Rather than targeting Web and email servers, attackers these days are prone to going after enterprises from the inside out, compromising end-user systems and then using them to access confidential data, according to a Web traffic analysis report by security-as-a-service provider Zscaler.
Based on a recent study of traffic passing through its global network, Zscaler's "State of the Web -- Q4 2009" report also notes trends, including issues with botnets, corporate Internet access policies, and the use of the Internet Explorer 6 browser. Officially released on Tuesday, the study analyzes Web traffic volumes covering several thousand Web transactions per second and hundreds of billions of Web transactions.
[ InfoWorld's Roger Grimes explains how to stop data leaks in an enlightening 30-minute Webcast, Data Loss Prevention, which covers the tools and techniques used by experienced security pros. ]
"The malicious content will then compromise the end-user either through a vulnerable browser or through vulnerable client applications such as Adobe Acrobat Reader," Geide said. Malware then can steal victims' credentials.
"It's recommended that users take extra precaution when doing financial transactions online and if at all possible to utilize Web-based protection," Geide said. He acknowledged Zscaler offered services to remedy the issue but noted the company is not the only vendor to do so.
Zscaler also found significant use of the Internet Explorer 6 browser, even though it has been succeeded by two more secure generations of Microsoft's browser. Version 6, for instance, does not maintain malicious URL and phishing block lists, the report said.
Botnets present issues, according to Zscaler. "We're seeing a lot of botnets," Geide said. Zscaler blocks botnets, which can take over systems, said Geide. Zscaler also found some users attempting to deploy anonymizers, which hide a client IP address to enable access to undesirable content such as gambling or pornography sites, he said.
Another issue, darknets, involves unallocated IP space and infected hosts on the network. This can lead to disclosures of internal information, said Geide. Also, attackers have launched phishing attacks from sites such as the recently removed fake social networking site, coolxd.com, according to Zscaler.
Additionally, ZScaler discovered that the Firefox browser is slowly gaining wider adoption, although the company needs more time to determine precise browser usage trends. "Internet Explorer is still leaps and bounds ahead of Firefox as far as the enterprise user goes," said Geide. Firefox gained more than 6 percent in market share in December, Zscaler found. Still, Internet Explorer's share was at about 70 percent by the end of 2009.
Zscaler found Facebook predominant as a social networking site. Three-quarters of social networking traffic traversing the Zscaler network went to Facebook.
In another study released Tuesday, TheInfoPro research firm found that 40 percent of enterprises plan to increase security budgets in 2010, after a year of restricted spending and delayed projects. Enterprises, the study found, favor one-stop, all-inclusive vendors, with Cisco rising as a formidable security vendor.
Cisco is leading in SSL VPN, network access control and firewalls. Meanwhile, pure-play security vendors still dominate inside the perimeter, which could make them suitable merger and acquisition targets for companies such as IBM, HP, and other large vendors. TheInfoPro listed pure-play providers as companies such as Check Point and McAfee.
The study based its results on interviews with 259 organizations within the Fortune 1000 and midsize market in North America. Sixty percent or organizations, the study found, already are using cloud-based infrastructure services or plan to do so in the next two years. Enterprises are concerned, however, with how to deal with sensitive data placed in external and internal cloud environments.
This story was updated on February 23, 2010
This story, "Attackers going after end-users rather than servers," was originally published at InfoWorld.com. Follow the latest developments in security at InfoWorld.com.