10
1 All contents are Copyright © 2011 Cisco Systems, Inc. All rights reserved. This document is Cisco Public information. Cisco 1Q11 Global Threat Report Featuring Data from Cisco Security Intelligence Operations

Cisco 1Q11 Global Threat Report · overlays to forcibly cause a Facebook user to “Like” a particular page. In turn, this causes a link to the page to appear on the user’s Facebook

  • Upload
    others

  • View
    11

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cisco 1Q11 Global Threat Report · overlays to forcibly cause a Facebook user to “Like” a particular page. In turn, this causes a link to the page to appear on the user’s Facebook

1 All contents are Copyright © 2011 Cisco Systems, Inc. All rights reserved. This document is Cisco Public information.

Cisco 1Q11Global Threat ReportFeaturing Data from Cisco Security Intelligence Operations

Page 2: Cisco 1Q11 Global Threat Report · overlays to forcibly cause a Facebook user to “Like” a particular page. In turn, this causes a link to the page to appear on the user’s Facebook

2 All contents are Copyright © 2011 Cisco Systems, Inc. All rights reserved. This document is Cisco Public information.

• 105,536uniqueWebmalwarewereencounteredinMarch2011,a46%increasefromJanuary2011;

• Maliciouswebmailrepresented7%ofallWeb-deliveredmalwareinMarch2011,a391%increasefromJanuary2011;

• 45%ofallmaliciouswebmailresultedfromYahoo!mail,25%fromMicrosoftLive/Hotmail,andonly2%fromGoogle’sGmail;

• Search-engine-relatedtrafficresultedinanaverageof9%ofallWebmalwareencounteredin1Q11;

• 33%ofsearchengineencounterswereviaGooglesearchengineresultspages(SERPs),with4%eachfromYahoo!and

BingSERPs;

• SERPsandwebmailencountersareimpactedbythepopularityofaparticularserviceandarelikelynotindicativeofany

heightenedriskspecifictothatservice;

• Likejackingincreasedsignificantlyduringthefirstquarterof2011,from0.54%ofallWebmalwareencountersinJanuary

2011to6%inMarch2011;

• At13%,MileyCyrus–themedlikejackingscamsbeatoutallothercelebritiesandeventsinMarch2011.Likejackingthemes

forIndianactressNayantarawereat7%,whileCharlieSheenwasat3%,JustinBieberat2%,andLadyGagaat1%;

• At4%ofallWebmalwareencountersin1Q11,websitecompromisesthatattemptedtodownloadtheHilotiTrojanwere

themostfrequentlyencountered,followedbymaliciousGIFinjections(3%).WebsitecompromisesrelatedtotheLizamoon

seriesofSQLinjectionattacksrepresentedjust0.15%ofWebmalwareencountersforthequarter;

• Thoughfarlesssuccessfulthaninyearspast,SQLinjectionattemptscontinuedtobethemostprevalenteventfiring(55%)

observedbyCiscoRemoteManagementServicesin1Q11;

• MalwareactivityrelatedtotheMyDoomwormwasthe10thmostfrequentlyRMS-observedIPSeventin1Q11,

demonstratingthatlegacymalwarecanstillposeathreattounprotectedsystems;

• Asexpected,Rustockactivitydeclinedsignificantlyover1Q11,but,interestingly,thesharpdeclinecommencedweeks

priortothebotnettakedown;

• Following4Q10declines,globalspamvolumeincreasedandthensubsequentlydecreasedduring1Q11,butlevels

remainedabovethatofDecember2010;

• Withanincreaseof248%,IndonesiaovertooktheUnitedStatesasthetopspam-sendingcountryin1Q11.

KeyHighlights

Page 3: Cisco 1Q11 Global Threat Report · overlays to forcibly cause a Facebook user to “Like” a particular page. In turn, this causes a link to the page to appear on the user’s Facebook

3All contents are Copyright © 2011 Cisco Systems, Inc. All rights reserved. This document is Cisco Public information.

IntroductionThepropersecuritytoolscanpreventinfectionorstopoutbreaks,mitigateorreducelossesfrommaliciousevents,andevendecreaselegalliability.Buttheseproductscanalsooftenserveasanexcellentsourceofinformationaboutwhatishappeninginyourspecificenterprise.Regularreviewandunderstandingofthelogsproducedbythesetoolsandservicescanenableyoutobenchmarkwhatisnormalandtypicalforyourenterprise,whichinturnprovidesabenchmarktospotunusualoratypicalbehavior that might be indicative of an advanced persistent threat or other intrusion.

Correlatingloginformationacrossvarioustoolsandservicesalsoprovidesatimely“pulse”ofthethreatlandscape,whichcansometimeshaveinterestingtie-instoglobalnon-malware-relatedevents.Mostimportantly,regularreviewandunderstandingofthedatacanhelpferretouttheelusive‘blackswan’–thetypesofsurreptitiousandmaliciouseventsthatotherwisecouldflybelowtheradar.AnexcellentexampleofthiswasillustratedintheCisco3Q10GlobalThreatReport,whichshowcasedthetell-talesignsofaStuxnetintrusiondiscoverablevialoganalysis.

TheCiscoGlobalThreatReportisacompilationofdatacollectedacrossfourcoresegmentsofCiscoSecurity:ScanSafe,IPS,RMS,andIronPort.Thereportispublishedquarterlyinthehopesthatitwillinspireandmotivateyoutoperformyourownin-house analysis on an ongoing basis.

Contributors to the Cisco Global Threat Report include:

JayChan GreggConklin RaymondDurant JohnKlein MaryLandesman ArminPelkmann Shiva Persaud Tom Schoellhammer ChadSkipper Ashley Smith

Page 4: Cisco 1Q11 Global Threat Report · overlays to forcibly cause a Facebook user to “Like” a particular page. In turn, this causes a link to the page to appear on the user’s Facebook

4All contents are Copyright © 2011 Cisco Systems, Inc. All rights reserved. This document is Cisco Public information.

Cisco ScanSafe: Web Malware Events

Enterpriseusersexperiencedanaverageof274Webmalwareencounterspermonthin1Q11,a103%increasecomparedto2010.UniqueWebmalwareencounteredalsoincreased(46%)in1Q11,from72,294uniqueWebmalwareinJanuary2011to105,536inMarch(Figures1-3).

ThoughWebmalwarecontinuestoincrease,farfewerlarge-scalecompromisesareoccurringcomparedtopreviousyears.Instead,compromisesaremorefocusedonthe“longtail”oftheWeb,withfewercompromisesperattackbutafarlargernumberofseparateattacks.AsFigure4demonstrates,thelargestoutbreakoccurredinMarch2011withaseriesofGIFinjectionattackstargetedatpopularPakistaninewssites.

Thesecondlargestattackin1Q11involvedwebsitecompromisesdesignedtodelivertheHilotitrojan.Thisparticularwaveofattacks,breakinginJanuary2011beforeresuming in February, is part of an ongoing series.

ThoughtheLizamoonseriesofSQLinjectionattackswerehighlypublicizedinMarch2011,boththeactualnumbersofcompromisedwebsitesandtheliveencounterrateswerefarfewerthanhadbeenreported.Inreality,onlyafewthousandwebsiteswereactuallycompromisedandliveencountersrepresentedonly0.15%ofallWebmalwareencounteredforthequarter.

Websearchesresultedin9%ofWebmalwareencountersin1Q11,withanaverageof33%resultingfromGooglesearchengineresultspages(SERPs)and4%eachfromYahoo!andMicrosoftBingSERPs.ThemajorityofWebsearchencounters(58%)occurredviasmallersearchenginesand/orsearchesperformedonnon-search-enginewebsites(Figure5).

Figure 1 Average Web Encounters per Enterprise, 1Q11Source:CiscoScanSafe

Figure 2 Unique Web Malware Encounters, 1Q11Source:CiscoScanSafe

Figure3 Unique Malware Domains and IPs, 1Q11Source:CiscoScanSafe

100

200

300

400

500

0FebuaryJanuary March

40000

60000

80000

100000

120000

0FebuaryJanuary March

20000

10000

15000

20000

25000

0FebuaryJanuary March

5000

Unique Malware Hosts Unique IP Addresses

Figure4 High Profile Web Attacks, 1Q11Source:CiscoScanSafe

GIF Injection

2%

0%

8%

10%

6%

4%

PHP ShellsGumblar

January February March

Lizamoon Hiloti

Page 5: Cisco 1Q11 Global Threat Report · overlays to forcibly cause a Facebook user to “Like” a particular page. In turn, this causes a link to the page to appear on the user’s Facebook

5All contents are Copyright © 2011 Cisco Systems, Inc. All rights reserved. This document is Cisco Public information.

Itisimportanttonotethatsearch-relatedmalwareencountersarenotreflectiveofanyunderlyingriskwithaparticularsearchengine;rather,theseencountersareduetothepopularityandthusincreasedusageofaparticularsearchservice.

Therateofmalwareencountersviawebmailincreasedratherdramaticallyin1Q11,from1%ofallWebmalwareencountersinJanuary2011to7%inMarch2011.

Themajorityofall1Q11maliciouswebmail(44%)occurredviaYahoo!mail(Figure6).Aswithsearchengineencounters,webmailencounterratesarelikelymorereflectiveofthepopularityofagivenwebmailserviceratherthanspecifictoanyelevated(orreduced)risk.

“Likejacking”referstoamethodofclickjackingthatusesimageoverlaystoforciblycauseaFacebookuserto“Like”aparticularpage.Inturn,thiscausesalinktothepagetoappearontheuser’sFacebookwall,exposingtheirFacebookfriendstothelikejackingscam.Thisworm-likescamisoftenaccompaniedbyaphishingsegmentwherebythevictimisalsotrickedintoprovidingtheirFacebookusernameandpassword.

AsshowninFigure7,likejackingencountersincreasedsignificantlyduring1Q11,from0.54%ofallWebmalwareinJanuary2011to6%inMarch2011.At48%,themostfrequentlyencountered”hook”forlikejackingscamsinJanuary2011involvedclaimsthatthelinkwouldenablethevictimtoseewhohadbeenviewingtheirprofile.However,thisscamdeclinedineffectivenessthroughoutthequarter,resultinginonly2%oflikejackingencountersinMarch2011.

Amongcelebrities,MileyCyrus–themedlikejackingdominated,with13%ofalllikejackingencountersinMarch2011.Thesecondhighestcelebrity-themedlikejackingleveragedthepopularityofIndianactressNayantara,resultingin7%oflikejackingscams for the same month.

Figure5 Search Engine Web Malware Encounters, 1Q11Source:CiscoScanSafe

January

0%

60%

80%

40%

20%

MarchFebruary

Google

Yahoo!

Bing

Other

Figure6 Webmail Malware Encounters, 1Q11 Source:CiscoScanSafe

Yahoo! - 45%

Live/Hotmail - 25%

AOL - 3%

Gmail - 2%

Other - 26%

Figure7 Top 10 Lifejacking Scams, 1Q11Source:CiscoScanSafe

January

0%

40%

50%

30%

10%

MarchFebruary

Pro�le Checker

Exotic

Miley Cyrus

Justin Bieber

Japan/Tsunami

Nayantara

Soccer

Charlie Sheen

20%

Prank

Lady Gaga

Page 6: Cisco 1Q11 Global Threat Report · overlays to forcibly cause a Facebook user to “Like” a particular page. In turn, this causes a link to the page to appear on the user’s Facebook

6All contents are Copyright © 2011 Cisco Systems, Inc. All rights reserved. This document is Cisco Public information.

At5%ofallWebmalwareencounters,JavaexploitscontinuedtooutpaceAdobeReaderandAcrobatexploits(1%),aswellasAdobeFlashexploits(0.17%),in1Q11.

CompaniesinthePharmaceutical&ChemicalandtheEnergy&OilsectorscontinuedtobeathighestriskofWebmalwarethroughout1Q11.Otherhigher-riskverticalsthroughoutthequarterincludedAgriculture&Mining,Transportation&Shipping,andEducation.Themedianrateforallverticalsisreflectedas100%—anythingabove100%hasahigher-than-medianencounterrate,andanythingbelow100%isbelowthemedianforall(Figure8).

Figure8 Vertical Risk, 1Q11Source:CiscoScanSafe

50% 150%

Travel and Entertainment

Transportation and Shipping

Energy, Oil and Gas

Education

Insurance

Pharmaceutical and Chemical

Agriculture and Mining

Food and Beverage

HVAC, Plumbing, Utilities

250% 350%

Banking and Finance

Retail and Wholesale

Manufacturing

Government

Heathcare

Legal

Media and Publishing

Engineering and Construction

Charities and NGO

IT and Telecommunications

Aviation and Automotive

Real Estate and Land Management

0% 100% 200% 300% 400%

Professional Services

Page 7: Cisco 1Q11 Global Threat Report · overlays to forcibly cause a Facebook user to “Like” a particular page. In turn, this causes a link to the page to appear on the user’s Facebook

7All contents are Copyright © 2011 Cisco Systems, Inc. All rights reserved. This document is Cisco Public information.

Cisco IPS and Remote Management ServicesAsdiscussedintheCisco4Q10GlobalThreatReport,legacywormactivitycontinuestohaveanimpact—evenyearsafterprotectionagainstthemalwarehasbeenmadereadilyavailable.Thattrendcontinuesin2011withthesurpriseappearanceofthecirca-2004MyDoomworminthetop10IPSeventfiringsobservedbyCiscoRemoteManagementServicesduringthefirstquarter(Figure9).

NotethattheMHTMLvulnerabilitydescribedinMicrosoftKB2501696,IntelliShieldalert22310,andCiscoIntrusionPreventionSystem(IPS)6.0-33379/0alsoappearsontheCiscoRMStop10signatureeventslistfor1Q11.Microsoftreleasedanupdateforthisformerzero-dayvulnerabilityinApril2011(MS11-026).

Whileasignificantlyoccurringeventin1Q11,SQLinjectionattemptsremainedatafairlysteadypacethroughoutthequarterwiththeonlynotableincreaseoccurringinthelatterpartofMarch2011(Figure10).

Figure 10 SQL Volume, 1Q11Source:CiscoIPS

40,000

0

160,000

120,000

01/0

1/20

11

01/0

3/20

11

01/0

5/20

11

01/0

7/20

11

01/0

9/20

11

01/1

1/20

11

01/1

3/20

11

01/1

5/20

11

01/1

7/20

11

01/1

9/20

11

01/2

1/20

11

01/2

3/20

11

01/2

5/20

11

01/2

7/20

11

01/2

9/20

11

01/3

1/20

11

02/0

2/20

11

02/0

4/20

11

02/0

6/20

11

02/0

8/20

11

02/1

0/20

11

02/1

2/20

11

02/1

4/20

11

02/1

6/20

11

02/1

8/20

11

02/2

0/20

11

02/2

2/20

11

02/2

4/20

11

02/2

6/20

11

02/2

8/20

11

02/3

0/20

11

03/0

2/20

11

03/0

4/20

11

03/0

6/20

11

03/0

8/20

11

03/1

0/20

11

03/1

2/20

11

03/1

4/20

11

03/1

6/20

11

03/1

8/20

11

03/2

0/20

11

03/2

2/20

11

03/2

4/20

11

03/2

6/20

11

03/2

8/20

11

03/3

0/20

11

80,000

Figure9 Top 10 Signature Firings, 1Q11Source:CiscoRMS

Generic SQL Injection

Web View Script Injection Vulnerability

Gbot Command and Control Over HTTP

B02K-UDP

Cisco Uni�ed Videoconferencing Remote Command Injection

Microsoft Internet Explorer Invalid Flag Reference Remote Code Execution

WWW WinNT cmd.exe Access

Web Application Security Test/Attack

MyDoom Virus Activity

Windows MHTML Protocol Handler Script Execution

55.03%

7.01%

5.16%

2.47%

5.20%

4.91%

3.27%

1.30%

1.19%

1.16%

Signature Events

Page 8: Cisco 1Q11 Global Threat Report · overlays to forcibly cause a Facebook user to “Like” a particular page. In turn, this causes a link to the page to appear on the user’s Facebook

8All contents are Copyright © 2011 Cisco Systems, Inc. All rights reserved. This document is Cisco Public information.

Denial-of-Service(DoS)attacksalsohadasteadypresencethroughout1Q11,withseveralnotablepeaksoccurringthroughoutthequarter(Figure11).Whileoncelargelyprank-related,DoSattacksareincreasinglypoliticallyandfinanciallymotivated.

Rustockactivity,whichhadpeakedinthefourthquarterof2010,significantlydeclinedin1Q11.Firstdiscoveredin2006,Rustockinstallsarootkit-enabledbackdoorthathasmostcommonlybeenassociatedwithspamandscarewaredelivery.OnMarch16,2011,itwasreportedthatgloballawenforcementandMicrosofthadsuccessfullydismantledkeysegmentsoftheRustockbotnet.However,asseeninFigure12,Rustockactivityhadbeguntodeclineseveralweekspriortothetakedownevent.

Figure 12 Rustock Volume, 1Q11Source:CiscoIPS

8,000

0

20,000

16,000

01/0

1/20

11

01/0

3/20

11

01/0

5/20

11

01/0

7/20

11

01/0

9/20

11

01/1

1/20

11

01/1

3/20

11

01/1

5/20

11

01/1

7/20

11

01/1

9/20

11

01/2

1/20

11

01/2

3/20

11

01/2

5/20

11

01/2

7/20

11

01/2

9/20

11

01/3

1/20

11

02/0

2/20

11

02/0

4/20

11

02/0

6/20

11

02/0

8/20

11

02/1

0/20

11

02/1

2/20

11

02/1

4/20

11

02/1

6/20

11

02/1

8/20

11

02/2

0/20

11

02/2

2/20

11

02/2

4/20

11

02/2

6/20

11

02/2

8/20

11

02/3

0/20

11

03/0

2/20

11

03/0

4/20

11

03/0

6/20

11

03/0

8/20

11

03/1

0/20

11

03/1

2/20

11

03/1

4/20

11

03/1

6/20

11

03/1

8/20

11

03/2

0/20

11

03/2

2/20

11

03/2

4/20

11

03/2

6/20

11

03/2

8/20

11

03/3

0/20

11

12,000

18,000

14,000

10,000

4,000

6,000

2,000

Figure 11 DoS Volume, 1Q11Source:CiscoIPS

100,000

0

200,000

01/0

1/20

11

01/0

5/20

11

01/0

9/20

11

01/1

3/20

11

01/1

7/20

11

01/2

1/20

11

01/2

5/20

11

01/2

9/20

11

02/0

2/20

11

02/0

6/20

11

02/1

0/20

11

02/1

4/20

11

02/1

8/20

11

02/2

2/20

11

02/2

6/20

11

02/3

0/20

11

03/0

4/20

11

03/0

8/20

11

03/1

2/20

11

03/1

6/20

11

03/2

0/20

11

03/2

4/20

11

03/2

8/20

11

160,000

120,000

60,000

80,000

40,000

20,000

140,000

180,000

Activity, Top 25, 1Q11 Source:CiscoRMS

Port Percent

80 69.00%

40436 2.23%

25 2.17%

161 1.39%

5060 1.27%

123 1.16%

34227 1.13%

443 1.05%

21 1.00%

20 0.71%

554 0.57%

39162 0.47%

59446 0.47%

49688 0.35%

41483 0.25%

29930 0.24%

44122 0.24%

3985 0.20%

445 0.19%

3986 0.19%

57522 0.18%

63650 0.18%

58198 0.18%

53565 0.17%

54826 0.16%

Page 9: Cisco 1Q11 Global Threat Report · overlays to forcibly cause a Facebook user to “Like” a particular page. In turn, this causes a link to the page to appear on the user’s Facebook

9All contents are Copyright © 2011 Cisco Systems, Inc. All rights reserved. This document is Cisco Public information.

Cisco IronPort: Global Spam TrendsThe2011takedownofsegmentsofRustock,combinedwithmultiplespambotnettakedownsin2010,hadapositiveimpactonoverallspamvolume.However,spamvolumein1Q11remainedabovethelowestpointrecordedinDecember2010.Figure13reflectsglobalspamvolumeasreportedthroughCiscoSensorBaseNetworkparticipants.

Interestingly,whilethetakedowneffortshadthemostpostiveimpactonspamoriginatingfromtheUnitedStatesandRussia,spamoriginatingfromothercountriesisrapidlyincreasing(Figure14).

Figure13 Global Spam Volume, 1Q11Source:CiscoIronPort(SBNP/ESA)

800,000,000

0

1,400,000,000

01/0

1/20

11

01/0

3/20

11

01/0

5/20

11

01/0

7/20

11

01/0

9/20

11

01/1

1/20

11

01/1

3/20

11

01/1

5/20

11

01/1

7/20

11

01/1

9/20

11

01/2

1/20

11

01/2

3/20

11

01/2

5/20

11

01/2

7/20

11

01/2

9/20

11

01/3

1/20

11

02/0

2/20

11

02/0

4/20

11

02/0

6/20

11

02/0

8/20

11

02/1

0/20

11

02/1

2/20

11

02/1

4/20

11

02/1

6/20

11

02/1

8/20

11

02/2

0/20

11

02/2

2/20

11

02/2

4/20

11

02/2

6/20

11

02/2

8/20

11

02/3

0/20

11

03/0

2/20

11

03/0

4/20

11

03/0

6/20

11

03/0

8/20

11

03/1

0/20

11

03/1

2/20

11

03/1

4/20

11

03/1

6/20

11

03/1

8/20

11

03/2

0/20

11

03/2

2/20

11

03/2

4/20

11

03/2

6/20

11

03/2

8/20

11

03/3

0/20

11

1,200,000,000

1,000,000,000

400,000,000

600,000,000

200,000,000

Figure14 Top Spam Senders by Country, (Bn/Mo), 1Q11Source:CiscoIronPort

80

100

120

0

140

Indonesia

United States

Russian Federation

British Indian Ocean Territory

Rwanda

FebuaryJanuary March

60

40

20

Page 10: Cisco 1Q11 Global Threat Report · overlays to forcibly cause a Facebook user to “Like” a particular page. In turn, this causes a link to the page to appear on the user’s Facebook

10 All contents are Copyright © 2011 Cisco Systems, Inc. All rights reserved. This document is Cisco Public information.

Althoughtheyrepresentarelativelysmallpercentageofoverallspam,phishingattacksposeaseriousrisktosecurity,bothfromafinancialandsensitiveinformationdisclosureperspective.In1Q11,attackersincreasinglyturnedtheirattentiontowardphishingTwitteraccounts(Figure15).ThisinterestinTwittercredentialsislikelydueinparttoTwitterusers’acceptanceofshortenedURLs.BycompromisingTwitteraccounts,attackerscantakeadvantageofshortenedURLstoenticefollowerstovisitmaliciouslinkstheusersmightordinarilyviewassuspicious.Suchattacksarefurtherfueledbythetrustengenderedthroughsocialnetworkingingeneral.

Insummary,whileglobalspamvolumeshaveincreased,themalwareencounterrateviawebmailhassubstantiallyincreased.Further,socialnetworkingscamsinvolvingbothFacebookandTwitteralsoincreasedthroughoutthefirstquarter.Web-deliveredmalwareisalsoatanall-timehighandtherateofencounterswithuniquenewmalwarecontinuestoincrease

Figure15 Global Spam Volume, 1Q11Source:CiscoIronPort(SBNP/ESA)

2.00%

0

4.50%

4.00%

01/0

1/20

11

01/0

3/20

11

01/0

5/20

11

01/0

7/20

11

01/0

9/20

11

01/1

1/20

11

01/1

3/20

11

01/1

5/20

11

01/1

7/20

11

01/1

9/20

11

01/2

1/20

11

01/2

3/20

11

01/2

5/20

11

01/2

7/20

11

01/2

9/20

11

01/3

1/20

11

02/0

2/20

11

02/0

4/20

11

02/0

6/20

11

02/0

8/20

11

02/1

0/20

11

02/1

2/20

11

02/1

4/20

11

02/1

6/20

11

02/1

8/20

11

02/2

0/20

11

02/2

2/20

11

02/2

4/20

11

02/2

6/20

11

02/2

8/20

11

02/3

0/20

11

03/0

2/20

11

03/0

4/20

11

03/0

6/20

11

03/0

8/20

11

03/1

0/20

11

03/1

2/20

11

03/1

4/20

11

03/1

6/20

11

03/1

8/20

11

03/2

0/20

11

03/2

2/20

11

03/2

4/20

11

03/2

6/20

11

03/2

8/20

11

03/3

0/20

11

3.00%

3.50%

2.50%

1.00%

1.50%

0.50%

Non-Twitter Phish Twitter Phish

Ciscohasmorethan200officesworldwide.Addresses,phonenumbers,andfaxnumbersarelistedontheCiscowebsiteatwww.cisco.com/go/offices.

CiscoandtheCiscoLogoaretrademarksofCiscoSystems,Inc.and/oritsaffiliatesintheU.S.andothercountries.AlistingofCisco’strademarkscanbefoundatwww.cisco.com/go/trademarks.Thirdpartytrademarksmentionedarethepropertyoftheirrespectiveowners.TheuseofthewordpartnerdoesnotimplyapartnershiprelationshipbetweenCiscoandanyothercompany.(1005R)C02-640572-001/11

Americas Headquarters Cisco Systems, Inc. SanJose,CA

Asia Pacific Headquarters Cisco Systems(USA)Pte.Ltd. Singapore

Europe Headquarters Cisco Systems International BV Amsterdam, The Netherlands