The Modern Malware Review. Analysis of New and Evasive Malware in Live Enterprise Networks 1st Edition, March 2013

Size: px
Start display at page:

Download "The Modern Malware Review. Analysis of New and Evasive Malware in Live Enterprise Networks 1st Edition, March 2013"

Transcription

1 The Moder Malware Review Aalysis of New ad Evasive Malware i Live Eterprise Networks 1st Editio, March 2013

2 THE MODERN MALWARE REVIEW MARCH 2013 TABLE OF CONTENTS Backgroud ad Goals 3 A Focus o Actioable Research 3 Separatig the Kow-Ukows from the Ukow-Ukows 3 About the Data ad the Methodology 4 About WildFire 5 Summary of Key Fidigs 5 Web Traffic Is Where the Problems Are 5 90% of Ukow Malware Delivered Via Web-Browsig 6 5 Days to Coverage for , 20 Days For Everythig Else 7 Challeges of Web-Based Malware 8 Coclusios ad Recommedatios 8 Idetifiers i Ukow Malware 9 40% of Samples Retaied Idetifiers i the Payload 9 30% of Samples Geerated Custom or Ukow Traffic 10 Suspicious Malware Traffic 11 Summary, Coclusios ad Recommedatios 12 Malware Traffic o No-Stadard Ports 13 FTP 13 Web Browsig 13 Custom ad Ukow TCP ad UDP 14 HTTP Proxy 14 Malware Behaviors o the Host 15 Aalysis Avoidace 16 Persistece 17 Hackig ad Data Theft 17 Summary 18 PAGE 2

3 ANALYSIS OF NEW AND EVASIVE MALWARE IN LIVE ENTERPRISE NETWORKS BACKGROUND AND GOALS The Moder Malware Review presets a aalysis of 3 moths of malware data derived from more tha 1,000 live customer etworks usig WildFire (Palo Alto Networks feature for detectig ad blockig ew ad ukow malware). The review focuses o malware samples that were iitially udetected by idustry-leadig ativirus products. A FOCUS ON ACTIONABLE RESEARCH The goal of focusig o ukow or udetected malware is ot to poit out deficiecy i traditioal ativirus solutios but rather to better uderstad the problems, ad hopefully idetify practices that ca help. As such, the report provides aalysis of the malware, but also icludes recommedatios based o the fidigs. Some of these recommedatios are commo sese, ad we do t propose they are a paacea for moder malware ad APTs. The goal is simply to share iformatio that ca help security teams be more proactive i their fight agaist moder malware ad advaced threats. SEPARATING THE KNOWN-UNKNOWNS FROM THE UNKNOWN-UNKNOWNS Part of the problem whe talkig about advaced malware is agreeig what we really mea by moder malware. There is a icredible amout of malware diversity eve whe we focus o ew ad ukow malware. There are highly sophisticated, highly targeted sources of custom malware ad APTs (e.g. APT1, Stuxet, ad Flame). But there are also legios of more traditioal malware operatios that geerate malware at scale that are also able to get by traditioal defeses (e.g. Zeus, Zero Access, Kelihos). Both of these categories preset security risks that eed to be maaged, but obviously vary cosiderably i volume ad the risk posed to the eterprise. The latter, more commo type of malware stads to potetially overwhelm security teams if each ew variat of kow malware requires a maual respose from the security team. If too much ormal malware goes udetected, the security teams will obviously have a very difficult time fidig the truly targeted ad uique threats i their etworks. As a result we believe that it s crucial for eterprises to reduce the overall volume of ifectios from variats of kow malware, so that security teams have the time to focus o the most serious ad targeted threats. Oe of the key values of beig able to aalyze real-world malware at a large scale is the ability to distiguish betwee commo ad repeated threats ad those that are uique. As such, i the report we take a look both at the large-scale treds, but also at some of the samples that quite literally were exceptioal. We hope the results of this aalysis will help security maagers to ot oly reduce the impact of the kow-ukows, but also to reveal the presece of the ukow-ukows as well. PAGE 3

4 THE MODERN MALWARE REVIEW MARCH 2013 ABOUT THE DATA AND THE METHODOLOGY Malware samples were collected i live eterprise etworks as part of the WildFire fuctioality for cotrollig moder malware. As part of our ormal aalysis we test malware samples collected by WildFire agaist fully updated ativirus products from 6 idustry-leadig eterprise ativirus vedors. This review focuses solely o all malware collected i a 3-moth period that iitially had o coverage from ay of the tested vedors. This icluded more tha 26,000 malware samples. Agai, the itet is ot to poit out that some malware gets by traditioal ativirus, but rather to provide actioable isight ito the problem what malware strategies are the most successful, why, ad how ca security teams do to respod. Summary of Data Sources 3 moths of WildFire data. 1,000+ live eterprise etworks. Samples were tested agaist 6 fully-updated, idustry-leadig ativirus products. 26,000+ samples had o coverage at the time they were detected i live eterprise etworks. For the 26,000+ ukow/udetected samples, we used the applicatio level visibility of the extgeeratio firewall i cojuctio with the behavioral aalysis of WildFire to provide as complete a view as possible of the malware lifecycle. This icludes: A applicatio level aalysis of the ifectig malware sessio: Samples were origially captured by the Palo Alto Networks firewall withi customer deploymets. Ay ifectig biaries were uploaded to Palo Alto Networks WildFire malware aalysis cloud for further ivestigatio. I most cases, biaries were accompaied by data cocerig the ifectig sessio such as a webbrowsig sessio to provide isight ito the ifectio strategy used by the attacker. It is importat to ote that these are oly ifectio attempts observed by the firewall ad does ot mea that the ifectio was successful o the actual target. The behavior of the malware o the host: After the iitial collectio of the malware, all further aalysis was performed i the WildFire cloud. This icludes a active aalysis of the malware i a virtualized host eviromet, allowig Palo Alto Networks to observe exactly how the sample behaves o a target ad ay techiques used by the malware. A applicatio level aalysis of traffic geerated by malware: The vast majority of moder malware will make use of a etwork to steal data, orchestrate a ogoig attack agaist the etwork or dowload additioal malicious payloads. For this reaso, we closely aalyzed the traffic geerated by the malware itself i order to better uderstad the techiques used by malware to commuicate. PAGE 4

5 ANALYSIS OF NEW AND EVASIVE MALWARE IN LIVE ENTERPRISE NETWORKS ABOUT WILDFIRE WildFire is a optioal feature of Palo Alto Networks ext-geeratio firewall that eables users to detect ad block ew ad otherwise ukow malware. The solutio leverages the firewall to look withi etwork traffic for files that are ukow (either kow good, or kow bad). Whe a ukow file is detected, the file is copied ad executed i Palo Alto Networks cloud-based eviromet where the file ca be aalyzed as malicious or beig based o the behavior of the malware. Whe a malicious file is detected, WildFire geerates ew protectios based o the iteral idetifiers withi the malware, which are delivered back to the firewall where eforcemet occurs. SUMMARY OF KEY FINDINGS 1. THE WEB IS THE FRONT LINE OF THE FIGHT AGAINST UNKNOWN MALWARE 90% of fully udetected malware was delivered via web-browsig. It took ativirus vedors 4 times as log to detect malware from web-based applicatios as opposed to (20 days for web, 5 days for ). 2. FTP WAS OBSERVED TO BE EXCEPTIONALLY HIGH-RISK Samples from FTP were uique (94% of samples were see oly oce). Samples from FTP were rarely gaied coverage by AV (95% ever gaied coverage). Highly evasive ad port idepedet 97% of FTP samples used oly o-stadard ports. 3. AN OPPORTUNITY TO TAKE ACTION 70% OF MALWARE SHOWED INDICATORS IN THE PAYLOAD OR TRAFFIC 40% of ukow samples were related based o specific idetifiers i the malware header ad body. A sigle idicator was liked to more tha 1,200 uique SHA values. 30% of samples were observed to geerate custom UDP or TCP traffic. Custom or ukow traffic was the 3rd most commo type of traffic geerated by malware, trailig oly web-browsig ad DNS traffic. More tha 30% of samples coected to ew or ukow destiatios o the Iteret. Uregistered or ewly registered domais. Newly registered DNS servers or dyamic DNS domais. 4. MALWARE SPENDS SIGNIFICANT EFFORT AVOIDING SECURITY 52% of observed malware behaviors focused o evadig security or aalysis, compared to oly 15% focused o hackig ad data theft. Attemptig a log sleep to avoid aalysis was the #1 most commo malware behavior overall. PAGE 5

6 THE MODERN MALWARE REVIEW MARCH 2013 WEB TRAFFIC IS WHERE THE PROBLEMS ARE It is t eough to simply kow that there are threats that get by our traditioal security. If we are goig to actually improve i this area, the we eed to lear what makes these more moder classes of malware differet ad how they actually work. I this sectio, we start with the basics ad set out to get a better uderstadig of the characteristics of this malware ad how it gets delivered. Sice the ascet days of the Iteret, has bee the vector of choice for attackers deliverig malware to a target, but that tred is rapidly chagig. While certaily cotiues to be a major source of malware, attackers are icreasigly turig to real-time, web-eabled applicatios to deliver malware that is udetectable by traditioal ativirus solutios. These real-time applicatios provide practical ad techical advatages for a attacker, ad the data shows that they are disproportioally successful at avoidig traditioal ativirus as compared to . To better uderstad this pheomeo, we regularly test all malware samples captured by WildFire agaist fully updated ativirus products from 6 leadig ativirus vedors. This provides a simple method for idetifyig malware samples that are udetectable by traditioal AV, ad thus pose particular risk to a eterprise. Over a 3-moth period, WildFire aalyzed 68,047 samples that were determied to be malware, ad roughly 40% of those samples (26,363) were ot detected by ay of the tested ativirus products at the time the samples were captured i customer etworks. * Note: It is importat to remember that all malware aalyzed for this report was captured by customer firewalls, ad may ot represet all -bore malware depedig o where the firewall is deployed. As such, the data should be used to show which applicatios are relatively the most successful at deliverig ukow malware, ot which delivers the most total volume of malware. 90% OF UNKNOWN MALWARE DELIVERED VIA WEB-BROWSING Give that the samples were captured by the firewall, we were able to idetify the applicatio that carried the malware. While web-browsig was foud to be the leadig source of malware both i terms of total malware* as well as udetected malware, the applicatio mix was very differet betwee the two groups. For example, SMTP accouted for 25% of the total malware, but oly 2% of the fully udetected malware. Comparatively, web-browsig domiated both categories, accoutig for 68% of total malware, but over 90% of udetected samples. This clearly shows that ukow malware is disproportioally more likely to be delivered from the web as opposed to . All Malware Detected by WildFire All Malware Detected by WildFire - No Coverage 68,047 Malware Samples 26,363 Malware Samples 68% Delivered via Web-Browsig 90% Delivered via Web-Browsig 25% Delivered via 2% Delivered via PAGE 6

7 ANALYSIS OF NEW AND EVASIVE MALWARE IN LIVE ENTERPRISE NETWORKS 5 DAYS TO COVERAGE FOR , 20 DAYS FOR EVERYTHING ELSE To exted the aalysis, we cotiually retest ewly idetified samples o a daily basis (for up to 30 days) to observe how idustry coverage chages over time. This showed that ot oly are traditioal AV solutios far less likely to detect malware outside of , but also it takes far loger to get coverage. For ukow malware delivered by , it took a average of 5 days for vedors to provide coverage compared to a average of 20 days for other applicatios, with may samples remaiig udetected for the etire 31 day period. Several applicatios delivered samples that remaied udetected for 30 days or more, but had far fewer samples. Social media ad file-sharig were commo vectors i this category. The fact that these applicatios were used rarely by malware should ot be cofused with beig low-risk. The more rare sources of malware were also more uique ad ofte targeted i ature. The chart below shows a list of specific applicatios ad their relative times to coverage by traditioal ativirus. Applicatios with sigificatly high times-to-detectio should be closely moitored by security teams. FTP had the igomiious distictio of beig both a commo source of ukow malware as well as oe of the sources that rarely received coverage. PAGE 7

8 THE MODERN MALWARE REVIEW MARCH 2013 CHALLENGES OF WEB-BASED MALWARE There are a variety of reasos why web-based malware presets such a challege for traditioal ativirus products. First, web-browsig ad other web-based applicatios are real-time by ature, ulike where a malicious file ca be aalyzed at rest o a mail server. This has the effect of sigificatly shrikig the timescale i which detectio ad eforcemet decisios must be made. However a potetially more sigificat factor is that web-based malware easily leverages server-side polymorphism, which simply meas that the webserver that delivers the malware ca automatically re-ecode the malware payload to appear uique. This has the effect of geeratig vast amouts of uique malware o demad, which vastly reduces the likelihood that AV vedors will be able to capture the sample ad create a sigature. This is obviously very differet from based malware, which are ofte set out i bulk ad are easily captured by ativirus vedors. CONCLUSIONS AND RECOMMENDATIONS I order to better address ukow malware, we first have to better uderstad where our traditioal defeses are failig. The data shows that web-based applicatios are sigificatly more successful at both avoidig traditioal ativirus ad remaiig ukow for exteded periods of time. This meas that orgaizatios eed to cotiue to expad their ati-malware strategies to iclude real-time etwork-based cotrols desiged for these threats. These cotrols ca come i a variety forms that are ot limited to ext-geeratio firewalls. I the comig sectios, we will dig deeper ito more specific idicators ad techiques that ca be put to use. However, at a architectural level, orgaizatios should cosider the followig steps, if ot already implemeted. Brig atimalware techologies ito the etwork: For may years, atimalware techologies lived o the desktop ad etwork security lived i the etwork. The data shows that malware has foud particular success by movig to a more real-time use of the etwork, ad as such security teams should expect ad be prepared to eforce at the etwork as well. This meas that we will eed to ot oly icorporate atimalware techologies i ew places, but we must also do it at ew speeds. Expect ukows, ad add the ability to defiitively idetify malware: Ukow malware is rapidly becomig ormal ad ot the exceptio, ad security must ackowledge this shift. The malware i this report was idetified by actively executig ukow samples i order to see what they actually do. While this is ot the oly solutio to the problem, the more importat poit is that teams eed a automated way to determie if ukow files are malicious or beig that ca be itegrated ito large etworks. Real-time detectio ad blockig wheever possible: I may ways security has experieced a regressio from a midset focused o prevetio to oe based o detectio. Detectio is always the importat first step, but prevetio is key to a maageable security process. Malware is beig geerated at scale by malicious web-servers, with each variat beig slightly uique. If each oe of these variats requires a maual respose, the security staff will remai behid the curve, ad have little chace of catchig the more truly targeted ad sophisticated attacks. We will address some first steps ad strategies i the comig sectios. PAGE 8

9 ANALYSIS OF NEW AND EVASIVE MALWARE IN LIVE ENTERPRISE NETWORKS Eforce User ad Applicatio-based Cotrols o Applicatios That Ca Trasfer Files: Orgaizatios should attempt to reduce their exposure ad attack surface based o user ad applicatio cotrols i additio to improvig the ability to detect ad block ukow malware. For example, HTTP-proxies were a commo source of malware. Orgaizatios should esure that oly their corporate proxies are allowed ad ed-users are preveted from usig their ow web-proxies, which are ofte used to circumvet security policy. I the case of Facebook, teams may allow Facebook, but specifically limit the Facebook file trasfer feature. Such basic steps ca limit some of the exposure to both geeric ad targeted malware eterig the etwork. IDENTIFIERS IN UNKNOWN MALWARE 70% of ukow malware retaied potetially actioable idetifiers i either the malware payload or traffic. While malware has prove the ability to avoid traditioal AV sigatures, the ews is ot all bad. Our aalysis combied a applicatio level aalysis of malware traffic (both iboud ad outboud), the malware payload itself, as well as the malware behavior o a virtual host to fid patters that ca be used to reduce a orgaizatio s exposure to ukow malware. Our aalysis shows that of the more tha 26,000 malware samples aalyzed, 70% retaied distict idetifiers or behaviors that ca be useful for real-time cotrol ad blockig. While every idicator will ot be appropriate for every etwork, the goal is simply to provide the research that security maagers ca adapt to their eviromets. 40% OF SAMPLES RETAINED ACTIONABLE IDENTIFIERS IN THE PAYLOAD Eve though whe malware is modified i order to chage the hash value of the file, the data shows that uique iteral idetifiers remaied visible i more tha 40% of the samples, which ca be used to block malware dowloads i real time. I short, a sigle sigature was foud to be able to protect agaist multiple variats of udetected malware each with uique sha256 values. This tred was cosistet across web-browsig ad other web-based applicatios that pose the greatest challege to traditioal ativirus products. The idetifiers were specifically visible i the header ad body of the ifectig file. This is sigificat because may etwork-based atimalware solutios will idetify malware based o a hash value or URI, which would likely be ieffective i these cases. While blockig 40% of ukow malware does ot solve the problem, it is ecouragig to see techiques that ca potetially reduce the volume of ukow malware, especially from web-based sources. 26,363 total uique malware samples (SHA256). 1,575 uique idetifiers were observed i more tha 1 piece of malware. These idetifiers were observed i 10,616 uique malware samples. 40% of total uique malware had the potetial to be blocked. PAGE 9

10 THE MODERN MALWARE REVIEW MARCH 2013 Oe of the most commo malware idicators was the use of customized traffic by malware. 30% OF SAMPLES GENERATED CUSTOM OR UNKNOWN TRAFFIC As malware has evolved, it has grow more ad more depedet o the ability to ifect, persist ad maage itself over a etwork. I this regard, a uderstadig of how malware commuicates is just as importat as uderstadig the behaviors of the malware o the host. By combiig iformatio captured at the eterprise firewall i cojuctio with traffic aalyzed i the WildFire virtual eviromet, we were able to establish a very complete ad uique view ito malware traffic. Agai, the aalysis was focused o the more tha 26,000 samples that were iitially udetected by ativirus, with a particular focus o evasive techiques observed i the malware traffic as well as distiguishig characteristics i the traffic that ca provide a idicator of a threat or compromise. Oe of the most commo malware idicators was the use of customized traffic by malware. Malware will ofte customize well-kow protocols for their ow purposes. This may iclude modifyig stadard protocols such as HTTP or DNS, but peer-to-peer, istat messagig ad remote desktop protocols ad applicatios are commo targets as well. Ay type of applicatio that provides commuicatio, resiliece ad the ability to trasfer files is potetially valuable to malware. Sice the ext-geeratio firewall positively classifies all traffic, its relatively easy to idetify custom or ukow traffic i the etwork. Complemetary studies i the Palo Alto Networks Applicatio Usage ad Threat Report have clearly show a strog correlatio betwee custom traffic ad malware, ad that tred held true i this study. Custom TCP ad UDP couted as oe of the most commoly idetified behaviors observed i malware, as well as some of the most commoly geerated traffic overall. 30% of ukow malware samples geerated ukow traffic. This was the 4th most commo malware behavior out of more tha 100 observed behaviors. Custom/Ukow Traffic was the 3rd most commo traffic type behid oly web-browsig ad DNS. PAGE 10

11 ANALYSIS OF NEW AND EVASIVE MALWARE IN LIVE ENTERPRISE NETWORKS While security teams may ot wat to block all traffic to ad from a ew domai, they may wat to eforce tighter cotrols such ever allowig executables from these sites. SUSPICIOUS MALWARE TRAFFIC I additio to lookig at the actual malware traffic, it is ofte helpful to look at where the malware is comig from ad goig to. Idetifyig domais ad sites that have served malware has bee a log-stadig compoet of URL filterig solutios. To stay ahead of these solutios, malware operators will geerate custom domais for the attacks, use large umbers of essetially disposable domais, as well as dyamic DNS ad fast-flux domais i order to avoid be blocked. As part of the aalysis we tracked the umber of samples that coected to these domais as well as samples that coected to kow malware sites. 33% of samples coected ew domais, DNS or fast-flux: Newly registered domais, fast-flux domais ad dyamic DNS ca be also be blocked or blocked i cojuctio with custom traffic or other idicators. 20% of samples geerated s: These samples were observed direct coectios over the etwork. As a result, etwork policy should oly allow protocols to ad from the corporate mail server, ad block direct to the Iteret. 12% used HTTP-POST: HTTP-POST methods are very commo i malware, but are also ofte used by web-applicatios. As a result, teams will likely ot wat to block HTTP-POST altogether, but it may make sese to block goig to uregistered or ewly registered domais. PAGE 11

12 THE MODERN MALWARE REVIEW MARCH 2013 SUMMARY, CONCLUSIONS AND RECOMMENDATIONS The aalysis showed that while malware may be ukow to traditioal security solutios, idetifiers still remai. These idetifiers ca preset i the payload of the malware itself or i the etwork traffic that the malware geerates. Some idicators ca be coclusive o their ow, while others may be best used i cojuctio with additioal idicators. The suggestios below, should be used as geeral guidace, but will obviously eed to be customized to the realities of a particular etwork. Stream-based aalysis of file headers ad payloads for malicious idicators: Needless to say that recogizig ad blockig variats of malware i real-time is far preferable to detectig a remediatig. The data shows that at least 40% of ukow malware were observable variats. This puts a very high priority o aalyzig the actual malware payload, ad timely delivery of ewly idetified malware itelligece. Establish ad update a solid baselie for the etwork: Malware behaviors are ofte (but ot always) aomalous, ad these behaviors ca be used to root out ukow malware quickly. However, malware techiques ad strategies will always chage, ad as such it is critical to kow what is ormal for your etwork as opposed to the idustry i geeral. A detailed baselie ca provide the poit of referece that exposes malware. Ivestigate ad remediate ukow traffic: Ukow or custom traffic ca be several thigs i additio to malware. As part of establishig a baselie, security teams should seek out ukow traffic ad idetify it coclusively goig forward. It should quickly be possible to reduce the amout of ukow traffic to very low levels, where malware ca easily be idetified. Restrict rights to ukow, ewly registered domais ad dyamic DNS domais: The Iteret is obviously a dyamic place, ad it may ot be that ucommo to ecouter a uclassified or ew domai. So while security teams may ot wat to block all traffic to ad from a ew domai, they may wat to eforce tighter cotrols such ever allowig executables from these sites, decrypt SSL traffic for ispectio, or blockig HTTP-POSTs to these ukow sites. Oly allow traffic to the corporate server: A sigificat umber of malware samples geerated directly to destiatio o the Iteret. This is very commo behavior amog spammig botets, ad behavior that ca be easily cotrolled. traffic that does ot go to the corporate server ca be easily blocked, ad ay users sedig such traffic ca be ivestigated as a potetial malware ifectio. PAGE 12

13 ANALYSIS OF NEW AND EVASIVE MALWARE IN LIVE ENTERPRISE NETWORKS MALWARE TRAFFIC ON NON-STANDARD PORTS No-SSL traffic o port 443 was the most commo o-stadard port behavior. Malware was observed sedig traffic over o-stadard ports i both iboud ad outboud traffic. The prevalece of this o-stadard behavior varied widely by applicatio as show below. Usig o-stadard ports ca allow malware to evade some security measures, which look for specific types of threats o particular ports. No-SSL traffic o port 443 was the most commo o-stadard traffic behavior. This makes sese give that port 443 is almost always allowed o a etwork, ad some orgaizatios will ot ispect traffic o 443 assumig that it is ecrypted. The sectio below provides a summary of some of the more sigificat types of malware traffic icludig the relative use of o-stadard ports: FTP FTP was oe of the most iterestig ad cocerig applicatios that we observed i the course of the report. It was the 4th most commo source of ukow malware, the malware it delivered was rarely detected (average of 30 days out of 31), ad almost always operated o a o-stadard port. FTP is of course very flexible ad light-weight, makig it a powerful tool for attackers that may ot get the attetio it deserves from security teams. FTP was the most evasive applicatio Observed FTP traffic o 237 o-stadard ports (either side of the coectio usig port 20 or 21). 97% of malware FTP sessios wet over o-stadard ports. Led all applicatios i terms of o-stadard behavior. i terms port evasio, ad had oe of the lowest detectio rates i terms of malware. WEB BROWSING Web-browsig was the workhorse applicatio for ukow malware throughout the lifecycle. It was #1 source of malware, ad the #1 type of traffic geerated by malware. It was also observed to be oe of applicatios used extesively for dowloadig additioal payloads to the host. Malware delivered by web-browsig took 20 days o average i order to gai coverage. However, webbrowsig o o-stadard ports was relatively rare, accoutig for oly about 10% of sessios ad 14% of badwidth. Observed web traffic o 90 o-stadard web ports (server operatig o a port other tha port 80). Relatively ucommo, accoutig for oly 10% of malware web-browsig sessios. Use of o-stadard ports was slightly higher for browsig sessios that dowloaded data. No-stadard ports accouted for 14% of dowloaded badwidth related to web browsig. PAGE 13

14 THE MODERN MALWARE REVIEW MARCH 2013 CUSTOM AND UNKNOWN TCP AND UDP Custom traffic was predictably heavily tied to the traffic geerated by the malware itself. Custom traffic was the 3rd most commo traffic type after web-browsig ad DNS. The use of o-stadard ports varied cosiderably betwee TCP ad UDP, with about half of ukow TCP usig seemigly radom ports ad UDP stayig o well-kow ports. Observed custom TCP traffic o 19 o-stadard ports (server operatig o a port other tha web, mail or proxy ports). 43% of ukow TCP traffic was observed o ports ot associated with ay well-kow applicatios. Coversely, custom-udp was foud exclusively o well-kow ports 53, 80, ad 443. HTTP PROXY HTTP-Proxy traffic was the 2d most commo source of ukow malware after web-browsig. Proxies showed behavior very similar to web-browsig i terms of time to detectio, requirig 19 days for coverage o average. Proxies were more likely to use o-stadard ports that simple web-browsig (17% for proxies, 10% for web-browsig). Observed HTTP-Proxy traffic o 29 o-stadard web ports (server operatig o a port other tha port 80, 443, 1080, 3128, 8000, 8080). Accouted for 17% of malware http-proxy sessios. PAGE 14

15 ANALYSIS OF NEW AND EVASIVE MALWARE IN LIVE ENTERPRISE NETWORKS MALWARE BEHAVIORS ON THE HOST Needless to say, a great deal of the malware life-cycle is focused o the ifected host. Malware must be able to persist o the target for it to be useful i a log-term attack, ad this requires the malware to bled i o the host while avoidig or disablig ay security measures preset. I total, behaviors desiged to avoid aalysis ad persist o the host accouted for more tha half of the behaviors observed by malware. As part of aalyzig potetial malware, WildFire will execute a sample file ad observe it for more tha 100 malicious or suspicious behaviors. These behaviors have bee broadly categorized as follows: Aalysis Avoidace: Specific steps to avoid aalysis either i a malware sadbox or other security solutio (e.g. attempt to sleep for a log period of time). Persistece: This icludes a variety of tasks required for the malware to exist o the host for log periods icludig how the malware will be ru the host ad avoid host-based security. Hackig: These behaviors are directed outside of the ifected host ad typically ivolve figerpritig the surroudig etwork, ad idetifyig earby vulerable hosts. Data Theft: Traffic that is specifically observed stealig iformatio from the compromised host such as passwords or simply device cofiguratio iformatio. Outboud Commuicatio: Icludes malware commad-ad-cotrol ad a variety of behaviors refereced i the previous sectio cocerig malware traffic The table below shows the percetage of behaviors observed i each category. PAGE 15

16 THE MODERN MALWARE REVIEW MARCH 2013 ANALYSIS AVOIDANCE Aalysis avoidace behaviors were some of the most commo behaviors observed, yet were the least diverse. I short, we observed a hadful of techiques i a large percetage of samples. The attempt by the malware to sleep (avoid executig iitially to avoid attetio) was the most commo avoidace behavior ad also the most commo behavior overall regardless of category. Code ijectio was observed i 13.5 percet of samples. This techique is otable i particular because it allows malware to hide withi aother ruig process. This has the effect of the malware out of view if a user checks the task maager ad ca also foil some attempts at applicatio white-listig o the host. While quite rare, it was iterestig to see malware that attempted to check its exteral IP address. This likely idicates a attempt by the malware to determie if it is truly i the target etwork or if its etwork coectio is beig proxied. The attempt by the malware to sleep (avoid executig iitially to avoid attetio) was the most commo avoidace behavior ad also the most commo behavior overall regardless PERSISTENCE The Persistece category was oe of the most active categories of behaviors as malware employed a wide variety of techiques to remai embedded o the host. I all WildFire observed more tha 26 persistece behaviors. Commo strategies where to ivade or overwrite key compoets or directories of the operatig system, cofigurig the malware to ru automatically whe the host is booted up ad disablig host security compoets. of category. PAGE 16

17 ANALYSIS OF NEW AND EVASIVE MALWARE IN LIVE ENTERPRISE NETWORKS Some behaviors were rare, but still quite otable. A small umber of samples were observed to ifect the Master Boot Record, which is a key requiremet for a bootkit. Other rare but iterestig behavior altered the host to prevet a system restore, esurig the ifected system could t be rolled back to a good state. Other modificatios icluded tamperig with operatig system to allow files to be ru eve with ivalid sigatures. HACKING AND DATA THEFT While persistece ad avoidace are meas to a ed, hackig ad data-theft are the eds. Predictably, this category was highly varied i terms of observed behaviors. Give the prepoderace of malware delivered via web-browsig, it was ot surprisig to see the browser as a commo target. Theft of passwords stored i the browser ad maipulatio of cookies were both commo behaviors. PAGE 17

18 THE MODERN MALWARE REVIEW MARCH 2013 SUMMARY Malware has become the key eabler for moder sophisticated attacks due to its ability to avoid traditioal ativirus solutios, ad provide a persistet iteral foothold for log-term iformatio attack oce iside. As attackers ad malware evolve, so to must our security resposes. Moder malware presets a uique challege i that the most sophisticated attacks will cotiue to require traied ad diliget security professioals to ivestigate ad aalyze. O the other had, the sheet volume of ukow malware ca easily overwhelm eve well-staffed security teams. As a result, security must aggressively seek out methods to automate the blockig of ukow malware wherever possible, while actively ivestigatig the ukows that get through. This report has hopefully provided some isight ito the ature of the ukow malware problem, ad provided some basic steps that security teams ca use to protect their etworks. ABOUT PALO ALTO NETWORKS Palo Alto Networks is the etwork security compay. Its ext-geeratio firewalls eable uprecedeted visibility ad graular policy cotrol of applicatios ad cotet by user, ot just IP address at up to 20Gbps with o performace degradatio. Based o patet-pedig App-ID techology, Palo Alto Networks firewalls accurately idetify ad cotrol applicatios regardless of port, protocol, evasive tactic or SSL ecryptio ad sca cotet to stop threats ad prevet data leakage. Eterprises ca for the first time embrace Web 2.0 ad maitai complete visibility ad cotrol, while sigificatly reducig total cost of owership through device cosolidatio. Most recetly, Palo Alto Networks has eabled eterprises to exted this same etwork security to remote users with the release of GlobalProtect ad to combat targeted malware with its WildFire service. For more iformatio, visit Olcott Street Sata Clara, CA Mai: Sales: Support: Copyright 2013, Palo Alto Networks, Ic. All rights reserved. Palo Alto Networks, the Palo Alto Networks Logo, PAN-OS, App-ID ad Paorama are trademarks of Palo Alto Networks, Ic. All specificatios are subject to chage without otice. Palo Alto Networks assumes o resposibility for ay iaccuracies i this documet or for ay obligatio to update iformatio i this documet. Palo Alto Networks reserves the right to chage, modify, trasfer, or otherwise revise this publicatio without otice. PAN_TMMR_032213

Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out

Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out FME Server Security Table of Cotets FME Server Autheticatio - Access Cotrol Default Security Active Directory Trusted Autheticatio Guest User or Aoymous (u-autheticated) Loggig Out Authorizatio - Roles

More information

Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks

Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks Maual Security+ Domai 1 Network Security Every etwork is uique, ad architecturally defied physically by its equipmet ad coectios, ad logically through the applicatios, services, ad idustries it serves.

More information

(VCP-310) 1-800-418-6789

(VCP-310) 1-800-418-6789 Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.

More information

IT Support. 020 8269 6878 n www.premierchoiceinternet.com n support@premierchoiceinternet.com. 30 Day FREE Trial. IT Support from 8p/user

IT Support. 020 8269 6878 n www.premierchoiceinternet.com n support@premierchoiceinternet.com. 30 Day FREE Trial. IT Support from 8p/user IT Support IT Support Premier Choice Iteret has bee providig reliable, proactive & affordable IT Support solutios to compaies based i Lodo ad the South East of Eglad sice 2002. Our goal is to provide our

More information

Securing the Virtualized Data Center with Next-Generation Firewalls

Securing the Virtualized Data Center with Next-Generation Firewalls Securig the Virtualized Data Ceter with Next-Geeratio Firewalls November 2012 Palo Alto Networks: Securig the Virtualized Data Ceter with Next-Geeratio Firewalls Table of Cotets Executive Summary 3 Evolutio

More information

Domain 1 Components of the Cisco Unified Communications Architecture

Domain 1 Components of the Cisco Unified Communications Architecture Maual CCNA Domai 1 Compoets of the Cisco Uified Commuicatios Architecture Uified Commuicatios (UC) Eviromet Cisco has itroduced what they call the Uified Commuicatios Eviromet which is used to separate

More information

Configuring Additional Active Directory Server Roles

Configuring Additional Active Directory Server Roles Maual Upgradig your MCSE o Server 2003 to Server 2008 (70-649) 1-800-418-6789 Cofigurig Additioal Active Directory Server Roles Active Directory Lightweight Directory Services Backgroud ad Cofiguratio

More information

Things Your Next Firewall Must Do

Things Your Next Firewall Must Do 10 Thigs Your Next Firewall Must Do Itroductio: 10 Thigs Your Next Firewall Must Do Much has bee made about brigig applicatio visibility ad cotrol ito etwork security. The reaso is obvious: applicatios

More information

FortiGuard Fortinet s Global Security Research and Protection

FortiGuard Fortinet s Global Security Research and Protection SOLUTION BRIEF FortiGuard Fortiet s Global Research ad Protectio itelligece represets kowledge of the idetity, capabilities, ad itetios of idividuals ad orgaizatios egaged i espioage, sabotage, or theft

More information

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues Maual Widows 7 Eterprise Desktop Support Techicia (70-685) 1-800-418-6789 Domai 1: Idetifyig Cause of ad Resolvig Desktop Applicatio Issues Idetifyig ad Resolvig New Software Istallatio Issues This sectio

More information

Online Banking. Internet of Things

Online Banking. Internet of Things Olie Bakig & The Iteret of Thigs Our icreasigly iteretcoected future will mea better bakig ad added security resposibilities for all of us. FROM DESKTOPS TO SMARTWATCHS Just a few years ago, Americas coducted

More information

ODBC. Getting Started With Sage Timberline Office ODBC

ODBC. Getting Started With Sage Timberline Office ODBC ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.

More information

Domain 1: Configuring Domain Name System (DNS) for Active Directory

Domain 1: Configuring Domain Name System (DNS) for Active Directory Maual Widows Domai 1: Cofigurig Domai Name System (DNS) for Active Directory Cofigure zoes I Domai Name System (DNS), a DNS amespace ca be divided ito zoes. The zoes store ame iformatio about oe or more

More information

3G Security VoIP Wi-Fi IP Telephony Routing/Switching Unified Communications. NetVanta. Business Networking Solutions

3G Security VoIP Wi-Fi IP Telephony Routing/Switching Unified Communications. NetVanta. Business Networking Solutions 3G Security VoIP Wi-Fi IP Telephoy Routig/Switchig Uified Commuicatios NetVata Busiess Networkig Solutios Opportuity to lower Total Cost of Owership ad improve Retur o Ivestmet The ADTRAN Advatage ADTRAN

More information

E-Plex Enterprise Access Control System

E-Plex Enterprise Access Control System Eterprise Access Cotrol System Egieered for Flexibility Modular Solutio The Eterprise Access Cotrol System is a modular solutio for maagig access poits. Employig a variety of hardware optios, system maagemet

More information

Enhancing Oracle Business Intelligence with cubus EV How users of Oracle BI on Essbase cubes can benefit from cubus outperform EV Analytics (cubus EV)

Enhancing Oracle Business Intelligence with cubus EV How users of Oracle BI on Essbase cubes can benefit from cubus outperform EV Analytics (cubus EV) Ehacig Oracle Busiess Itelligece with cubus EV How users of Oracle BI o Essbase cubes ca beefit from cubus outperform EV Aalytics (cubus EV) CONTENT 01 cubus EV as a ehacemet to Oracle BI o Essbase 02

More information

Advanced Protection for Web Services

Advanced Protection for Web Services RealSetry TM SSL overview Advaced Protectio for Web Services SSL Accelerator Itrusio Detectio System Reverse Proxy Applicatio-Firewall Web services deploymet The pricipal reasos which delay the deploymet

More information

Domain 1: Designing a SQL Server Instance and a Database Solution

Domain 1: Designing a SQL Server Instance and a Database Solution Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a

More information

Baan Service Master Data Management

Baan Service Master Data Management Baa Service Master Data Maagemet Module Procedure UP069A US Documetiformatio Documet Documet code : UP069A US Documet group : User Documetatio Documet title : Master Data Maagemet Applicatio/Package :

More information

Detecting Voice Mail Fraud. Detecting Voice Mail Fraud - 1

Detecting Voice Mail Fraud. Detecting Voice Mail Fraud - 1 Detectig Voice Mail Fraud Detectig Voice Mail Fraud - 1 Issue 2 Detectig Voice Mail Fraud Detectig Voice Mail Fraud Several reportig mechaisms ca assist you i determiig voice mail fraud. Call Detail Recordig

More information

InventoryControl. The Complete Inventory Tracking Solution for Small Businesses

InventoryControl. The Complete Inventory Tracking Solution for Small Businesses IvetoryCotrol The Complete Ivetory Trackig Solutio for Small Busiesses Regular Logo 4C Productivity Solutios for Small Busiesses Logo Outlie Get i cotrol of your ivetory with Wasp Ivetory Cotrol the complete

More information

iprox sensors iprox inductive sensors iprox programming tools ProxView programming software iprox the world s most versatile proximity sensor

iprox sensors iprox inductive sensors iprox programming tools ProxView programming software iprox the world s most versatile proximity sensor iprox sesors iprox iductive sesors iprox programmig tools ProxView programmig software iprox the world s most versatile proximity sesor The world s most versatile proximity sesor Eato s iproxe is syoymous

More information

To c o m p e t e in t o d a y s r e t a i l e n v i r o n m e n t, y o u n e e d a s i n g l e,

To c o m p e t e in t o d a y s r e t a i l e n v i r o n m e n t, y o u n e e d a s i n g l e, Busiess Itelligece Software for Retail To c o m p e t e i t o d a y s r e t a i l e v i r o m e t, y o u e e d a s i g l e, comprehesive view of your busiess. You have to tur the decisio-makig of your

More information

Digital Enterprise Unit. White Paper. Web Analytics Measurement for Responsive Websites

Digital Enterprise Unit. White Paper. Web Analytics Measurement for Responsive Websites Digital Eterprise Uit White Paper Web Aalytics Measuremet for Resposive Websites About the Authors Vishal Machewad Vishal Machewad has over 13 years of experiece i sales ad marketig, havig worked as a

More information

Domain 1 - Describe Cisco VoIP Implementations

Domain 1 - Describe Cisco VoIP Implementations Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.

More information

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature. Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.

More information

Business Application Services. Business Applications that provide value to your enterprise.

Business Application Services. Business Applications that provide value to your enterprise. Busiess Applicatio Services Busiess Applicatios that provide value to your eterprise. Sesiple s expertise ca help orgaizatio decode the performace issues ad trasform them ito valuable beefits that meet

More information

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows: Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

The Forgotten Middle. research readiness results. Executive Summary

The Forgotten Middle. research readiness results. Executive Summary The Forgotte Middle Esurig that All Studets Are o Target for College ad Career Readiess before High School Executive Summary Today, college readiess also meas career readiess. While ot every high school

More information

Extending Your Management Reach to Remote Users

Extending Your Management Reach to Remote Users Extedig Your Maagemet Reach to Remote Users White Paper LANDESK WHITE PAPER : Extedig Your Maagemet Reach to Remote Users Table of Cotets Executive Summary... 3 Obstacles to Cost-Effective Remote Maagemet...

More information

FIRE PROTECTION SYSTEM INSPECTION, TESTING AND MAINTENANCE PROGRAMS

FIRE PROTECTION SYSTEM INSPECTION, TESTING AND MAINTENANCE PROGRAMS STRATEGIC OUTCOMES PRACTICE TECHNICAL ADVISORY BULLETIN February 2011 FIRE PROTECTION SYSTEM INSPECTION, TESTING AND MAINTENANCE PROGRAMS www.willis.com Natioal Fire Protectio Associatio (NFPA) #25 a mai

More information

One Goal. 18-Months. Unlimited Opportunities.

One Goal. 18-Months. Unlimited Opportunities. 18 fast-track 18-Moth BACHELOR S DEGREE completio PROGRAMS Oe Goal. 18-Moths. Ulimited Opportuities. www.ortheaster.edu/cps Fast-Track Your Bachelor s Degree ad Career Goals Complete your bachelor s degree

More information

CREATIVE MARKETING PROJECT 2016

CREATIVE MARKETING PROJECT 2016 CREATIVE MARKETING PROJECT 2016 The Creative Marketig Project is a chapter project that develops i chapter members a aalytical ad creative approach to the marketig process, actively egages chapter members

More information

How to use what you OWN to reduce what you OWE

How to use what you OWN to reduce what you OWE How to use what you OWN to reduce what you OWE Maulife Oe A Overview Most Caadias maage their fiaces by doig two thigs: 1. Depositig their icome ad other short-term assets ito chequig ad savigs accouts.

More information

Professional Networking

Professional Networking Professioal Networkig 1. Lear from people who ve bee where you are. Oe of your best resources for etworkig is alumi from your school. They ve take the classes you have take, they have bee o the job market

More information

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

insight reporting solutions

insight reporting solutions reportig solutios Create ad cotrol olie customized score reports to measure studet progress ad to determie ways to improve istructio. isight Customized Reportig empowers you to make data-drive decisios.

More information

PUBLIC RELATIONS PROJECT 2016

PUBLIC RELATIONS PROJECT 2016 PUBLIC RELATIONS PROJECT 2016 The purpose of the Public Relatios Project is to provide a opportuity for the chapter members to demostrate the kowledge ad skills eeded i plaig, orgaizig, implemetig ad evaluatig

More information

leasing Solutions We make your Business our Business

leasing Solutions We make your Business our Business if you d like to discover how Bp paribas leasig Solutios Ca help you to achieve your goals please get i touch leasig Solutios We make your Busiess our Busiess We look forward to hearig from you you ca

More information

BaanERP. BaanERP Windows Client Installation Guide

BaanERP. BaanERP Windows Client Installation Guide BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject to

More information

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology Adoptio Date: 4 March 2004 Effective Date: 1 Jue 2004 Retroactive Applicatio: No Public Commet Period: Aug Nov 2002 INVESTMENT PERFORMANCE COUNCIL (IPC) Preface Guidace Statemet o Calculatio Methodology

More information

client communication

client communication CCH Portal cliet commuicatio facig today s challeges Like most accoutacy practices, we ow use email for most cliet commuicatio. It s quick ad easy, but we do worry about the security of sesitive data.

More information

ANALYTICS. Insights that drive your business

ANALYTICS. Insights that drive your business ANALYTICS Isights that drive your busiess Eterprises are trasformig their busiesses by supplemetig their databases with real ad up-to-date customer data. Aalytics, as a catalyst, refies raw data ad aligs

More information

A GUIDE TO BUILDING SMART BUSINESS CREDIT

A GUIDE TO BUILDING SMART BUSINESS CREDIT A GUIDE TO BUILDING SMART BUSINESS CREDIT Establishig busiess credit ca be the key to growig your compay DID YOU KNOW? Busiess Credit ca help grow your busiess Soud paymet practices are key to a solid

More information

5: Introduction to Estimation

5: Introduction to Estimation 5: Itroductio to Estimatio Cotets Acroyms ad symbols... 1 Statistical iferece... Estimatig µ with cofidece... 3 Samplig distributio of the mea... 3 Cofidece Iterval for μ whe σ is kow before had... 4 Sample

More information

A Rimini Street White Paper. Why Oracle Database Customers Choose Independent Support

A Rimini Street White Paper. Why Oracle Database Customers Choose Independent Support A Rimii Street White Paper Why Oracle Database Customers Choose Idepedet Support About Rimii Street, Ic. Rimii Street is the global leader i providig idepedet eterprise software support services. The compay

More information

Agency Relationship Optimizer

Agency Relationship Optimizer Decideware Developmet Agecy Relatioship Optimizer The Leadig Software Solutio for Cliet-Agecy Relatioship Maagemet supplier performace experts scorecards.deploymet.service decide ware Sa Fracisco Sydey

More information

Agenda. Outsourcing and Globalization in Software Development. Outsourcing. Outsourcing here to stay. Outsourcing Alternatives

Agenda. Outsourcing and Globalization in Software Development. Outsourcing. Outsourcing here to stay. Outsourcing Alternatives Outsourcig ad Globalizatio i Software Developmet Jacques Crocker UW CSE Alumi 2003 jc@cs.washigto.edu Ageda Itroductio The Outsourcig Pheomeo Leadig Offshore Projects Maagig Customers Offshore Developmet

More information

A Balanced Scorecard

A Balanced Scorecard A Balaced Scorecard with VISION A Visio Iteratioal White Paper Visio Iteratioal A/S Aarhusgade 88, DK-2100 Copehage, Demark Phoe +45 35430086 Fax +45 35434646 www.balaced-scorecard.com 1 1. Itroductio

More information

SOCIAL MEDIA. Keep the conversations going

SOCIAL MEDIA. Keep the conversations going SOCIAL MEDIA Keep the coversatios goig Social media is where most of the world is. It is therefore a ope source of cosumer data, a chael of commuicatio ad a platform for establishig relatioships with customers.

More information

IntelliSOURCE Comverge s enterprise software platform provides the foundation for deploying integrated demand management programs.

IntelliSOURCE Comverge s enterprise software platform provides the foundation for deploying integrated demand management programs. ItelliSOURCE Comverge s eterprise software platform provides the foudatio for deployig itegrated demad maagemet programs. ItelliSOURCE Demad maagemet programs such as demad respose, eergy efficiecy, ad

More information

Soving Recurrence Relations

Soving Recurrence Relations Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree

More information

Unicenter TCPaccess FTP Server

Unicenter TCPaccess FTP Server Uiceter TCPaccess FTP Server Release Summary r6.1 SP2 K02213-2E This documetatio ad related computer software program (hereiafter referred to as the Documetatio ) is for the ed user s iformatioal purposes

More information

Flood Emergency Response Plan

Flood Emergency Response Plan Flood Emergecy Respose Pla This reprit is made available for iformatioal purposes oly i support of the isurace relatioship betwee FM Global ad its cliets. This iformatio does ot chage or supplemet policy

More information

A guide to School Employees' Well-Being

A guide to School Employees' Well-Being A guide to School Employees' Well-Beig Backgroud The public school systems i the Uited States employ more tha 6.7 millio people. This large workforce is charged with oe of the atio s critical tasks to

More information

Determining the sample size

Determining the sample size Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors

More information

optimise your investment in Microsoft technology. Microsoft Consulting Services from CIBER

optimise your investment in Microsoft technology. Microsoft Consulting Services from CIBER optimise your ivestmet i Microsoft techology. Microsoft Cosultig Services from Microsoft Cosultig Services from MICROSOFT CONSULTING SERVICES ca help with ay stage i the lifecycle of adoptig Microsoft

More information

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical

More information

CCH Accounts Production

CCH Accounts Production CCH Accouts Productio accouts productio facig today s challeges Preparig statutory ad fiacial accouts is a core activity for our practice, as it is for may professioal firms. Although legislatio ad accoutig

More information

CCH Accountants Starter Pack

CCH Accountants Starter Pack CCH Accoutats Starter Pack We may be a bit smaller, but fudametally we re o differet to ay other accoutig practice. Util ow, smaller firms have faced a stark choice: Buy cheaply, kowig that the practice

More information

Full Lifecycle Project Cost Controls

Full Lifecycle Project Cost Controls Full Lifecycle Project Cost Cotrols EcoSys EPC is a ext geeratio plaig ad cost cotrols software solutio deliverig best practices for full lifecycle project cost maagemet i a itegrated, easy-to-use web

More information

HCL Dynamic Spiking Protocol

HCL Dynamic Spiking Protocol ELI LILLY AND COMPANY TIPPECANOE LABORATORIES LAFAYETTE, IN Revisio 2.0 TABLE OF CONTENTS REVISION HISTORY... 2. REVISION.0... 2.2 REVISION 2.0... 2 2 OVERVIEW... 3 3 DEFINITIONS... 5 4 EQUIPMENT... 7

More information

Investing in Stocks WHAT ARE THE DIFFERENT CLASSIFICATIONS OF STOCKS? WHY INVEST IN STOCKS? CAN YOU LOSE MONEY?

Investing in Stocks WHAT ARE THE DIFFERENT CLASSIFICATIONS OF STOCKS? WHY INVEST IN STOCKS? CAN YOU LOSE MONEY? Ivestig i Stocks Ivestig i Stocks Busiesses sell shares of stock to ivestors as a way to raise moey to fiace expasio, pay off debt ad provide operatig capital. Ecoomic coditios: Employmet, iflatio, ivetory

More information

Securing your business

Securing your business Iteratioal Chamber of Commerce The world busiess orgaizatio Securig your busiess A compaio for small or etrepreeurial compaies to the 2002 OECD Guidelies for the security of etworks ad iformatio systems:

More information

Wells Fargo Insurance Services Claim Consulting Capabilities

Wells Fargo Insurance Services Claim Consulting Capabilities Wells Fargo Isurace Services Claim Cosultig Capabilities Claim Cosultig Claims are a uwelcome part of America busiess. I a recet survey coducted by Fulbright & Jaworski L.L.P., large U.S. compaies face

More information

Enterprise Security & Risk Management. White Paper. Securing the Future with Next-Generation Data Center Security

Enterprise Security & Risk Management. White Paper. Securing the Future with Next-Generation Data Center Security Eterprise Security & Risk Maagemet White Paper Securig the Future with Next-Geeratio Data Ceter Security About the Author Prikshit Goel Prikshit Goel heads the Ceter of Excellece (CoE) for Maaged Security

More information

ContactPro Desktop for Multi-Media Contact Center

ContactPro Desktop for Multi-Media Contact Center CotactPro Desktop for Multi-Media Cotact Ceter CCT CotactPro (CP) is the perfect solutio for the aget desktop i a Avaya multimedia call ceter eviromet. CotactPro empowers agets to efficietly serve customers

More information

CHAPTER 3 THE TIME VALUE OF MONEY

CHAPTER 3 THE TIME VALUE OF MONEY CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all

More information

Engineering Data Management

Engineering Data Management BaaERP 5.0c Maufacturig Egieerig Data Maagemet Module Procedure UP128A US Documetiformatio Documet Documet code : UP128A US Documet group : User Documetatio Documet title : Egieerig Data Maagemet Applicatio/Package

More information

How to read A Mutual Fund shareholder report

How to read A Mutual Fund shareholder report Ivestor BulletI How to read A Mutual Fud shareholder report The SEC s Office of Ivestor Educatio ad Advocacy is issuig this Ivestor Bulleti to educate idividual ivestors about mutual fud shareholder reports.

More information

INDEPENDENT BUSINESS PLAN EVENT 2016

INDEPENDENT BUSINESS PLAN EVENT 2016 INDEPENDENT BUSINESS PLAN EVENT 2016 The Idepedet Busiess Pla Evet ivolves the developmet of a comprehesive proposal to start a ew busiess. Ay type of busiess may be used. The Idepedet Busiess Pla Evet

More information

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013 Integrated Approach to Network Security Lee Klarich Senior Vice President, Product Management March 2013 Real data from actual networks 2 2012, Palo Alto Networks. Confidential and Proprietary. 2008: HTTP,

More information

INVESTMENT PERFORMANCE COUNCIL (IPC)

INVESTMENT PERFORMANCE COUNCIL (IPC) INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks

More information

Protection of Communication Infrastructures

Protection of Communication Infrastructures Protectio of Commuicatio Ifrastructures Chapter 6 Iteret Firewalls 1 Itroductio to Network Firewalls (1) I buildig costructio, a firewall is desiged to keep a fire from spreadig from oe part of the buildig

More information

Serial ATA PCI Host Adapter AEC-6290/6295

Serial ATA PCI Host Adapter AEC-6290/6295 Serial ATA PCI Host Adapter AEC-6290/6295 User s Maual Versio:1.0 Copyright 2003 ACARD Techology Corp. Release: April 2003 Copyright ad Trademarks The iformatio of the product i this maual is subject to

More information

What is IT Governance?

What is IT Governance? 30 Caada What is IT Goverace? ad why is it importat for the IS auditor By Richard Brisebois, pricipal of IT Audit Services, Greg Boyd, Director ad Ziad Shadid, Auditor. from the Office of the Auditor Geeral

More information

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return EVALUATING ALTERNATIVE CAPITAL INVESTMENT PROGRAMS By Ke D. Duft, Extesio Ecoomist I the March 98 issue of this publicatio we reviewed the procedure by which a capital ivestmet project was assessed. The

More information

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA , pp.180-184 http://dx.doi.org/10.14257/astl.2014.53.39 Evaluatig Model for B2C E- commerce Eterprise Developmet Based o DEA Weli Geg, Jig Ta Computer ad iformatio egieerig Istitute, Harbi Uiversity of

More information

Valuing Firms in Distress

Valuing Firms in Distress Valuig Firms i Distress Aswath Damodara http://www.damodara.com Aswath Damodara 1 The Goig Cocer Assumptio Traditioal valuatio techiques are built o the assumptio of a goig cocer, I.e., a firm that has

More information

The ERP Card-Solution. The power, control and efficiency of ERP combined with the ease-of-use and financial benefits of a P-Card.

The ERP Card-Solution. The power, control and efficiency of ERP combined with the ease-of-use and financial benefits of a P-Card. The ERP Card-Solutio Xpoetial - It's about Itegratio The power, cotrol ad efficiecy of ERP combied with the ease-of-use ad fiacial beefits of a P-Card. TM poetial The ERP-Card Solutio P-Cards ad ERP For

More information

1 Computing the Standard Deviation of Sample Means

1 Computing the Standard Deviation of Sample Means Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.

More information

Smart Connected Products & The Internet of Things

Smart Connected Products & The Internet of Things Smart Coected Products & The Iteret of Thigs Who we are Taget delivers Talet Globally. Established for 40 years we specialise i delivery of iovative & tailored talet solutios to customers aroud the world.

More information

Baan Finance Accounts Payable

Baan Finance Accounts Payable Baa Fiace Accouts Payable Module Procedure UP035A US Documetiformatio Documet Documet code : UP035A US Documet group : User Documetatio Documet title : Accouts Payable Applicatio/Package : Baa Fiace Editio

More information

QUADRO tech. PST Flightdeck. Put your PST Migration on autopilot

QUADRO tech. PST Flightdeck. Put your PST Migration on autopilot QUADRO tech PST Flightdeck Put your PST Migratio o autopilot Put your PST Migratio o Autopilot A moder aircraft hardly remids its pilots of the early days of air traffic. It is desiged to eable flyig as

More information

Document Control Solutions

Document Control Solutions Documet Cotrol Solutios State of the art software The beefits of Assai Assai Software Services provides leadig edge Documet Cotrol ad Maagemet System software for oil ad gas, egieerig ad costructio. AssaiDCMS

More information

Digital Enterprise Unit. White Paper. Leveraging Best Practices and Recommendations for Optimal Performance Tuning of IBM Campaign

Digital Enterprise Unit. White Paper. Leveraging Best Practices and Recommendations for Optimal Performance Tuning of IBM Campaign Digital Eterprise Uit White Paper Leveragig Best Practices ad Recommedatios for Optimal Performace Tuig of IBM Campaig About the Author Harshal Tejale Harshal Tejale is a Assistat Cosultat at Tata Cosultacy

More information

Ideate, Inc. Training Solutions to Give you the Leading Edge

Ideate, Inc. Training Solutions to Give you the Leading Edge Ideate, Ic. Traiig News 2014v1 Ideate, Ic. Traiig Solutios to Give you the Leadig Edge New Packages For All Your Traiig Needs! Bill Johso Seior MEP - Applicatio Specialist Revit MEP Fudametals Ad More!

More information

Introducing Your New Wells Fargo Trust and Investment Statement. Your Account Information Simply Stated.

Introducing Your New Wells Fargo Trust and Investment Statement. Your Account Information Simply Stated. Itroducig Your New Wells Fargo Trust ad Ivestmet Statemet. Your Accout Iformatio Simply Stated. We are pleased to itroduce your ew easy-to-read statemet. It provides a overview of your accout ad a complete

More information

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring No-life isurace mathematics Nils F. Haavardsso, Uiversity of Oslo ad DNB Skadeforsikrig Mai issues so far Why does isurace work? How is risk premium defied ad why is it importat? How ca claim frequecy

More information

Introducing Rational Suite

Introducing Rational Suite Itroducig Ratioal Suite Product Versio Ratioal Suite 2000.02.10 Release Date April 2000 Part Number 800-023314-000 support@ratioal.com http://www.ratioal.com IMPORTANT NOTICE Copyright Notice Copyright

More information

STUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA. Maya Maria, Universitas Terbuka, Indonesia

STUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA. Maya Maria, Universitas Terbuka, Indonesia STUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA Maya Maria, Uiversitas Terbuka, Idoesia Co-author: Amiuddi Zuhairi, Uiversitas Terbuka, Idoesia Kuria Edah

More information

CHAPTER 3 DIGITAL CODING OF SIGNALS

CHAPTER 3 DIGITAL CODING OF SIGNALS CHAPTER 3 DIGITAL CODING OF SIGNALS Computers are ofte used to automate the recordig of measuremets. The trasducers ad sigal coditioig circuits produce a voltage sigal that is proportioal to a quatity

More information

Bio-Plex Manager Software

Bio-Plex Manager Software Multiplex Suspesio Array Bio-Plex Maager Software Extract Kowledge Faster Move Your Research Forward Bio-Rad cotiues to iovate where it matters most. With Bio-Plex Maager 5.0 software, we offer valuable

More information

IT Management Options. Security Redefined. Flexible Offerings. Peace of Mind

IT Management Options. Security Redefined. Flexible Offerings. Peace of Mind IT Maagemet Optios Security Redefied Flexible Offerigs Peace of Mid Secure Data Ceters SymQuest has two compliat SSAE-16 Secure Data Ceters (SDC) located i South Burligto, VT ad Westbrook, ME. Our ifrastructure

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. This documet was writte ad copyrighted by Paul Dawkis. Use of this documet ad its olie versio is govered by the Terms ad Coditios of Use located at http://tutorial.math.lamar.edu/terms.asp. The olie versio

More information

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information

TruStore: The storage. system that grows with you. Machine Tools / Power Tools Laser Technology / Electronics Medical Technology

TruStore: The storage. system that grows with you. Machine Tools / Power Tools Laser Technology / Electronics Medical Technology TruStore: The storage system that grows with you Machie Tools / Power Tools Laser Techology / Electroics Medical Techology Everythig from a sigle source. Cotets Everythig from a sigle source. 2 TruStore

More information

CCH CRM Books Online Software Fee Protection Consultancy Advice Lines CPD Books Online Software Fee Protection Consultancy Advice Lines CPD

CCH CRM Books Online Software Fee Protection Consultancy Advice Lines CPD Books Online Software Fee Protection Consultancy Advice Lines CPD Books Olie Software Fee Fee Protectio Cosultacy Advice Advice Lies Lies CPD CPD facig today s challeges As a accoutacy practice, maagig relatioships with our cliets has to be at the heart of everythig

More information

Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY

Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY Optimize your Network I the Courier, Express ad Parcel market ADDING CREDIBILITY Meetig today s challeges ad tomorrow s demads Aswers to your key etwork challeges ORTEC kows the highly competitive Courier,

More information