Supported by:
Ministry of Informatization and Communication of the Republic of Tatarstan
Ministry of Economy of the Republic of Tatarstan
Agency for Investment Development of the Republic of Tatarstan
+7 (495) 780-71-98
October 2019
Kazan, Tatarstan
IoT in action: from strategy to results
IoT solutions
+ IoT Leadership Programme от Cass Business School
Cisco semi-annual report on cyber security: the horizon of cyber attacks in IoT has expanded significantly

One of the world leaders in the field of high technologies, Cisco, prepares annually analytical report on current trends in the direction of "cyber security".

The report is issued two times a year and offers results of the data received analysis as well as practical recommendations for improving protection.

It’s been analyzed in the report of the first half of 2017 the latest information about threats, obtained through the system of collective analytics of cyber security Cisco Collective Security Intelligence. The report was based on the data received from 40 billion metering points daily.

 Recent attacks by WannaCry and Nyetya have demonstrated the spreading speed and coverage of malware that looks like ransomware, but in fact it can cause much more significant disruption, so-called "service interruption" attacks that can do worse damage than traditional attacks, not leaving the business a restore option (they are able to destroy backups and backup systems that organizations need to restore data and systems after attack).

More and more operations in key industries with Internet of things are transferred into online mode, which expands the horizon of attacks, increases their scale and compounds consequences.

It’s been noted in the report that Internet of things continues to give the attackers new chances, and its vulnerabilities will play a major role in launching new campaigns with increasing damage.

Key points. What worth to fear most?

  • There are new methods that attackers use to deliver and disguise malware. According to Cisco, attackers are increasingly pushing the intended victim to perform certain actions to activate the attack (clicking on the link, opening the file) and also increasingly using non-file malware that is completely located in memory, making it difficult to find and analyze it because it is deleted when the device reboots. Also cybercriminals use anonymous and decentralized infrastructures, such as Tor, to disguise their product management infrastructure and make it more difficult to block.
  • A number of spam are significantly increasing because attackers use proven methods such as e-mail to send malware and get the profit. According to Cisco experts, the amount of spam with malicious attachments will continue to grow while it’s been seeing multidirectional trends in the field of exploit-kits.
  • Meanwhile spyware and adware, security professionals often dismiss, believing that it is more annoying than hurting, continue to hold positions and create risks for enterprises. In particular Cisco, having examined 300 companies for 4 months, found that 20% of them had three common types of spyware. In business environment such software can steal users and business information, weaken devices protection and increase the infection risks with malware.
  • Evolution of ransomware, in particular, the growing popularity of such programs, offered as a service (Ransomware-as-a-Service), makes it easier for criminals to carry out such attacks even in the absence of appropriate qualifications. In 2016 ransomware "earned" more than 1 billion dollars. But this can distract organizations from other, less known, but much more dangerous attacks.

There are also positive trends according to Cisco report: from November 2015 the company reduced the average detection time from 39 to almost 3.5 hours. This reduction in time plays a significant role in limiting the scope of the attack and accelerating the recovery in order to limit negative consequences for business.

You can find a full version of Cisco report about security information for the first half of 2017 by clicking on the link.

The problem of cyber security is one of the key points in the agenda of today's business space, so it will be given a special attention in the speech program of IoT World Summit Russia 2017 speakers within streams: SMART Cities, SMART Industry, SMART Service, SMART Agro and SMART Technologies. Registration for participation in the summit is already open

In order to receive program details of the event and also special offers of IoT World Summit Russia 2017 we recommend you to subscribe for free analytical digest of the summit. To do so leave, please, your email address in the bottom field of the main page and click "Subscribe".

Our events

Other news