Logo

 


Advanced Malware Risk Report
Prepared for Cisco dCloud
Wednesday, September 21, 2016
Prepared by Scott Barasch
Contact: sbarasch@cisco.com

Logo

I. Executive Summary


Cisco has determined that Cisco dCloud is at a high risk due to the observation of attack by 13 different families of malware. Cisco Advanced Malware Protection (AMP) was deployed for an assessment period of 7 days. This report is a record of what was found on the network during this time.

Assessment Period: Wed Sep 14 2016 15:14:14 to Wed Sep 21 2016 15:14:14
Malware Detected
281
Malware Detected
Hosts Displaying IOCs
200
Hosts Displaying IOCs
Infection Protocols
2
Infection Protocols
Hosts Connected to CnC Servers
0
Hosts Connected to CnC Servers
Malware Comms
24
Malware Comms
Malware URLs
111
Malware URLs

Malware Profile: Over 7 days

65
Different families of malware were
Start
Separator
End
downloaded from
97
unique hosts
Start
Separator
End
by
63
user(s)
Start
Separator
End
on to
136
device(s)
Start
Separator
End
Cisco recommends that Advanced Malware Protection (AMP) is deployed to:
  1. Establish continuous visibility into advanced malware
  2. Augment existing controls in order to mitigate this risk

Logo

II. Assessment Results


Hosts Displaying Indications of Compromise

Special attention should be paid to computers showing high amounts of indications of compromise as they are likely to be exfiltrating information from your private systems. Devices that fall into this category likely have had malware residing on them for some time already and the initial infection has been missed by existing security protections, or are under current attack.
Host AddressIOC Count
10.141.10.272
10.141.10.342
10.141.10.412
10.141.10.532
10.141.10.912
Total Hosts Connected to CnC Servers
(details on next page)
0

Common Indications of Compromise Found

Indications of compromise take many forms, perhaps a host has been seen to execute malware, be connected to a Command & Control server, be targeted with a high impact attack, or actively leaking data. Across the monitored network, these are a sample of different IOCs detected against live systems.

Most Common IOC Types Discovered

CategoryDescriptionCount
Malware DetectedThe host has encountered malware132
Impact 2 AttackThe host was attacked and is potentially vulnerable68
Impact 1 AttackThe host was attacked and is likely vulnerable8
   
   
   
   
   
   
   

Malware Found on the Network

Top threats seen in your environment should be researched because they may affect your security exposure. You should take action to remove and prevent reintroduction by these specific threat types:

File-based Malware Detections

Malware NameNumber of DetectionsNumber of Hosts
 8770
W32.553CC30ACC-95.SBX.TG1918
Win.Trojan.Trafox-31512
W32.2782A4ABB1-100.SBX.TG1311
   

Logo

III. File Details


Files Seen Moving Around the Network

The following files types have been seen moving around the network. To limit your exposure to malware risk it is wise to control data movement by policy. File movement can be controlled by user, group, network zone, app, protocol, file type, and disposition.
TypeCount
MSEXE189
MSOLE255
BINARY_DATA46
JAR40
ZIP37

Dynamic Analysis & Threat Score

Dynamic Analysis & Threat Score
File NameSHA256Threat Score
9VKH.dOC4cd88851...310078b3Very High
Alcan.exe2782a4ab...9c50404fVery High
Babonock.exe2782a4ab...9c50404fVery High
Badtrans.exe6232ea9b...3299b4aaVery High
Bamital.exe7ff81093...293edc5cVery High
Bancos.exe0b0b24ca...16ae69eaVery High
Banker.exe7ff81093...293edc5cVery High
Banload.exe2782a4ab...9c50404fVery High
Banload.exe553cc30a...097b27caVery High
Bob.exe7ff81093...293edc5cVery High

Dynamic Analysis Summary Output

Below is an example of dynamic analysis output taken from one file found on your network. This file had a threat score of Very High. A more detailed analysis of this file is available in the FMC along with screenshots, network traffic it generated, and files it may have also dropped.
File Sample: 9VKH.dOC
Threat Score: Very High

Observations

    Logo

    IV. Malware Risk to the Business


    Impact of Malware Types

    Malware exposes different types of risk to the organisation that encounters it. Malware is commonly categorized into different types that enable the security team to deal with the Immediate threat. Below are different types of malware commonly discovered by Cisco solutions.
    Malware TypeRisk to Business
    Botnet clientDenial of Service, Information Theft: A botnet is a collection of computers controlled by a third party. Hosts controlled by a botnet may steal information from your organization or be used to launch denial-of-service attacks, send spam, or conduct other undesirable activity.
    Trojan / BackdoorSystem Degradation, Information Theft: A trojan horse is a program that appears to be benign to an end user but is in fact malicious. It can be used to steal information or introduce control
    SpywareInformation Theft: Spyware is software installed on machines that collects information without users’ knowledge and forwards it to other organizations.

    Logo

    V. Recommendations


    Despite your existing network and endpoint protections, advanced malware is getting through and placing your organization at risk. Additional countermeasures and security controls are required to mitigate the risk.
    Cisco recommends that Cisco dCloud deploy Firepower Appliances with Advanced Malware Protection to:
    1. Establish continuous network visibility into its advanced malware risk
    2. Augment its existing controls in order to mitigate this risk
    3. Add host protection and enhanced remediation via AMP connectors

    1. Establish Continuous Malware Visibility

    Existing protections are neither dynamic enough nor capable of fully protecting from new or unknown threats that emerge daily. Cisco recommends deployment of network-based protections via Firepower Appliances with Advanced Malware Protection. Advanced Malware Protection can be enabled through a license on any NGFW or NGIPS appliance from Cisco. This will provide the following new capabilities and benefits:
    New CapabilityBenefit
    Network Based DetectionDetect and block advanced malware from existing network IDS/IPS infrastructure
    Trend AnalysisMeasure and see how effective your protections are over time
    Cloud-Based AnalyticsPowerful cloud analytics leverages Cisco's vast security intelligence and expertise without complex or costly deployment
    Full-stack VisibilityIdentify and understand the file types traversing your networks and employ intelligent decisions based on Cisco reputational data
    Advanced Malware Protection (AMP)Protect against malware with AMP for networks, which includes integration with AMP ThreatGRID for superior sandboxing, security intelligence and advanced file analysis. Also, AMP for Endpoints provides endpoint protection to offer defense in depth
    Security IntelligenceWith unparalleled visibility into the Internet, Cisco Talos provides dynamic IP and URL black list to protect against malicious websites
    Virtual ProtectionMonitor VM-to-VM communications the same as physical networks

    2. Augment Controls to Mitigate Risk

    Deploying additional countermeasures can help mitigate the risk advanced malware poses. These measures may entail control of threat surface, blocking entry and propagation of malware or suspect file types, and rapid notification upon new malware discovery.
    Cisco recommends deployment of network-based protections via Firepower Appliances with Advanced Malware Protection. These provide the following new capabilities and benefits:
    New CapabilityBenefit
    24/7 Real-Time ProtectionDeploy in-line for continuous network protection and minimize propagation of advanced malware
    IP and URL BlacklistingBlock Bot CnC, open proxy, and custom IP lists from your IPS
    DNS SinkholingIntercept DNS requests to malicious sites, and redirect if desired
    Retrospective AlertingAlert on files deemed malicious by the Cisco Security Intelligence cloud even after infection - leverage community awareness to know when you may be at risk of infection

    3. Add Host Protection & Enhanced Remediation Via AMP for Endpoints

    Typically advanced malware enters the network via hosts (compromised end devices such as PCs, smartphones, etc.). Having a presence at the host/client-side OS enables easier determination of root cause, malware trajectory, and more control over the spread of malware (even after a compromise!). It also helps to speed post-infection clean-up efforts.
    Cisco recommends AMP for Endpoints for additional visibility and control. These provide the following new capabilities and benefits:
    New CapabilityBenefit
    Host ProtectionDeploy Cisco AMP to gain additional protection and more capability to take action against malware at the host.
    Mobile ProtectionProtect mobile workers and Android-based devices from advanced malware attacks
    Virtual ProtectionProtect Virtual Desktop communications the same as physical networks
    Malware TrajectoryUnderstand how malware enters and trace the path of infection to identify ‘patient zero’
    File AnalysisGet advanced malware analysis with Cisco AMP and integrated ThreatGRID technology
    Retrospective DetectionRecall files deemed malicious by the Cisco Security Intelligence cloud even after infection - automate and speed malware cleanup
    In addition, Cisco offers NGIPS capabilities and optional Application Control and URL Filtering, to help better protect against the latest threats. Please contact your Cisco representative or reseller for more information.

    Logo

     


    About Cisco
    It's no secret that today's advanced attackers have the resources, expertise, and persistence to compromise any organization at any time. As attacks become more sophisticated and exploit a growing set of attack vectors, traditional defenses are no longer effective.

    It's more imperative than ever to find the right threat-centric security products, services, and solutions for your current environment. These solutions must also easily adapt to meet the evolving needs of your extended network, which now goes beyond the perimeter to include endpoints, mobile devices, virtual machines, data centers, and the cloud.

    For over three decades, Cisco has been a leader in network security protection, innovation, and investment. Our expertise and experience helps us increase intelligence and expand threat protection across the entire attack continuum for a level of security you can build your business on.

    Cisco delivers intelligent cybersecurity for the real world.
    Contact Us
    Want to learn more about getting this information on your network? Go to cisco.com/go/security and request a live demo.