- If ChatGPT produces AI-generated code for your app, who does it really belong to?
- The best iPhone power banks of 2024: Expert tested and reviewed
- The best NAS devices of 2024: Expert tested
- Four Ways to Harden Your Code Against Security Vulnerabilities and Weaknesses
- I converted this Windows 11 Mini PC into a Linux workstation - and didn't regret it
How to Monitor Network Traffic: Findings from the Cisco Cyber Threat Trends Report
The threat landscape is full of moving targets. Over time, popular tools, tactics, and procedures change. Malicious techniques fall out of fashion, only to come roaring back months, if not years, later. All the while, security practitioners monitor network traffic and adapt their defenses to protect their users and networks. Keeping on top of these trends is one of the most challenging tasks for any security team.
One great area to look for trends is in malicious DNS activity. These days almost all malicious activity requires an internet connection to successfully carry out an attack. For example, an attacker uses a backdoor to connect to a remote system and send it instructions. Information stealers need a connection to malicious infrastructure to exfiltrate sensitive data. Ransomware groups need to be able to “flip the switch” remotely to encrypt the victim’s systems.
In our latest report, Cyber Threat Trends Report: From Trojan Takeovers to Ransomware Roulette, we take the extraordinary volume of malicious domains that Cisco sees and blocks—over 1 million every hour—and examine it for malicious trends and patterns. This data comes to us thanks to the DNS-layer security that is available in Cisco Umbrella and Cisco Secure Access.
Let’s take a closer look at how we conducted this research, a couple trends highlighted in the report, and what you can do to better defend against these threats.
How the DNS data was analyzed for the report
To create a clear picture from such a large data set, we looked at the categories Umbrella applies to known malicious domains. These Threat Type categories are functional groupings of threats that use similar techniques in their attacks.
We examined an eight-month time frame (August 2023–March 2024) and figured out the monthly average volume for each Threat Type category. To examine the trends, we then calculated how much each month was above or below the average volume. This gives us a simplified look at how threat activity changes over time.
This is where patterns began to emerge from large batches of malicious internet traffic, and the results are quite interesting. To illustrate, we’ll look at the three most active threat type categories found in this report.
Information Stealers
The threat category that saw the most activity during the time frame was information stealers. This comes as no surprise, as it is a category that includes exfiltrating large batches of documents and monitoring audio/video communications will generate a large amount of DNS traffic.
An interesting trend appears here— three months of above-average activity, followed by one month of below-average activity. We speculate that these drops in activity could be tied to attack groups processing the data they steal. When faced with a mountain of documents and recordings to sift through, sometimes it makes sense to take a break to catch up.
Trojans vs Ransomware
Next, let’s compare two seemingly disparate categories: Trojans and ransomware. Trojan activity was highest in the beginning of our time frame, then declined over time. This activity doesn’t indicate that the use of Trojans is falling out of favor but rather highlights the ebb-and-flow nature we often see in the threat landscape. When Trojan activity declines, we often see other threat types rise.
In contrast to Trojan activity, ransomware activity appears to be trending in the other direction. The first few months of the time frame saw below average activity, but then in January it jumped well above average and stayed that way.
Why might these two differing threat types be trending in opposite directions? In many cases threat actors will utilize Trojans to infiltrate and take over a network, and then once they’ve gained sufficient control, deploy ransomware.
These are just a couple examples of trends from the Cyber Threat Trends Report. In the report we cover several additional categories, including some that follow similar patterns to Trojans and ransomware.
How to protect and monitor your own network traffic
An internet connection is a primary component of modern-day threats. So why not block that internet connection to block threats? By monitoring and controlling DNS queries, security practitioners can often identify and block malicious traffic before it reaches end-users devices. Some high-level suggestions, covered in more detail in the report, include the following:
- Leveraging DNS Security
- Protecting Your Endpoints
- Implementing a Security Defense Strategy
Cisco has a unique vantage point here. You can’t protect what you can’t see, and because we resolve an average of 715 billion daily DNS requests, we see more threats, more malware, and more attacks than just about any other security vendor.
With over 30,000 customers already choosing Cisco as their trusted partner in DNS-layer security, organizations can be confident that their users will be better protected through their ongoing hybrid work, cloud transformation, and distributed environments:
- Cisco Umbrella is part of the Cisco Security Service Edge (SSE) product family, powering secure internet access for all Cisco SSE solutions. Umbrella uses DNS to stop threats over all ports and protocols to stop malware earlier and prevent callbacks to attackers if infected machines connect to our network.Tune in on June 26 to learn more at our Cisco Umbrella Live Demo: Streamline cloud security and embrace an SSE or SASE architecture
- Cisco Secure Access is the newest addition to our Security Service Edge (SSE) product family, providing an extended set of security capabilities, including secure web gateway (SWG), cloud access security broker (CASB), zero trust network access (ZTNA), remote browser isolation (RBI), data loss prevention (DLP), cloud malware detection, and more.Register to attend one of our upcoming sessions for a Cisco Secure Access Live Demo: A smarter way to secure access to the internet, SaaS, and private apps.
Learn more
Download the full report for more key insights on the current threat landscape:
Cyber Threat Trends Report: From Trojan Takeovers to Ransomware Roulette
Learn more about the findings from the new Cyber Threat Trends report where I’ll share further insights on this research, in our webinar on June 20th, 2024: The Web’s Most Wanted – A Cyber Threat Trend Briefing
We’d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social!
Cisco Security Social Channels
Instagram
Facebook
Twitter
LinkedIn
Share: