Cisco Blogs

Cisco Blog > Security

Zeus Botnet Impersonating Trusteer Rapport Update

Starting Friday, July 19, 2013 at 14:45 GMT, Cisco TRAC spotted a new spam campaign likely propagated by the Zeus botnet. The initial burst of spam was very short in duration and it’s possible this was intended to help hide the campaign, since it appears to be targeted towards users of a Trusteer product called Rapport. Within minutes of the campaign starting, we were seeing millions of messages.


This spam impersonated a security update from Trusteer. Attached to this file was the “RaportUpdate” file, which contained a trojan. We’ve identified this specific trojan as Fareit. This file is designed to impersonate an update to the legitimate Rapport product, which, as described by Trusteer, “Protects end users against Man-in-the-Browser malware and phishing attacks. By preventing attacks, such as Man-in-the-Browser and Man-in-the-Middle, Trusteer Rapport secures credentials and personal information and stops online fraud and account takeover.”

It’s important to note that while this end-point solution is designed to protect against browser-based threats, this specific attack is email-based. If the user downloads and executes the attachment via their mail client, it could bypass their browser and the protections of a legitimate Rapport client, entirely. If an end user is tricked into running malicious software for an attack via an avenue the attacker can reasonably predict, it becomes much easier to bypass network security devices and software.


Read More »

Tags: , , , , , , ,

Network Solutions Customer Site Compromises and DDoS

Network Solutions is a domain name registrar that manages over 6.6 million domains. As of July 16, 2013, the Network Solutions website is under a Distributed Denial of Service (DDoS) attack. Recently, Network Solutions has been a target for attackers; in a previous outage, domain name servers were redirected away from their proper IP addresses. This was reported to be a result of a server misconfiguration while Network Solutions was attempting to mitigate a DDoS attack. It is possible that the DDoS attacks are related.

According to, the Network Solutions site has been having issues for at least the last 24 hours.


Response time in ms (GMT -8:00)

Read More »

Tags: , , , , , ,

Three Imperatives for Today’s CISO for Data Center Security: Key Takeaways from Today’s Webcast

This is a follow up from my post last week that announced this webcast. Today it was a treat to have Richard Noguera as our special guest and who is uniquely qualified to speak on the topic of key imperatives for today’s CISO for the data center.  Rich is a youthful InfoSec veteran who has led teams at Yahoo, Symantec and McAfee as well as held consulting roles and presently at Accenture in a Security and Risk management strategy role. I wanted to provide you access to the slides as well as summarize some of the key points Rich educated us on today.

Three imperatives for today¹s ciso for data center fina lv rn[2] from Cisco Data Center


As a concept, cloud is the one that most interested our audience today. We are seeing heavily virtualized data centers with private clouds, cloud attached data centers that leverage Infrastructure as a Service (IaaS) facilities for rapid service deployment or capacity management, and hybrid clouds that mix/match based on implementation needs.  Most of our customers have embraced one of the above models.  And, so I am going to focus on our imperatives accordingly.

Imperative 1: Enable IT to Play a More Strategic Role

Gartner predicts with market maturity that enterprises will increase migration of *mission-critical* functions to *public* cloud services over the next 3-5 years. IT and InfoSec must adapt and consider an alternative means to maintain the confidentiality, integrity, and availability of their business services, data, and users. For the ‘extended enterprise’ to operate effectively then, access control and data exchange between cloud service providers (CSP) needs to be standardized. Organizations should look to implement a Cloud Services Brokerage (CSB) – whether internally or externally, utilizing private/public/hybrid clouds – to accelerate service implementation and integration and also ensure visibility and cohesive security policy across multiple cloud service providers.

Imperative 2:  Business-driven Security and Risk Metrics

Read More »

Tags: , , , ,

Partnering with Apple on BYOD and Great User Experience

Mobility extends beyond devices. Yet, having the right devices and choice of devices allows us to work the way we’d like. In fact, Cisco is one of the world’s largest enterprise users of Apple products. Employees have purchased 33,000 iPhones and 16,000 iPads as part of Cisco’s BYOD program, and almost half of our regular employees are using Macs.

Recently Cisco’s Sheila Jordan, Senior Vice President of Communication and Collaboration IT spoke with Apple about BYOD, as part of Apple’s Tech Talk series. Here she and Brett Belding, Senior Manager, Cisco IT, discussed what’s behind Apple’s popularity at Cisco. They also address what enterprises like Cisco can emulate  what Apple has created for consumers in terms of user experience and bring that into today’s mobile enterprise.

Check out Sheila’s blog “Partnering with Apple on BYOD and Great User Experience” where she discusses the Apple Tech Talk and Cisco’s mobile and collaboration strategy.

Tags: , , , , , , , ,

Enterprise Apps: The Next Wave in Mobile Transactions

Earlier this year, I was having a business dinner with an important client in London when I received an IM on my iPhone. The message was from a Cisco colleague, and it said, “I need you to approve a purchase order. Right now.”

So I stepped away from the table, launched an app on my iPhone, read the purchase order, and clicked “approve.” Then I returned to my seat and went back to our dinner without missing a beat. The whole process took maybe two minutes.

Just a few years ago, this transaction would have required a laptop tethered to the network in a hotel or office, and it would have completely disrupted the dinner.  This pace of change, leveraging mobility solutions, across IT is unprecedented.

Why are so many businesses turning to mobile enterprise apps? According to Gartner, more than 25 percent of enterprises will have an app store by 2017. Mobile apps are making the promise of BYOD a reality. People love their apps and the highly personalized experience they deliver. By bringing their own devices to work, people can enjoy their work more, use the devices they choose, and do their jobs better and faster—from anywhere. According to Cisco’s latest study, the Financial Impact of BYOD, they can also be more innovative and productive.  At Cisco we firmly believe that work is a thing you do, not a place you go.  Read More »

Tags: , , , , , , , ,