Cisco 2015 Annual Security Report | Regional Data Sheet | AMER
Attack Methods for Distributing Malware, by Region
Figure 1 shows the techniques adversaries are using most often to distribute malware.
The findings in these charts are based primarily on where blocks of web malware
occurred (that is, encounters), according to Cisco Cloud Web Security data, versus
types of threats on the web.
In AMER, users were targeted primarily by malicious scripts; iframe injections were
a distant second.
Spammers Up Their Game to Outwit Consumers
Worldwide spam volumes are on the rise, indicating that spam is still a lucrative
vector for online criminals. Adversaries continue to refine messages so that spam
is more likely to fool recipients into clicking on dangerous links, often using social
engineering tactics.
While spam volume has generally been on the decline in the United States in 2014,
levels rose in other countries during the same time period (Figure 2). Cisco Security
Research suggests that this indicates some malicious actors may be shifting their base
of operations. The rise in spam volume in some countries may also be a sign that
other regions are catching up to the United States in terms of spam production, as
the country has long been a leading source of worldwide spam. Ultimately, the United
States ended the year higher.
Figure 1. Attack Method Distribution, AMER
Regional Data Sheet, AMER
Cisco 2015 Annual Security Report
As dynamic as the modern threat landscape is,
there are some constants:
Adversaries are committed to continually refining or developing new techniques that can
evade detection and hide malicious activity. Meanwhile, security teams must constantly
improve their approach to protecting the organization and users from these increasingly
sophisticated campaigns. In the AMER Region, the Cisco 2015 Annual Security Report
presents the following:
Total %Attack Method
24.93%
17.43%iFrame Injection
13.63%Exploit
10.35%
10.06%
OI (detection malware)
Script
Trojan
Source: Cisco Security Research
Signs of Security Sophistication
The Security Capabilities Benchmark Study highlights the hallmarks of organizations that
are more sophisticated in their security posture than others. These hallmarks include:
►► Executive leadership that prioritizes security
►► Clear, well-documented policies and procedures
►► Integrated tools that work together
Organization Security Sophistication
In comparing the security sophistication level of organizations by country, there’s more
good news: Highly sophisticated organizations are the majority in every segment.
However, respondents in some countries appear to have a more positive view of their
own security stance than the outside world does. Overly confident perceptions from
respondents in some countries may be due in part to core social values of a culture,
such as the need to present one’s self—and thus, one’s organization—in a positive light.
Figure 4. Most companies fit more sophisticated security profiles—this is true in all
countries and industries
Cisco 2015 Annual Security Report | Regional Data Sheet | AMER
Figure 3. Highest-Risk Verticals for
Malware Exposure
Source: Cisco Security Research
United States
Brazil
Taiwan
0.00% (1% 11/14)
India
China
25.00% (29% 11/14)
Russia
3.00% (3% 11/14)
Vietnam
Korea, Republic of
1.00% (1% 11/14)
2.00% (3% 11/14)
DecreaseIncrease
0.00%
Change in % from Jan. to Nov. 2014 (November %)
(2% 11/14) 1.00% (2% 11/14)
6.00% (20% 11/14)
Figure 2. Spam Volumes by Country
Segment distribution varies by country, but more mature segments dominate in all
Segment Sizing
United States Brazil
44%
16%
27%
10%
3%
34%
35%
24%
5%
2%
High Upper-Mid Middle Low-Mid Low
Source: Cisco Security Capabilities Benchmark Study
magnitude
2.8Media and Publishing
2.4Accounting
1.1
1.1
Telecommunications
IT and
Utilities
AMER
Foo
Insu
Man
Med
EM
Aviation 5.0 Agr
Source: Cisco Security Research
Americas Headquarters
Cisco Systems Inc.
San Jose, CA
Asia Pacific Headquarters
Cisco Systems (USA) Pte. Ltd.
Singapore
Europe Headquarters
Cisco Systems International BV
Amsterdam, The Netherlands
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco
trademarks, go to www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners, The use of the word partner
does not imply a partnership between Cisco and any other company. (1110R)
Download Cisco 2015
Annual Security Report
www.cisco.com/go/asr2015
Be the first to comment