Attacks/Breaches
12/10/2013
04:45 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

OpenDNS Exposes Year's Top Cyberattacks In 3D

To capture the massive volume and scale of these incidents, OpenDNS created a short 3D video of the DNS activity generated by each of them

SAN FRANCISCO, Dec. 10, 2013 - OpenDNS, the world's leading provider of cloud-delivered security services, today announced findings by its research organization into the most significant cyber attacks of 2013. Red October, Kelihos, Syrian Electronic Army DNS Hijack, Syria Internet shutdown and Cryptolocker topped the list of malicious internet events over the past twelve months. To capture the massive volume and scale of these incidents, OpenDNS created a short 3D video of the DNS activity generated by each of them: http://www.opendns.com/2013

"Visualization is a key component in using Big Data security techniques to detect and protect against complex, sophisticated attacks, which is what we are demonstrating with this video," said Dan Hubbard, CTO of OpenDNS and head of Umbrella Security Labs. "Organizations and their security practitioners can no longer simply rely on traditional signature and perimeter-based defenses. Security has to move at Internet speed. OpenDNS has pioneered Big Data techniques and analytics to predict and block threats before they can compromise endpoint devices or extract data to command and control servers."

Top Five Cyber Attacks of 2013

Red October

Advanced cyber-espionage network discovered by Kaspersky Labs was responsible for targeting select enterprises. Malware was used to "phone home" to command and control servers and exfiltrate data.

Kelihos

Complex criminal infrastructure, used to deliver the malware and steal data, continues to adapt and evade reputation systems and sandboxes with double fast fluxing networks and domain generation algorithms.

Syrian Electronic Army DNS Hijack

Visitors to some of the Internet's most popular websites were redirected to the Syrian Electronic Army's Web server, which luckily only delivered a political message, not malware.

Syria Internet Shutdown

Internet access into and out of the country was completely cut off by withdrawing the network routes that are used to reach the Syria-based .SY domain name servers.

Cryptolocker

The most sophisticated and widespread ransomware ever seen evaded firewalls, gateways and endpoint protections for weeks using a domain generation algorithm (DGA). Infected machines "phoned home" to acquire keys used to encrypt the victim's files.

Resources

Umbrella Security Labs: http://labs.umbrella.com/ Umbrella Security Graph: http://labs.umbrella.com/security-graph/

Umbrella Webcast: http://www.youtube.com/watch?v=PaQXfyBcob0&feature=youtu.be

About OpenDNS

OpenDNS is the world's leading provider of Internet security and DNS services, enabling the world to connect to the Internet with confidence on any device, anywhere, anytime. OpenDNS provides millions of businesses, schools and households with a safer, faster and more intelligent Internet experience by protecting them from malicious Web threats and providing them control over how users navigate the Internet, while dramatically increasing the network's overall performance and reliability. The company's cloud-delivered Umbrella security service protects enterprise users from malware, botnets and phishing regardless of location or device. At the heart of all OpenDNS services is the OpenDNS Global Network, the world's largest Internet-wide security network, securing 50 million active users daily through 20 data centers worldwide. For more information, please visit: www.opendns.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web