“Murphy's Law of Hackers” or Cisco’s Security 2010 Report

“The more complex things become, the more vulnerable”

http://www.cisco.com/en/US/prod/collateral/vpndevc/security_annual_report_2010.pdf

 

This isn’t Murphy's Law. It’s mine:  “The more complex things become, the more vulnerable”.

 

This is dedicated to tazgecko for reminding me to get off my duff and do this article. Thanks, mate, and an early, Happy Oz Day to you!

 

So, Cisco has put out it's 2010 Security Report analyzing events and projecting trends for 2011.

Link: http://www.cisco.com/en/US/prod/collateral/vpndevc/security_annual_report_2010.pdf

 

 

The Good:

There have been several large botnets “taken down” as a result of heightened Law Enforcement activity and prosecution. This has resulted in much less spam (90% less, in fact), and fewer attacks, but the number and rate are still alarming.

Also, large software vendors like Microsoft and Apple have been improving updates and notifications to customers about potential/actual flaws and patches or other “mitigators”.

The Bad:

Apple has been forced to deploy more than sixty patches to it's iOS 4 mobile platform and the Zeus-Trojan targeting Symbian OS phones are proof that miscreants are trying to exploit “Zero Day” vulnerabilities. I've reported on that in prior articles with respect to iE and all Windows OS's except W7.

Simply put, we're seeing evolution at work: Our “antibiotics” are creating more and more cybercriminals seeking easier “targets of opportunity”. The cybercriminals are moving from the desktop to the mobile devices.

Worse, efforts at “jail breaking” phones and other devices removes them from the security umbrella that was built into limiting their “point of access”.

The Stuxnet trojan/virus is another example, although it's purported use against Iran's nuclear effort was “good”, it will be modified by hackers for “bad” ends: Identity theft and other nefarious purposes.

So, while brief, and these are just some of the high points (or low points) from the forty five page Cisco Report, this summary should “encourage” you to “be careful out there”.

32,453 views 19 replies
Reply #1 Top
Good job on this Doc. About time too.... :CONGRAT: 
Reply #2 Top

You look like Bones McCoy and sound like Phil Esterhaus! ;)

Basically, every "tool" can be used for good or bad depending upon in whose hands the tool resides.  Computers are seen as good - yet they are the primary tool of hackers.  I guess as Apple innovates more (and grabs a large share of new markets), they find out what Microsoft has known all along - nothing is impregnable.

And the DrJBHL Law?  Somethings are truisms that need no proof.  Yours being one of them (and Murphy's another ;) ).

Reply #3 Top

Rats. And here I was thinking I was being brilliant and insightful. :grin:

Reply #4 Top

Rats. And here I was thinking I was being brilliant and insightful.

"I'm a Doctor Jim ... not a genius"

Reply #5 Top

There have been several large botnets “taken down” as a result of heightened Law Enforcement activity and prosecution. This has resulted in much less spam (90% less, in fact)

I wondered why my spam had dropped off so much, not that I'm complaining. A year or so ago I was getting at least 10x's as much as I am now.  Yay, go team go!!!

Reply #6 Top

Yep..that's good news, but the criminals go to where the pickins' are easier... these aren't hard workers.

A pity they don't turn their skills toward a constructive project, isn't it?

Reply #7 Top

Quoting Uvah, reply 4

Rats. And here I was thinking I was being brilliant and insightful.
"I'm a Doctor Jim ... not a genius"

Zing! :grin:

Reply #8 Top

BUMP!!!

Watched this on HungryBeast , thought it was worth posting ...

"In June last year, a computer virus called Stuxnet was discovered lurking in the data banks of power plants, traffic control systems and factories around the world.

Pandora’s box has been opened; on the new battlefield the aggressors are anonymous, the shots are fired without starting wars and the foot soldiers can pull their triggers without leaving their desks.

Last week the United States government announced they would retaliate to a cyber-attack with conventional force. The threat is real, and the age in which a computer bug could cost lives has begun."

 

Reply #9 Top

Quoting tazgecko, reply 8
"In June last year, a computer virus called Stuxnet was discovered lurking in the data banks of power plants, traffic control systems and factories around the world.

As a corollary - in the old days, bugs were small, compact, and not as versatile.  They had to be,   Memory was expensive (and at least on the PC side, limited).  Now bugs - like Stuxnet - are malware bloatware.  But they do the job. Unfortunately.

Reply #10 Top

That video is some scary shit.

Reply #11 Top

Quoting Dr, reply 9
But they do the job.

Depends who's doing what to whom (and why): Case in point - Israel and Iran... I don't believe Israel built the trojan/virus, but I believe they used it effectively against a sworn enemy and knowing a little about the technology capabilities of Israel, if they wanted to build one, it'd make Stuxnet look like a common cold compared to the plague.


 

 

 

Reply #12 Top

Guys seriously, these concerns about Stuxnet are minimal.  Stuxnet was specifically designed for a type of centrifuge that nobody uses except Iran and it was in a big desperation attempt to reset the nuclear timetables.  The following investigations led to the US, Isreal, UK and to a very small degree France alongside Germany.  You don't have to worry about big doomsday scenarios with Stuxnet because it is not compatible with anything else out there.

Stuxnet is also the US's way of showing off to the rest of the world its new toy's capabilities like Desert Storm was.  A world infomercial so to speak.

Reply #13 Top

Quoting RogueCaptain, reply 12
You don't have to worry about big doomsday scenarios with Stuxnet because it is not compatible with anything else out there.

Stuxnet ... no we don't have to worry about it. But like the video said, the code (and the know-how) is now out there. Programmers can change, develop and 'improve', for their own device.

Reply #14 Top

Quoting RogueCaptain, reply 12
You don't have to worry about big doomsday scenarios with Stuxnet

Nope....only Skynet....;)

Reply #15 Top

"There have been several large botnets “taken down” as a result of heightened Law Enforcement activity and prosecution. This has resulted in much less spam (90% less, in fact), and fewer attacks, but the number and rate are still alarming."

 

Eh? 90%? Sources, sir? It's true that Rustnock botnet has been taked down, but 90%? Any law enforcement activity cannot solve the problem long-term, because the poorly administered end-user machines are just as vulnerable - it's only matter of time someone else starts zombifying them. 

Reply #16 Top

Sources cited in OP (and the screenshot - searchsecurity.com).

Reply #17 Top

RANT:   Yes, the hackers are an intelligent lot.  I understand from another tread that the CIA? NSA?  has 'hired' a number of them to help with their agencies's cyber abilities.  I wonder if the 'free lance' hackers still out there will ever back off of hacking into consumer data banks.  Such hacking generally tends to hurt regular individuals... and not the secretive aspects of gov-corporations. 

I suppose, if they wanted to really help, why don't they help all the rest of us regular people actually see and know what the secrative coroprations, (who aren't beholden to any one anymore), are really doing.  Govermental sunshine laws get evaded pretty easially, it seems.  Wish they would stop picking on us,,, and pick on someone their own size...   PS:  Wiki - leaks could have blocked out the names of low level functunaries, and protected regular people from reprocussions...  they didn't.   (end rant) 

Seriously, I was not able to view the video "Ant... virus" and when I went to the hungry site, it said it could 'only be viewed from Australia.'  Never received a message like that before.  Any advice?  It did mention a video of a 'switch to turn the internet off, as well...

Seems like Stuxnet was designed to nail specific systems.  I keep wondering why so many of these computer systems are hooked up to the internet all the time.  Why can't they be 'freestanding' most of the time, and have real people, on real phone / video links, etc, actually   talking with one another before opening the link, for just enough tiime to transfer whatever had to be sent via web?  It seems the more we remove people from the equation, the more we end up with potrentially massive problems.  Why do nuclear plants, or oil wells, or electricity transmitting plants have to wired into the Web all the time, and therby expose themselves, all the time, to incoming malware? 

 

Doc, yes, Israel has made so many truly revolutionary inventions, and application.  many have been medical and many people, including some high levle arab leaders, owe their lives to some of the medical breakthroughs.  They do militrary research, too, i suspect.  I understand that they routenely take any system they get from the US, or wherever, and upgrade it with their own software, etc.  Is true?  (Or will they have to kill you if you tell us? SMILE)?

 

 

Reply #18 Top

Quoting DrJBHL, reply 11

Depends who's doing what to whom (and why): Case in point - Israel and Iran... I don't believe Israel built the trojan/virus, but I believe they used it effectively against a sworn enemy and knowing a little about the technology capabilities of Israel, if they wanted to build one, it'd make Stuxnet look like a common cold compared to the plague.

Good point!  I thought he Stuxnet was kind of kludgy to be created by Mossad.  But then that may have been by design (to introduce FUD).

Reply #19 Top

Wouldn't have been Mossad. Probably would have been Unit 8200 which came from the IDF SigInt branch, and which is now the IDF Cyber Command, if the attack came from Israel. It could have come from anywhere, though.