Saturday, April 5, 2025
HomeSecurity NewsCisco ETA - Provides Solution for Detecting Malware in Encrypted Traffic

Cisco ETA – Provides Solution for Detecting Malware in Encrypted Traffic

Published on

SIEM as a Service

Follow Us on Google News

Encrypted traffic is one of the biggest challenges in the security Industry and now Cisco comes with a solution for it. Cisco ETA was announced in the last June and now it came for general availability.

Cisco ETA inspects the contents of the encrypted traffic without breaking the packets, it uses network visibility and multi-layer machine learning to look for observable differences.

First, ETA examines the initial data packet of the connection. This by itself may contain valuable data about the rest of the content. Then there is the sequence of packet lengths and times, which offers vital clues into traffic contents beyond the beginning of the encrypted flow. Since this network-based detection process is aided by machine learning, it adapts to change and its efficacy is maintained over time.

Cisco says ETA can identify the quality of encryption, gives visibility and knowledge of what data being encrypted in your network.

Also Read Malicious Code in Kids Game Apps on Google Play Pushing Porn Ads – More than 60 Game Apps Infected

Initially Cisco ETA available only with campus switches, the Catalyst 9300 and 9400 series and now it extended to routing platforms.

  • Integrated Services Router (ISR): 4000 Series, the new 1000 Series, ISRv on ENCS 5000 series.
  • Aggregation Services Router (ASR) 1000 series.
  • Cloud Services Router (CSR) 1000V.

Cisco says it preserves the privacy of legitimate traffic and analyzes encrypted traffic by observing through passive monitoring and it adapts to change and its efficacy is maintained over time.

Gartner report says in 2019 more than 80 percent traffic of corporate traffic is encrypted and more than 50 percent of malware campaigns uses encryption and obfuscation techniques.

Cisco concluded that “We’re excited to bring these much-needed security innovations to our customers and we will be rolling out additional capabilities in the months to come“.

Below is the Cisco ETA video representation

https://youtu.be/KL8SxtZLeqc

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Advanced CoffeeLoader Malware Evades Security to Deliver Rhadamanthys Shellcode

Security researchers at Zscaler ThreatLabz have identified a new sophisticated malware family called CoffeeLoader,...

Clio: Real-Time Logging Tool with Locking, User Authentication, and Audit Trails

Clio is a cutting-edge, secure logging platform designed specifically for red team operations and...

Enhancing Satellite Security by Encrypting Video Data Directly on Payloads

The rapid expansion of low-Earth orbit (LEO) satellite constellations has underscored the need for...