Cisco 4Q10 Global Threat Report Featuring data from four core segments of Cisco Security: Intrusion Prevention System (IPS), IronPort, Remote Management Services (RMS), and ScanSafe. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco, the Cisco logo, and Cisco Systems are registered trademarks or trademarks of Cisco and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or website are the property of their respective owners. The use word does not imply a partnership relationship between 1 of © the 2011 Ciscopartner and/or its affiliates. All rights reserved. Cisco 4Q10 Global Threat Cisco Report and any other company. (1002R) Key Highlights • The rate of web malware encounters peaked in October 2010, at 250 average encounters per enterprise for the month; • Web malware grew by 139 percent in 2010 compared to 2009; • Search engine-related traffic resulted in approximately 8 percent of web malware encountered in 4Q10; • Malicious webmail resulted in only 1 percent of web malware encounters for the quarter; • Rustock botnet activity peaked during the first two weeks of December; • Legacy worms such as Conficker, MyDoom, Nachi, and Slammer continue to circulate; • Users flocked to BitTorrent in the wake of the WikiLeaks.org shutdown; • Global spam levels decreased dramatically in the fourth quarter, following a trend that started in August 2010. 2 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco 4Q10 Global Threat Report Introduction The proper security tools can prevent infection or stop outbreaks, mitigate or reduce losses from malicious events, and even decrease legal liability. But these products can also often serve as an excellent source of information about what is happening in your specific enterprise. Regular review and understanding of the logs produced by these tools and services can help you to benchmark what is normal and typical for your enterprise, which in turn provides a benchmark to spot unusual or atypical behavior that might be indicative of an advanced persistent threat or other intrusion. Correlating log information across various tools and services also provides a timely “pulse” of the threat landscape, which can sometimes have interesting tie-ins to global non-malware-related events. Most importantly, regular review and understanding of the data can help ferret out the elusive “black swan”-the types of surreptitious and malicious events that otherwise could fly below the radar. An excellent example of this was illustrated in the Cisco 3Q10 Global Threat Report which showcased the tell-tale signs of a Stuxnet intrusion discoverable via log analysis. The Cisco Global Threat Report is a compilation of data collected across four core segments of Cisco Security: Intrusion Prevention System (IPS), IronPort, Remote Management Services (RMS), and ScanSafe. The report is published quarterly in the hopes that it will inspire and motivate you to perform your own in-house analysis on an ongoing basis. Contributors to the Cisco Global Threat Report include: Gregg Conklin Raymond Durant John Klein Mary Landesman Shiva Persaud Tom Schoellhammer Chad Skipper Ashley Smith Henry Stern 3 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco 4Q10 Global Threat Report Cisco ScanSafe: Web Malware Events Enterprise users experienced an average of 135 web malware encounters per month in 2010, with the highest number of encounters (250 per month) occurring in October 2010. At 16,905, the number of unique web malware hosts was also highest in October. Collectively, there were a total of 38,811 unique web malware hosts resulting in 127,622 unique web malware URLs in the fourth quarter of 2010. Figure 1 Average Web Encounters per Enterprise, 2010 Figure 2 Unique Web Hosts, 2010 Figure 3 Unique Web Malware URLs, 2010 Source: Cisco ScanSafe Source: Cisco ScanSafe Source: Cisco ScanSafe 300 18000 60000 16000 250 50000 14000 200 12000 40000 10000 150 30000 8000 100 6000 20000 4000 50 10000 2000 0 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov 0 Dec Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov 0 Dec Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Search engine-related traffic resulted in approximately 8 percent of web malware encountered in the fourth quarter, with the majority occurring from Google (3.84 percent). The 3.84 percent quarterly average represents a remarkable decline; in the third quarter, Google search referrers resulted in 7 percent of all web malware encounters blocked by Cisco ScanSafe. Collectively, malicious webmail resulted in only 1percent of encounters for the quarter. Gumblar compromises resulted in an average of 2 percent in 4Q10, down substantially from its 17 percent peak in March 2010. Java exploits continued to outpace all other exploits for the year. At 6.5 percent on average for 4Q10, Java exploits were more than four times higher than exploits involving malicious PDF files. Figure 4 Gumblar, Search, and Top Exploits, 2010 Source: Cisco ScanSafe 18% 16% 14% Java 12% PDF 10% Flash Google 8% Yahoo 6% Bing/MSN 4% Gumblar 2% 0 Jan 4 Feb Mar Apr May Jun Jul © 2011 Cisco and/or its affiliates. All rights reserved. Cisco 4Q10 Global Threat Report Aug Sep Oct Nov Dec Dec Companies in the Pharmaceutical and Chemical and the Energy and Oil sectors continued to be at highest-risk of web malware throughout 2010. Other higher risk verticals throughout the year included Agriculture and Mining, Education, and Food and Beverage. The median rate for all verticals is reflected as 100 percent. Anything above 100 percent has a higher than median encounter rate and anything below 100 percent is below the median for all. Figure 5 Vertical Risk: Web Malware, 2010 Source: Cisco ScanSafe 0% 50% 100% 150% 200% 250% 300% 350% 400% 450% Pharmaceutical and Chemical Energy, Oil and Gas Agriculture and Mining Education Food and Beverage Media and Publishing Transportation and Shipping Engineering and Construction Banking and Finance HVAC, Plumbing, Utilities Government Travel and Entertainment Manufacturing Retail and Wholesale Healthcare Real Estate and Land Mgmt. Legal Charities and NGO IT and Telecommunications Aviation and Automotive Professional Services Putting It into Focus To help explain the impact of web-delivered malware, Cisco ScanSafe tracks a 15,000-seat focus customer’s web malware encounters in May of each year. The following chart illustrates in raw numbers the encounters experienced by this focus customer. It is worth noting that while the rate of encounters has continued to increase dramatically year over year since initial tracking in 2007, the actual rate of increase is declining. The largest increase, 226 percent, occurred in May 2008 compared to May 2007. The increase in May 2010 compared to May 2009 was significantly less, at 139 percent. Figure 6 R aw Web Malware Encounters, May YoY Source: Cisco ScanSafe 4000 3000 2000 1000 0 5 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco 4Q10 Global Threat Report May 2007 May 2008 May 2009 May 2010 Cisco IPS and RMS: The Inside Threat Botnet activity plays a role in everything from intellectual property theft to denial of service attacks and spam. Some botnets (such as GBot) wax and wane, while others such as Rustock maintain a steady, pervasive presence. The following chart illustrates botnet activity in 4Q10 for five high-profile bots. Figure 7 High-Profile Bots, 4Q10 Source: Cisco IPS 30000 25000 Rustock 20000 GBot Grumbot 15000 Pushdo (aka Cutwail) Swizzor 10000 5000 12/30/2010 12/28/2010 12/26/2010 12/24/2010 12/22/2010 12/20/2010 12/18/2010 12/16/2010 12/14/2010 12/12/2010 12/10/2010 12/08/2010 12/06/2010 12/04/2010 12/02/2010 11/30/2010 11/28/2010 11/26/2010 11/24/2010 11/22/2010 11/20/2010 11/18/2010 11/16/2010 11/14/2010 11/12/2010 11/10/2010 11/08/2010 11/06/2010 11/04/2010 11/02/2010 10/31/2010 10/29/2010 10/27/2010 10/25/2010 10/23/2010 10/21/2010 10/19/2010 10/17/2010 10/15/2010 10/13/2010 10/11/2010 10/09/2010 10/07/2010 10/05/2010 10/03/2010 10/01/2010 0 Both Cisco IPS and Cisco RMS for Security observed an upward trend in Gbot botnet activity during the fourth quarter. Gbot command and control traffic is relayed over HTTP rather than using IRC and SSH. Rustock activity also peaked in the fourth quarter. First discovered in 2006, Rustock installs a rootkit-enabled backdoor that most commonly has been associated with spam and scareware delivery. Figure 8 provides a daily breakdown of Rustock botnet traffic for the second half of 2010. Figure 8 Rustock Activity, 2H10 Source: Cisco IPS 1.80% 1.60% 1.40% 1.20% 1.00% 0.80% 0.60% 0.40% 0.20% 6 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco 4Q10 Global Threat Report 12/30/2010 12/23/2010 12/16/2010 12/09/2010 12/02/2010 11/25/2010 11/18/2010 11/11/2010 11/04/2010 10/28/2010 10/21/2010 10/14/2010 10/07/2010 09/30/2010 09/23/2010 09/16/2010 09/09/2010 09/02/2010 08/26/2010 08/19/2010 08/12/2010 08/05/2010 07/29/2010 07/22/2010 07/15/2010 07/08/2010 07/01/2010 0 Following are the top ten IPS signature events recorded by Cisco RMS in 4Q10: Figure 9 Top 10 Signature Firings, 4Q10 Source: Cisco RMS Signature Events Generic SQL Injection 45.86% Rustock Botnet 20.05% WWW WinNT cmd.exe Access 5.16% Gbot Command and Control Over HTTP 4.73% Cisco Unified Videoconferencing Remote Command Injection 4.00% Microsoft Internet Explorer Invalid Flag Reference Remote Code Execution 3.81% Web View Script Injection Vulnerability 3.02% B02K-UDP 2.28% Half-Open Syn 1.57% TCP Segment Overwrite 0.91% Old Worms Never Die January 2011 marks the 25th anniversary of Brain (the first PC virus) and the 7th anniversary of MyDoom, one of the most prolific email worms. While legacy boot sector and DOS file infectors have all but disappeared from the malware scene today, some types of threats, specifically worms, never seem to really die. To illustrate this point, Cisco IPS gathered signature event data for four older high-profile worms to demonstrate that despite their age, these worms continue to have an impact. Figure 10 Legacy Worm Activity, 4Q10 Source: Cisco IPS 0% 1.0% 0.5% 2.0% 1.5% 2.5% 3.0% 10/01/2010 10/08/2010 10/15/2010 10/22/2010 10/29/2010 11/05/2010 11/12/2010 11/19/2010 11/26/2010 12/03/2010 12/10/2010 12/17/2010 12/24/2010 12/31/2010 Conficker MyDoom Nachi Slammer World events also can have an impact on network traffic. One example: the events surrounding WikiLeaks.org subsequent to the site’s publishing of classified cables from the U.S. Department of State. When Amazon terminated service to WikiLeaks.org for violations of its terms of service, users flocked to distributed file-sharing networks to obtain copies of the leaked cables. 7 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco 4Q10 Global Threat Report Figure 11 illustrates BitTorrent activity in 4Q10. Note the steady level of activity through the majority of the quarter, with the sharp and prolonged increase in early December (coinciding with the termination). Figure 11 BitTorrent Events, 4Q10 Source: Cisco IPS 5% 4% 3% 2% 1% 12/30/2010 12/28/2010 12/26/2010 12/24/2010 12/22/2010 12/20/2010 12/18/2010 12/16/2010 12/14/2010 12/12/2010 12/10/2010 12/08/2010 12/06/2010 12/04/2010 12/02/2010 11/30/2010 11/28/2010 11/26/2010 11/24/2010 11/22/2010 11/20/2010 11/18/2010 11/16/2010 11/14/2010 11/12/2010 11/10/2010 11/08/2010 11/06/2010 11/04/2010 11/02/2010 10/31/2010 10/29/2010 10/27/2010 10/25/2010 10/23/2010 10/21/2010 10/19/2010 10/17/2010 10/15/2010 10/13/2010 10/11/2010 10/09/2010 10/07/2010 10/05/2010 10/03/2010 10/01/2010 0 The following charts depict the ten most active ports observed by Cisco RMS for Security in 4Q10. 8 Figure 12 External Port Activity, 4Q10 Figure 13 Internal Port Activity, 4Q10 Source: Cisco RMS Source: Cisco RMS Port 80 - 85.72% Port 8081 - 28.47% Port 25 - 2.62% Port 80 - 21.66% Port 21 - 1.12% Port 445 - 13.55% Port 161 - 0.67% Port 11290 - 10.13% Port 113 - 0.55% Port 161 - 5.07% Port 54736 - 0.4% Port 137 - 4.99% Port 20 - 0.4% Port 9102 - 2.48% Port 58523 -0.36% Port 443 - 2.32% Port 59446 - 0.35% Port 61001 - 2.02% Port 40436 - 0.34% Port 138 - 1.14% Other - 7.74% Other - 8.17% © 2011 Cisco and/or its affiliates. All rights reserved. Cisco 4Q10 Global Threat Report Cisco Ironport: Global Spam Trends Figure 14 Average Daily Spam Volumes by Month, 2010 Source: Cisco IronPort Spam volumes dropped considerably in 4Q10, with several key events throughout the year contributing to the decline. Notable events include the takedowns of botnet segments related to Lethic, Waledac, Mariposa, and Zeus in the first quarter, followed by a takedown of a branch of the Pushdo botnet in August 2010. Fourth quarter takedowns included segments of the Bredolab and Koobface botnets. Bn/Day 400 300 Also occurring in 4Q10 was the shutdown of SpamIt.org, a facilitating site for spam-related affiliate revenue. The site’s closure had a profound impact on pharma-related spam, which until then had been the highest overall category of spam. 200 100 Figure 14 illustrates the dramatic impact on spam levels that resulted from these events. The decline in spam volume was seen globally, as reflected in Figure 15. 0 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Figure 15 Top Spam Senders by Country, (Bn/Mo), 2010 Source: Cisco IronPort Bn/Month 1600 United States 1200 Russian Federation 800 India Brazil 400 Vietnam 0 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec It’s important to note that while spam volumes dropped considerably, attacks via email continued to plague some users. During the Christmas holiday period, an email holiday greeting purporting to be from the White House was sent to .mil and .gov addresses. Those recipients who clicked through to view the “greeting card” were instead greeted by a variant of the Zeus Trojan. This particular variant offloaded DOC, XLS, and PDF files to a remote server. Though quickly discovered, the attackers managed to steal over 2GB of potentially sensitive material. For more information on Cisco SIO, visit www.cisco.com/go/sio. 9 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco 4Q10 Global Threat Report