just as important in driving this trend is the widespread adoption of mobile devices and applications. Third-party mobile applications in particular are emerging as a serious threat vector.
The Cisco Annual Security Report also includes winners of the 2010 Cisco Cybercrime Showcase and discusses the impacts of social media, cloud computing, spam and global cybercrime activities on network security.
- Spam: 2010 marks the first year of declining spam volume in the history of the Internet. Despite this good news, 2010 saw an uptick in spam in developed economies where broadband connections are spreading, including France, Germany and the United Kingdom. In the United Kingdom, for example, spam volume rose almost 99 percent from 2009 to 2010. The good news is that Brazil, China and Turkey — all of which figured high on last year’s list of spammed nations — showed significantly lower volumes in 2010. In particular, Turkey’s spam volume dropped 87 percent. This reduction is due in part to the high-profile takedowns of botnets like Waledac and Pushdo/Cutwail, attributed largely to researcher Thorsten Holz (see the Cisco Cybercrime Showcase) and ISPs restricting malicious e-mail from broadband networks. In addition, authorities are taking the spam problem more seriously and are looking to take down egregious offenders.
- Money Muling: As the cybercriminal economy expands and criminals gain access to even more financial credentials, there is a growing need for money mules — people recruited to set up bank accounts, or even use their own bank accounts, to help scammers “cash out” or launder money. Money muling operations are becoming more elaborate and international in scope, and Cisco security experts anticipate they will be a major focus of cybercriminal investment in 2011.
- Trust Exploitation: Most cybercrime exploits hinge not only on technology but also on the all-too-human tendency to misplace trust. The Cisco Annual Security Report lists seven “deadly weaknesses” that cybercriminals exploit through social engineering scams — whether in the form of e-mails, social networking chats or phone calls. The seven weaknesses are sex appeal, greed, vanity, trust, sloth, compassion and urgency.
- Cisco Global ARMS Race Index: Cisco’s Global Adversary Resource Market Share (ARMS) Race Index was designed to track the overall level of compromised resources worldwide and, over time, to provide a better picture of the online criminal community’s rate of success at compromising enterprise and individual users. According to data collected for the 10-point index, the level of resources under adversarial control worldwide at the end of 2010 was down almost a half a point from the December 2009 level of 7.2 reported in the Cisco 2009 Annual Security Report.
- The 2010 Cisco Cybercrime Showcase: The second annual Cisco Cybercrime Showcase presents two awards for 2010 — one acknowledging the outstanding contributions of a security professional in the fight against cybercrime (the “Good,” Thorsten Holz, Ruhr-University Bochum, Germany/LastLine), the other the most threatening malware (the “Evil,” Stuxnet).
- Cisco Cybercrime Return on Investment (CROI) Matrix: The Cisco CROI Matrix, which made its debut in the Cisco 2009 Annual Security Report, analyzes types of cybercrime that Cisco’s security experts predict profit-oriented scammers will channel their resources toward in 2011. Based on performance in 2010, the matrix predicts that the data-theft Trojans such as Zeus, easy-to-deploy Web exploits, and money mules will continue to rise in prevalence in 2011. The “wait and see” moneymakers include mobile malware, with Zeus already being adapted for the mobile platform in the form of SymbOS/Zitmo.Altr (“Zitmo” stands for “Zeus in the Mobile”). Social networking scams, on the other hand, will not be a significant area for cybercriminals to invest resources in 2011, despite ranking in last year’s report in the Potentials category. That does not mean that social networking scams are declining; they are simply a small part of a bigger plan — launching Web exploits like the Zeus Trojan.
- Patrick Peterson, fellow, Cisco:
“Everyone knows the joke about the two hikers and the hungry bear in which the swifter hiker explains his footrace is not against the bear but the other hiker. The cybercriminal bears have been feasting on the “slowest hiker” Windows platform for the last decade. But with increased security in the Windows operating system and applications, the bears are looking elsewhere to satisfy their hunger. Mobile and emerging operating systems are hikers that the bears have largely ignored until now, but they are beginning to look much more appealing. These bears are also finding opportunities in the explosion in mobile-device usage, where we’re seeing a growing number of exploits aimed specifically at mobile users.”
- Cisco Fellow, Patrick Peterson, Highlights Findings from the Cisco 2010 Annual Security Report
- Blog post by Cisco’s Tom Gillis – Scammers Go Mobile. Read All About.
- Cisco Security Intelligence Operations
- Visit the Cisco Security Blog – http://blogs.cisco.com/security
- Follow Cisco Security on Twitter – http://twitter.com/ciscosecurity
Cisco, annual security report, social media, social networks, awards, network security, mobile, vulnerabilities, exploits, spam, virus, malware, enterprise security, money mules.
About Cisco Systems
Cisco (NASDAQ:CSCO, news, filings) is the worldwide leader in networking that transforms how people connect, communicate and collaborate. Information about Cisco can be found at http://www.cisco.com. For ongoing news, please go to http://newsroom.cisco.com.
# # #
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. A listing of Cisco’s trademarks can be found at www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company.