US-CERT Security Trends Report: 2012 in Retrospect
|
|
|
- Jasmine Henry
- 10 years ago
- Views:
Transcription
1 US-CERT Security Trends Report: 2012 in Retrospect
2 US-CERT Security Trends Report: 2012 in Retrospect US-CERT Security Trends Report: 2012 in Retrospect.... II How to Read This Document Contributors to This Document... 1 About US-CERT... 2 Summary... 2 Malicious Software (malware) [Section 1] Malware Analysis/Characterization [Section 2] Phishing [Section 3] Network Scanning/Reconnaissance Statistics [Section 4]... 4 Routing Statistics [Section 5] Introduction... 5 Scope Malicious Software (Malware) a. Vulnerabilities b. Top Malware Threats in Sality ZeroAccess Win32/Brontok Conficker Ramnit Alureon/TDSS/Tidserv Zeus/Citadel (Zbot) c. Observed Banking Trojans Zeus GameOver Zeus Ice IX Citadel Malware Analysis/Characterization a. Top-Level Domain Distribution b. Geo-Location of IP Addresses Used by Malware c. IP Addresses Per Malicious Domain d. Number of Domains Used by a Malware Artifact e. User-Agent Strings f. Botnet Statistics Phishing 24 3a. Maliciously Registered Phishing Domains b. Observed Spam Themes Network Scanning/Reconnaissance Statistics Routing Statistics a. Announcing U.S. Government IP Space b. Centrality of U.S. Networks c. Service Providers Used by U.S. Government d. IPv6 Usage in U.S. Government Conclusions Further Information Contact Us Feedback Department of Homeland Security Disclaimer DISCLAIMER: This advisory is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. The DHS does not endorse any commercial product or service, referenced in this advisory or otherwise. II
3 How to Read This Document There is growing recognition across all computing sectors of our society of the threat posed by cyber attacks. The need to identify the most prevalent attack vectors offers the opportunity to both identify where we are most vulnerable and inform our response. In our effort to capture prevalent cybersecurity threats and form a basis for annual analysis, US-CERT began to categorize the most frequently observed threats in This document includes a high-level executive summary followed by an introduction to the subject matter and scope of its coverage. The US-CERT 2012 Security Trends Report consists of five sections that contain a digest of technical and statistical information on the following: Malicious Software (malware) Malware Analysis/Characterization Phishing Network Scanning/Reconnaissance Statistics Routing Statistics Conclusions for the trends identified are summarized in Section 6. Contributors to This Document Information from the following sources was incorporated into this report. Carnegie Mellon University Software Engineering Institute CERT Division isight Partners The Shadow Server Foundation Invincea Sourcefire IID This report was coordinated with the following mission partners: 1
4 About US-CERT The United States Computer Emergency Readiness Team (US-CERT) is a 24x7 operational entity focused on collecting and analyzing data and disseminating the information to federal agencies, state and local partners, domestic and international organizations. The US-CERT mission, vision, and goals are as follows: Mission: Improve the nation s cybersecurity posture, coordinate cyber information sharing, and proactively manage cyber risks to the nation while protecting the constitutional rights of Americans. Vision: Be a trusted global leader in cybersecurity collaborative, agile, and responsive in a complex environment. Goals: In the upcoming year US-CERT will: Improve onsite and remote assistance capabilities to provide rapid and comprehensive operational support to our public and private partners; Partner with physical first responders to integrate physical and cyber information sharing and response processes; and Increase outreach to public, private, and international partners. Summary This is the first issuance of the annual NCCIC US-CERT Security Trends Report, which encompasses an analysis of cyber events during 2012 to help support effective decision-making, provide technical details for U.S. network defenders, and support the realization of the evolving threat landscape in the cyber domain. This document is intended to increase information sharing and coordination, infrastructure investment, and transparency. Unless otherwise noted, the statistical data presented in this document is sourced from a compilation of data from US- CERT and contributing industry security partners. The following summarizes the content of each section in this document: Malicious Software (malware) [Section 1] Analysis of compiled data indicates that 7.8 percent of consumer-grade users experienced a malicious software (malware) infection; 20 percent of infections were caused when the user clicked and installed the malicious software. Regardless of infection vector, the data shows that 1 net new infection occurred per 1,000 computers in use per month. The vulnerabilities of client web browsers and the supported applications used to view web and file content (Microsoft Office, Adobe Reader, Java, etc.) lead to the most common means to introduce malware to the computer. Once the malware is installed, it uses the computer s resources for its own malicious activity. Most often, capable malware will become members of a larger peer-to-peer botnet 1 in which infected computers can communicate directly with any other computer in the botnet. These botnets transcend logical and geographic barriers. All of the browser types listed in this report are exploitable in one form or another. Additionally, not all exploits are browser-based, where three of the top four known attack vectors allowed remote code execution via other applications or the operating system itself. The most common malware threat was Sality 2 at 56 percent prevalence. Sality is a dynamic, enduring, and fullfeatured application that infects and spreads for the purposes of relaying spam, proxying of communications,
5 exfiltrating sensitive data, compromising web servers, and coordinating distributed computing tasks (DDoS/ password cracking). It works by joining compromised computers into large botnets, spreading itself by placing installers on removable, and other discovered drives and stealing address lists. Sality disables antivirus software and other system protection mechanisms to avoid detection. At a close second with 54 percent, Zeus 3 and its variants (26 identified) compromised financial and banking industry transactions in over 38 countries. Like Sality, Zeus participates in botnets and hides itself by changing its files to avoid detection. Zeus captures, collects, and distributes user IDs and passwords by logging keystrokes when computer users log into a banking website. Sality, Zeus, and the other most observed malware are described in Section 1. Malware Analysis/Characterization [Section 2] This report broadly characterizes malware infection rates by statistical distribution found in the top-level domains (TLD). A TLD is most easily described as the last component of a web address:.gov or.com. The.com domain has the greatest share of malware infection rates, followed closely by.net and.info. Surprisingly, when malware prevalence is broken out by respective geographic countries and territories, nearly 25 percent of infected computers are geographically unidentifiable which hinders attribution as third-party infected computers are often used to conduct exploitation and denial of service attacks against new targets. Algeria, the United States, and Morocco have the largest number of IP addresses used by malware. When distinct IP addresses are looked at with observed known malicious domains, most common malicious domains have only one IP address associated with them. However, several domains are associated with over 100 distinct IP addresses. A small number have over 1,000 distinct IP addresses, making these domains more difficult to de-list from the Domain Name Servers of the Internet and more functionally resilient. Domain Name Servers contain master lists of domain names and their corresponding numeric IP address. The US-CERT website (www. us-cert.gov), for example, has three IPv6 addresses, one IPv4 address, and two aliases. Roughly 60 percent of malware prevalent in 2012 utilized a single domain name as it established communications with its fellow bots or its controlling servers. Less than 10 percent of malware appeared to use 4 or more domain names, but 4 percent used between 10-1,000 domain names that facilitate communication and persistent communications. Figure 13 in Section 2d shows the proportion of domains that are the most challenging for computer network defenders to block communications to. The final aspect of externally characterizing how malware operates is evaluating how it communicates. As discussed previously, malware commonly uses Internet web addresses for issuing and receiving command and control messages, updates, and the like. This malware often utilizes modified user-agent strings in browser-toserver and server-to-browser communications. Malware collected and analyzed in a lab environment produced 375,665 user-agent strings of which 14,719 were unique. Why are user-agent strings important? User-agent strings are used to negotiate the user experience between the server and the client often to format content according to the user s platform (i.e., server/workstation/tablet/ mobile). When web browsers connect with servers on the Internet, they communicate information about the browser and the computer s software that is making the connection to a server. Malware often uses unique strings to purposely identify and manage the computers that make up botnets. By changing the user strings, the network devices used to protect computers (proxies) are fooled into allowing a connection that they otherwise would not permit. Research into user-agent strings and their attributes shows that if network defenders blocked each of the unique malformed user-agent strings found in the data set, they would reduce the number of permitted malicious web connections by 49.6 percent
6 Phishing [Section 3] A Phishing attack is an attempt by a malicious actor to entice a victim into clicking on a link that appears to originate from a legitimate site, but actually performs a malicious action. Typical phishing attacks attempt to infect computers with malware. In Section 3 Phishing, malicious domain name statistics are assembled and reported across the 34 top-level domains (i.e.,.com, net,.info,.uk, etc.). Using data from over 200,000 unique phishing attacks, the findings are that the highest percentage of domain names registered for malicious use are:.asia with.035 percent,.ms (the island of Montserrat) with.025 percent, and.tk (Tokelau, a territory of New Zealand) with.024 percent. While the.com domain with.003 percent malicious domain registration has the largest number of domain names dedicated to phishing, it also has an exponentially larger number of total domains registered under it. Section 3 also prioritizes the industry themes and well-known brands that are being used for phishing to attract victims to websites containing malware. Network Scanning/Reconnaissance Statistics [Section 4] Network scanning tools are commonly used by system and network administrators to assess the security of a network. In the hands of a malicious actor, these tools are used to discover computer systems known to be vulnerable on a target network. Section 4 details the information that DHS EINSTEIN tool gathers from NetFlow relating to the number of scans per day and their country of origin. Nearly half of all scans originate from three countries: the United States, China, and the Russian Federation. This information is displayed in a ranking from the highest to the lowest number of instances corresponding to the geographical location from where scans are initiated. This section also identifies the top groups of IP addresses that are under a single control structure, a characteristic often seen in scanning. Routing Statistics [Section 5] Challenges exist in containing and managing the boundaries of networks that make up the Internet. There exists a problem with the Border Gateway Protocol (BGP) 4 that permits Internet-facing routers to advertise incorrect information whether it be on purpose or by accident. BGP is used by routers to send traffic to the appropriate place. But how does a router know which other router is the proper destination? Because other routers announce networks/domains they control or are routing traffic for. Analyzing data from the RIPE Coordination Center, one of five Regional Internet Registries (RIRs), revealed that persistent erroneous announcements were identified that pertain to U.S. Government networks. China, Russia, Kazakhstan, South Korea, Canada, France, Bulgaria, and Chile have each announced that U.S. government networks are reachable within these geographically distant autonomous networks for all or part of The informed reader can conclude that this is either the result of configuration errors or intended to route U.S. government information flow over these autonomous networks and then to its legitimate destinations. Traditionally, European, Arab States, and several Asian countries 5 have led the way with regard to Internet availability and per capita connections saw considerable growth in advertised routes coming to the United States and routes passing through the United States. This factor points to the United States as both an increasing Internet hosting provider with 25.6 percent annual growth and an ever larger communications pathway for international data traffic at 25 percent annual growth. Only a 3 percent growth of non-u.s. advertised routes was observed in While this is promising for Internet sustainability, economic growth, etc., it also poses increased risks from cyber attacks. Substantial increases in announcements of IPv6-based networks were also seen in Section 5d shows the use of IPv6 within the U.S. government networks has grown from 21.7 percent to 41 percent while all global adoption has grown from 12.5 percent to 15.6 percent. It must be noted that these percentages pertain to the representation of networks that announce IPv6 resources rather than a percentage of all traffic that has transitioned to IPv6 protocol use
7 Introduction The Department of Homeland Security (DHS) United States Computer Emergency Readiness Team (US-CERT) interacts with federal agencies, industry, the research community, state and local governments, and others to collect and monitor cybersecurity information as well as track security trends and identify emerging cybersecurity threats. The purpose of this report is to provide information and spread awareness about cyber activity affecting corporate and U.S. federal government networks throughout In order to bolster an effective cybersecurity posture, U.S. network defenders need to understand Internet activity affecting U.S. networks, such as network scanning and reconnaissance. US-CERT surveys trends visible to U.S. civilian government networks to provide such information. This information, coupled with the knowledge of communication protocols and the tactics through which they are established, helps prepare network defenders by providing situational awareness. This report examines the relationship between malware and its domains, IP addresses, user-agent (UA) strings, and geo-location data to shed light on malicious communication traffic. Furthermore, information within this report provides an in-depth look at how U.S. Government data is routed globally and the protocols through which the routing occurs to show which geographic points serve as international hubs of information exchange. Additionally, phishing, a common targeting methodology, is analyzed to generalize originating domains and frequent themes. Finally, statistics regarding common banking Trojans such as Zeus, Ice IX, and Citadel demonstrate the prevalence of credential theft malware targeting U.S. government networks. Scope This report presents selected statistics for cybersecurity data analyzed by US-CERT in Data was gathered from a variety of public and private data sources, including the EINSTEIN system. This report is not intended to inform policy, but rather to provide overall situational awareness of current cybersecurity trends. The report focuses on the most exploited vulnerabilities; the malware targeting computing systems; how the malware is most commonly delivered (bots and phishing s); and global network data describing where the referenced malware originates. 5
8 1. Malicious Software (Malware) In 2012, 7.8 percent of consumer users experienced a malware infection, whereas enterprise users reported a 0.7 percent infection rate during the same period. 1 net new system per 1,000 was compromised per month. Only 1 in 5 detection alerts were confirmed infections. 20 percent of all infections were user-introduced (e.g., the user was tricked to click and install). Approximately 70 percent of the time, known malware installed another file that neither was known to be good nor had a signature associated with it (from any vendor). Approximately 75 percent of the time, known malware was installed by a file that neither was known to be good nor had a signature associated with it (from any vendor). 1a. Vulnerabilities The statistics presented above should not be surprising given the continual increase in Internet-ready devices. Most of the classic techniques used by malware involve the exploitation of web-affiliated applications such as browsers and helper/viewer applications (e.g., Java, Microsoft Excel, and Adobe Reader). Figure 1 summarizes data collected from endpoint systems. It shows the parent processes of malware and the top threats that exploit them. These threats will be described in greater detail in Section 1b. chrome.exe 3% Other 1% iexplore.exe 6% firefox.exe 17% explorer.exe 73% Conficker 8% Win32/Brontok 12% Win32/Alureon 3% Ramnit 6% ZeroAccess 13% Other 2% Sality 56% Figure 1: Top Parent Processes and Malware Threats As new vulnerabilities are discovered, the cybersecurity community constantly endeavors to stay ahead of malware developers. This is an arms race between software developers trying to design systems and applications that are not vulnerable to malware infection and the malicious developers trying to exploit said systems. Bug-free applications continue to elude developers, despite efforts to promote secure coding and design practices. Software developers are left to attempt to identify and patch vulnerabilities in deployed software before someone can engineer malware to exploit those vulnerabilities. Another common but much less desirable approach is to attempt to identify and characterize malware that is already exploiting an unknown vulnerability. Security researchers characterize the malware to discern where it works (operating systems), what it exploits, and how it operates once active. 6
9 Successful vulnerability identification and patching does not mean the malicious software will go away. Conficker (8 percent), first identified in late 2008, still remains effective malware. The associated vulnerability, CVE /Microsoft Vulnerability MS08-067, 6 still exists on unpatched Microsoft systems today. Table 1: Top Known Attack Vectors of 2012 CVE Number CVE CVE CVE CVE Description Remote shell in select Windows OSs (including Win7 and Server 2008/R2) via a crafted.lnk not properly handled during icon display through Windows Explorer Remote code execution via Microsoft Excel in Windows and MacOS Remote code execution via a crafted TrueType font file vulnerability in Windows OSs Remote code execution Windows Vista SP2, Server 2008 SP2, and Office applications via a specially crafted enhanced metafile image CVE % CVE % CVE % Other 3% CVE % Figure 2: Malware Attack Vectors from Known CVE Vulnerabilities in 2012 The charts in Figures 3-6 breakdown which versions of the most popular web browsers and helper applications (as described in Figure 1) were the parent processes of malware. Of note is that proper patch management and regular OS/application updates would reduce the attack prevalence, since the most-exploited software continues to be exploited even though there is a patch that would prevent it. Vulnerabilities in web browsers present a significant attack surface since most computers have some kind of web browser, and the browser itself has access to enough confidential information to make it worth attacking. During 2012, the three web browsers with the largest global market share 7 were Firefox (19.82 percent), Internet Explorer (54.77 percent), and Chrome (18.04 percent). Mozilla Firefox is an open-source web browser that has been in use for several years. Figure 3 displays the most exploited versions of the Firefox web browser in
10 60% 50% 40% 30% 20% 10% 0% Figure 3: Exploited Versions of the Firefox Web Browser Microsoft s Internet Explorer (IE) continues to be a predominant web browser worldwide, although it does not enjoy the 90+ percent market share that it once did. IE remains a large target for malware developers. Figure 4 shows the most exploited versions of IE in % 25% 20% 15% 10% 5% 0% Figure 4: Exploited Versions of the Internet Explorer Web Browser Google s Chrome web browser is the newest entrant in the market with a large market share, reducing the reliance on one or two predominant web browsers. Figure 5 shows the most exploited versions of Google s Chrome web browser, the final of the three major web browsers in use in
11 70% 60% 50% 40% 30% 20% 10% 0% Figure 5: Exploited Versions of the Google Chrome Web Browser The most prolific helper application for web browsers is Java. Java was developed to enrich users web experience and deliver dynamic content to every web-enabled platform from servers to mobile devices. It is also vulnerable to attack. Figure 6 shows the most exploited versions of Java in % 50% 40% 30% 20% 10% 0% Version 5 Version 6 Version 7 Figure 6: Exploited Versions of Java 9
12 1b. Top Malware Threats in 2012 The items below represent the top malware threats for This malware was observed as successfully infecting endpoints, which were monitored for This is an important distinction from detection-focused lists, which center on threats caught successfully in the wild. For the purposes of this review, only malware that was seen to have taken root on an endpoint was counted. 1. Sality The Sality threat represents a family of threats (or a code base with multiple versions) in very broad circulation in both consumer and enterprise networks. Sality is highly complex with a decentralized peer-to-peer (P2P) command and control (CNC) and update structure. Sality (generally across all or most variants) is highly aggressive after it has infected an endpoint. This threat typically interferes with security applications, injects itself into other legitimate processes, and attempts to spread through open file shares or connected storage devices. Additionally, Sality is capable of reading address lists from end users and attempting to spread to their trusted contacts over . Perhaps due to its aggressive spreading techniques, Sality was the number-one threat for consumer users and the second most dangerous threat for enterprise users. Sality often installs additional malware on endpoints during its tenure of infection. Systems co-opted into Sality botnets install arbitrary third-party connections, process spam campaigns, and send sensitive passwords and other credential data to external hosts. Initial infection vectors seen during 2012 were largely based, primarily caused by infected attachments and users opening infected files stored on shared resources within enterprise environments. Given the prevalence and complexity of Sality, enterprises infected with this malware are at a high risk of secondary infection and possibly subsequent intrusions from actors using the malware as an entry point for further intrusions into the organization. Reviews of 2013 data at the time of this report indicate that Sality remains a concern, still ranked in the top five largest active malware infections in the field ZeroAccess At 13 percent of observed infections, ZeroAccess was the second most prevalent infection seen in the field for ZeroAccess is a master boot record (MBR) level rootkit generally thought to target consumer users to co-opt their systems into click fraud and Bitcoin mining botnets. 9 While consumer users may be the focus of this malware, enterprises also experience many infections: 72 percent of enterprises surveyed during 2012 had experienced infections with Zero Access. The ZeroAccess malware can, and often does, download other component malware. Like Sality, this malware has a decentralized management and communications infrastructure, which makes it difficult to dismantle. ZeroAccess is a fully functional downloader and backdoor with the ability to install arbitrary software on impacted systems and allow for full remote access by third parties. The majority of infections seen during this period were delivered from classic drive-by attacks on users browsing the web who were redirected to malicious sites. The primary ZeroAccess attack vectors are vulnerable versions of Java. Given its downloader capabilities, enterprises infected with ZeroAccess are at a high risk of further infection from various actors using the malware as an entry point. Reviews of 2013 data at the time of this report indicate that ZeroAccess remains a concern and is ranked in the top 5 largest active malware infections in the field
13 3. Win32/Brontok At 12 percent the diverse Brontok family of malware is delivered over and removable media devices. Like other threats, which leverage as a delivery method, the Brontok family uses contact lists from infected systems and spreads by sending with infected attachments. The source of many enterprise infections is believed to be the usage of removable storage that was infected offsite (e.g., at a user s home) and then brought into the workplace and plugged into systems. Some variants of Brontok incorporate limited denial of service (DoS) capabilities focused on attacking a small number of predetermined (i.e., hard-coded) Internet sites. Brontok is not believed to install backdoor capabilities onto endpoints. Therefore, the presence of this threat does not appear to indicate secondary, additional infections. Reviews of 2013 data at the time of this report indicate that Brontok is less prevalent in 2013 and is no longer in the top 10 largest active malware infections for the first half of Conficker Despite the concerted effort by the industry over the last four years and, in particular, the Conficker working group (CWG), to eradicate Conficker, multiple variants of the threat remain highly prevalent in both the enterprise and consumer user communities. The Conficker threat appears to no longer have a centralized CNC infrastructure, probably due to the efforts of the CWG to eliminate this infrastructure. However, the threat persists. It is not believed that this threat is usually leveraged for secondary intrusions based on research and analysis performed by Sourcefire. Reviews of 2013 data at the time of this report indicate that Conficker remains a concern in 2013, still ranked in the top 10 largest active malware infections in the field. 5. Ramnit Ramnit is an older threat that saw a substantial resurgence on This threat installs highly componentized malware, including a rootkit. In addition to robust capabilities to disable security products, it has the capability to install backdoor access and steal a variety of credentials off the infected system. Newer versions of Ramnit reportedly send telemetry statistics back to the botnet to which they are connected. This data is used to gauge the quality of the infected host in terms of stability and performance, for example. This sophistication indicates commercial-quality software development, which is not observed in previous versions based on research and analysis performed by Sourcefire. Due to its rootkit and backdoor capabilities, enterprises infected with Ramnit are at a high risk of further infection from various actors using the malware as an entry point. Reviews of 2013 data at the time of this report indicate that Ramnit remains a concern in 2013, still ranked in the top five largest active malware infections in the field. 11
14 6. Alureon/TDSS/Tidserv The TDSS threat, like ZeroAccess, is a highly sophisticated MBR-level rootkit; TDSS has code similarities with ZeroAccess and may have been authored by the same development team. Like ZeroAccess, this threat installs a functional backdoor on the impacted system. It will then generally engage the infected system in click fraud activities. Infection vectors for this threat were primarily files purporting to be pirated copyrighted material, installed via drive-by-download, primarily targeting Java. Given its downloader capabilities, enterprises infected with this malware are at a high risk of further infection from various actors using the malware as an entry point. Reviews of 2013 data at the time of this report indicate that TDSS remains a concern in 2013, still ranked in the top 10 largest active malware infections in the field. 7. Zeus/Citadel (Zbot) Citadel is a modified and componentized reworking of the public source code for the Zeus virus. Its primary focus is the theft of banking credentials. However, it has alarming additional capabilities such as mapping out internal addressing and locating SQL Servers. These capabilities indicate that this malware is not solely focused on consumer users. Citadel was equally present on both consumer and enterprise users machines. Due to its sophistication and downloader capabilities, enterprises infected with Citadel are at a high risk of further infection from various actors using the malware as an entry point. Reviews of 2013 data at the time of this report indicate that Citadel remains a concern in 2013, still ranked in the top 10 largest active malware infections in the field. 1c. Observed Banking Trojans During 2012, four prominent banking Trojans were identified as critical financial threats. US-CERT is tracking the version numbers, unique controllers, and unique configuration files that were identified as well as regional distributions of the observed features. Location was determined by observing regional targeting by the various banking Trojans. During 2012, the following observations were made about the Zeus, Gameover Zeus, Ice IX, and Citadel banking Trojans: 1. Zeus Zeus targeted users with accounts in a variety of banks. Banks and financial institutions from more than 38 countries including Australia, Austria, Canada, Chile, France, Germany, Italy, the Netherlands, Poland, Russia, Saudi Arabia, Spain, and the United Kingdom were targeted during this period. Figure 7 summarizes the geographic distribution of the targeted institutions by continent. The majority are global institutions, not bound to a particular country. 26 different versions of Zeus were identified: v v v v v v v v v v v v v v v v v v v v v v v v v v More than 3,500 unique Zeus URLs with more than 105,500 target URLs were identified. 626 unique Zeus controllers were identified during this period. 763 unique Zeus configurations were received during this period. 257 unique Zeus keys were extracted during this period. 12
15 2 % 1 % 0 % 5 % 5 % Global 33 % 54 % Europe Asia Australia South America North America Africa Figure 7: Zeus Targets by Continent 2. GameOver Zeus Banks and financial institutions in Australia, Canada, Germany, Italy, Poland, Saudi Arabia, and South Africa were targeted the most during this period. 7,006 GameOver P2P drones were identified during this period. More than 540 unique GameOver Zeus URLs with more than 2,100 target URLs were identified. One new configuration file was received during this period. 3. Ice IX Global banks and financial institutions across more than 33 countries including Australia, Canada, Chile, Finland, France, Germany, Ireland, Italy, Latvia, the Netherlands, Norway, Russia, Spain, Turkey, and the United Kingdom were targeted during this period. Figure 8 summarizes the geographic distribution of the targeted institutions by continent. The majority are global institutions, not bound to a particular country. 13 different versions of Ice IX were identified: v v v v v v v v v v v v v More than 1,600 unique Ice IX URLs with more than 5,460 target URLs were identified. 121 unique Ice IX controllers were identified during this period. 215 unique Ice IX configurations were received during this period. 53 unique Ice IX keys were extracted during this period. 13
16 1 % 5 % 3 % 12 % Global Europe 52 % Australia Asia 27 % South America North America Figure 8: Ice IX Targets by Continent 4. Citadel Global banks and financial institutions including many in Australia, Finland, Germany, Italy, the Netherlands, Norway, Poland, Romania, Russia, Spain, Sweden, Switzerland, and the United Kingdom were targeted during this period. Figure 9 summarizes the geographic distribution of the targeted institutions by continent. The majority are global institutions, not bound to a particular country. 14 different versions of Citadel were identified: v v v v v v v v v v v v v v More than 1,800 unique Citadel URLs with more than 4,200 target URLs were identified. 368 unique Citadel controllers were identified during this period. 660 unique Citadel configurations were received during this period. 145 unique Citadel keys were extracted during this period. 14
17 1 % 12 % 3 % 35 % 49 % Global Europe Australia Asia Other Figure 9: Citadel Targets by Country 2. Malware Analysis/Characterization The CERT Artifact Catalog (AC) is a collection of malicious artifacts maintained by the CERT Coordination Center (part of the Software Engineering Institute at Carnegie Mellon University). The catalog contains more than 60 million artifacts collected from thousands of different sources. All malware in the catalog is executed in a sandboxed environment, which records the behavior of the malware, including the domain names with which it attempts to communicate. Domains that are in the Alexa Top One Million ( as well as those that begin with ntp (as in ntp.example.com), are removed from the results. The remaining domains are then compared against a database of passive Domain Name System (DNS) information to ascertain if the domains are active. Sections 2a-2d report various features of the domains observed from the CERT Artifact Catalog that were active in the DNS. To be considered active, a domain must be observed in use (that is, there is a record in the passive DNS database that someone successfully resolved the domain), and the domain must not have been designated as a name server. Results from a partner s sandbox environment were also tested in the same manner and are included when possible. Because there is potential for duplication of malware testing (multiple sources having the same malware sample), data from different sources are independently presented. Section 2e discusses a different aspect of malicious software: the user-agent string used in web communications. Section 2f discusses the prevalence of different botnets and types of malicious software observed on U.S. systems and networks. 15
18 2a. Top-Level Domain Distribution Figure 10 shows the distribution of common top-level domains (TLDs) used by malware per quarter, based on the total number of active, fully-qualified domain names. 70% 60% 50% 40% 30% 20% CERT AC Q1 CERT AC Q2 CERT AC Q3 CERT AC Q4 Partners CY % 0% com net info org biz cc cn Others Figure 10: Top-Level Domains Used by Malware 16
19 2b. Geo-Location of IP Addresses Used by Malware Figure 11 shows the country of origin for IP addresses, using data provided by MaxMind ( The IP addresses are derived simply from the A records of the observed active malicious domains in the DNS. 10 The data depicted represents not only sources of attacks but also destinations of outbound traffic from compromised systems. For instance, a malware-infected system may be configured to call home for additional instructions, for reporting, or to act as a hub for communications to other infected systems. In both the CERT AC and the partner sources, the country with the most IP addresses is Algeria, with the United States and Morocco following closely behind. Roughly 23 percent of IP addresses used by malware were not geographically discernible. 30% CERT AC Q1 CERT AC Q2 CERT AC Q3 CERT AC Q4 Partners CY % 20% 15% 10% 5% 0% Figure 11: Geo-Location of IP Addresses Used by Malware 10 The main purpose of the DNS is to map domain names to IP addresses, so when a domain is active it almost always has an IP address or addresses associated with it. We used any address associated with any active malware domain during
20 2c. IP Addresses Per Malicious Domain Figure 12 shows the number of distinct IP addresses associated with observed malicious domains. Most malicious domains only ever have one IP address associated with them. However, several domains are successfully resolved to over 100 distinct IP addresses during their lifetimes. A few are resolved to over 1,000 distinct IP addresses. 50% 45% 40% 35% 30% 25% 20% 15% CERT AC Q1 CERT AC Q2 CERT AC Q3 CERT AC Q4 Partners CY % 5% 0% Distinct IP Addresses Figure 12: Number of Distinct IP Addresses Used by Observed Malware Domains 18
21 2d. Number of Domains Used by a Malware Artifact Figure 13 shows how many domains a given artifact attempted to contact. Most artifacts attempt to contact only one domain. High numbers indicate malware using domain generation algorithms or similar techniques to facilitate more robust command and control communication. 70% Percent of unique domain lookups per artifact 60% 50% 40% 30% 20% Q1 Q2 Q3 Q4 10% 0% Number of unique DNS names Figure 13: Percent of Unique Domain Lookups Per Artifact 2e. User-Agent Strings In computing, a user agent (UA) is software that acts on behalf of a user. In many cases, a user agent acts as a client in a network protocol used in communications with a client-server computing system. In particular, the Hypertext Transfer Protocol (HTTP) identifies the client software originating the request using a user-agent header. When a user agent operates in a network protocol (such as HTTP), it often identifies itself, its application type, operating system, its software vendor, or its software revision by submitting a characteristic identification string from client to server. In HTTP, the UA string is often used for content negotiation from servers and workstations to tablets and other mobile devices. Malware can use traditional UA strings when it takes over a browser, or it can create its own strings according to its purpose. Partner-contributed data containing UA strings collected during 2012 was analyzed to evaluate trends regarding well-formed UA strings vs. outlying or strange strings. 19
22 Malware files collected in 2012 and examined in the partner s runtime environment 11 produced 375,665 UA strings observed in HTTP traffic. Accounting for replication, the data set consisted of 14,719 unique UA strings. For each unique string, the following measurements were taken: Count: the number of times the string appeared in the data set StrLen: the total length of the string (1 to 256 characters) Elements: the total number of substring elements, stripped of white space, after separating the string on any of a set of 7 characters: : ; ( ) / { } Figure 14 displays a bar plot of counts associated with the 500 most popular UA strings in the data set. Three marked points show changes in the pattern of popularity, which can be used as principled cutoff points for analysis of typical vs. atypical UA strings. 65,536 Top 10 Top 50 Top ,384 4,096 1,024 Count Rank Figure 14: Ranked Count of Unique UA Strings This bar plot does not appear to have as much of a heavy drop-off as expected, possibly due to minor changes in the string elements, repeated many times. Note that counts are shown, on the log base 2 vertical scale, so even subtle changes in steepness correspond to significantly different patterns of popularity. There are some observable changes in steepness at the top 10, top 50, and top 115 UA strings. The top 115 unique UA strings make up 88.4 percent of all instances in the total data set, with the remaining 14,604 UA strings accounting for 11.6 percent of all instances in the total data set. The top 115 strings and a random sample of 50 from the remaining 14,604 unique UA strings were processed through an online analyzer and categorized as well-formed or malformed according to the number of recognizable components from the analyzer s parser. Of the top 115 unique UA strings, 63 percent were classified as malformed; of the random sampling of 50 unique UA strings from the remaining data set, 66 percent were classified as malformed a nearly identical proportion to the most popular strings. Replications correspond to 47 percent of the instances of the top 115 unique UA strings labeled as unknown and about 31 percent of
23 the remaining unique UA strings labeled as unknown. These rates suggest that the diversity of well-formed UA strings is similar to the diversity of malformed UA strings. For the entire replicated set, approximately 49.6 percent of UA strings used are malformed. Much of the diversity of well-formed UA strings comes from the prevalence of Mozilla-compatible strings with recognizable elements that are appended to the end of the string. For example, a sampled known tail string (1 count) is shown here: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0;.NET CLR ;.NET CLR ; Media Center PC 4.0;.NET4.0C;.NET4.0E;.NET CLR ; AskTbORJ/ ;.NET CLR ;.NET CLR ;.NET CLR ) Compared to the most popular UA string (119,574 counts): Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1) Older OS and browser versions were associated with the less popular UA strings. Some Google search bots showed up in the top 115 UA strings and were labeled as known with some unknown components by the online analyzer. Bot crawlers (e.g., Yahoo! Slurp China!, Synoobot, Becomebot) were represented in the tail sample: 19 out of 50 sampled tail strings were bots, for an estimated 38 percent of the tail and approximately 4 percent of all replicated UA strings. The following are examples of bot strings: Mozilla/5.0 (compatible; Synoobot/0.9; Mozilla/5.0 (compatible; SummizeBot + Mozilla/5.0 (compatible; MojeekBot/2.0; Mozilla/5.0 (compatible; MSIE 6.0; Podtech Network; [email protected]) Mozilla/5.0 (compatible; MSIE 6.0; Podtech Network; [email protected]) Mozilla/5.0 (compatible; Charlotte/1.0b; [email protected]) Given that all of the UA strings in this sample came from queries made by systems running binaries flagged as malware, it seems reasonably safe to assume that UA strings matching well-known, legitimate bots such as the Googlebot are simply malware authors attempting to avoid detection, and not the creators of those crawlers using malware or grayware to do their work. Where the bot strings become particularly interesting is the unknown strings, both from detection and malwareauthor behavioral-analysis perspectives. Detection of malicious network traffic with an Intrusion Detection System (IDS) or proxy is mostly based on signature matches in the traffic. A UA string known nowhere else on the Internet except in a malicious traffic set is typically a good signature to alert on, as its false positive rate in the wild should approach or be zero. There are many difficulties with doing detection using unique, yet transient strings. This problem has been investigated in regards to DNS names. The same challenges would apply to UA strings; however, the most common malicious UAs could be blocked. All of the unique malformed UAs detected in this analysis could be blocked, which would reduce the number of permitted malicious web connections by about half (49.6 percent). Looking at the example bot strings above which contain domain names that are all absent from the global WHOIS database at the time this report was written it appears as though the creators of these particular malicious binaries are making work easy for network defenders by providing such unique strings upon which to base detection. If, however, we assume a modicum of professionalism or desire to thwart detection, we must wonder what purposes these random domains serve. Were they perhaps targeted phishing attempts against system administrators, who might click the links in their web server log files out of sheer curiosity, or are they simply noise presented in a fairly standardized format, in an attempt to thwart automated detection of non-standard bot strings? This is a question that likely warrants further study but is outside the scope of this particular report. We can also look at the relationship between total string length and the number of elements, which points out some outliers, especially for strings with fewer than six elements. 21
24 Total String Length Median [0.025, 0.975] Bound Number of Elements Figure 15: Total String Length Vs. Number of Elements The relationship between total string length and the number of elements identifies some additional outliers, especially for strings with fewer than six elements, as represented in Figure 15. Strings with small numbers of elements based on the separating characters are generally unknown. In the sample of unique strings (the top 115 plus the 50 randomly sampled), of 77 UA strings with one or two elements, only 2.5 percent were known (those known were the Googlebot strings). 58 percent of a total of 72 strings with between 3 and 10 elements were known, and all 16 strings with greater than 10 elements were known. This information, plus the somewhat even distribution of known and unknown strings across popularity, suggests that the number of elements in a string may be a better large-scale indicator than popularity for its custom vs. non-custom utility for the malware author and thus for its utility as a potential detection criterion. As with a DNS-based blacklist, a UA-based blacklist is likely to be a useful portion of a defense-in-depth strategy. Though less than half of the top 115 strings are potential candidates to use in a blacklist, the frequency of their appearance in the sample set is large enough to indicate that requests made with these malicious UA strings will yield large numbers of detections of infected systems in the wild, spanning different malware families and large periods of time. Combined with relatively rapid updates (which would contain large numbers of temporarily useful detection criteria in the form of infrequently used, but very clearly malicious, UA strings from the tail of our distribution), a properly implemented UA blacklist could prove to be a powerful tool in the fight against modern malware. 22
25 2f. Botnet Statistics A bot is an industry term for a compromised system; it refers to a machine controlled remotely, usually by an unfriendly controller. Cyber criminals distribute malware with the intent of taking over as many individual computers as possible. Once infected, these computers form a network (a botnet) that often transcends security and geographic boundaries, and is controlled by the bot master. The bot master uses these networks to perform automated tasks on a large scale all without the owners knowledge, such as sending spam or conducting distributed denial of service attacks. Figure 16 shows the top 30 botnets infecting U.S.-based systems in 2012, by both unique IP addresses observed in the botnet and number of connection attempts. Botnet gozi virut botnet virut_botnet gameover_zeus spam ransomware 3322.org-pcclient yzf ssh-brute-force seguranca kelihos avalanche other zeus sality2 pushdo flashback ircbot sality-p2p 3322.org-generic slenfbot.5050 grum sality slenfbot sinkhole tdss zeus-p2p trafficconverter conficker.abc dnschanger 1 10 Average Number of Unique IP Addresses Per Day 100 1,000 10, ,000 1,000,000 10,000,000 Average Number of Connections Per Day 100,000,000 1,000,000,000 Figure 16: Top 30 Botnets Infecting U.S. Systems 23
26 3. Phishing 3a. Maliciously Registered Phishing Domains Phishing attacks remain a consistent threat to U.S. Internet users. Data from industry partners shows 216,938 unique phishing attacks in 2012, hosted on 153,952 unique domain names. However, not all of these domain names were maliciously registered; many are simply compromised. This determination is generally made based on the past history of the domain; hacked domains have significant previous benign activity. In fact, based on the data provided, only 13,545 of the domains in 2012 seem to have been maliciously registered for the purposes of phishing. Responding to maliciously registered domains seems to be in the purview of the registrars and registries in a way that responding to compromised domains is not. Compromised domains have legitimate users, and operators have a responsibility for limiting collateral damage. If a domain is registered solely for malicious use, legitimate use is not a concern. Several industry partners have compiled statistics on the top-level domains (TLDs) with the most maliciously registered domains per 10,000 domains in that registry. There are many fewer maliciously registered domains than phishing domains in general, and only 33 of the more than 220 TLDs with phishing reported had more than a few maliciously registered domains in all of Further, since the industry partners can reasonably obtain only zone-size estimates and reports from TLDs, these statistics do not include those phishing domains registered in subdomain services or virtual hosting, 12 services that represent about 1 in 8 domains in the industry partners data set. After attempting to control for these difficulties, one can calculate the rate at which domains were registered especially for phishing in each TLD. Figure 17 displays the results. The TLDs of.asia,.ms,.tk, and.in stand out in this graphic the percentage of malicious domains registered in these TLDs is much higher than that of the rest of the TLDs. The TLD with the highest absolute number of maliciously registered TLDs is still.com; in fact, 51 percent of total phishing domains were hosted in.com. However,.com is at least an order of magnitude larger than the other TLDs, so its ratio of malicious registrations is somewhat less, though the absolute number is large. The high rate of registrations for phishing in.asia,.ms,.tk, and.in may indicate an interesting insight Percent of Malicious Domains Top Level Domain Figure 17: Percentage of Maliciously Registered Phishing Domains Per TLD. Note the Y-axis range is 0 to 0.04% (i.e., the max is 4 in 10,000 domains). 12 Both services provide a way to locate or host resources. These resources could be created maliciously and might factor into a discussion of malicious registrations. However, since these services are offered independently by a variety of private organizations, we have no reliable method of assessing the rate of maliciously created material. 24
27 3b. Observed Spam Themes Spam lure data was collected during Q2 and the beginning of Q to establish a baseline for future trend reporting and to report on readily observable changes in the data during Observed samples revealed that the largest portion of spam lure themes occurring during 2012 consisted of the following topics: Business logistical operations, such as packaging, shipping, voice and fax messaging services, and online document services Financials, such as tax-related subjects Claims of either customer complaints or legal filings against a company, such as by the Better Business Bureau (BBB) and other federal and local civilian labor agencies Travel These topics were found to be consistent through Q3 and Q but varied in their numbers based on realworld events occurring during those quarters. As presented in Figure 18, lures spoofing financial institutions were observed as the top spam theme, with 23 percent of spam lures occurring from July through September During that same time, packaging and shipping lures made up only about 11 percent of observed themes. 25% % (Oct-Dec) Observations % 20% 15% 10% 5% 0% UPS/FedEx Financials Voice/Fax Messages Figure 18: Comparative Change in Spam Theme BBB Facebook Intuit CNN Delta Verizon Skype Xerox IRS/Tax ACH Paypal AT&T LinkedIn/Careerbuilder Wire Transfer Vodaphone FDIC Google Drive Sprint Discover DocuSign Pharmaceutical Credit Score ADP HP Scan % (July-Sept) 25
28 During Q4 2012, lures using business logistical operations, such as packaging and shipping, increased from 11 percent to 17 percent of observed lures, as displayed in Figure 19. This change was likely due to malicious actors using the holiday season and successfully exploiting victims during the months when people and businesses would generally ship more items than normal. Additionally, real-world news reporting made up 5 percent of observed lures during Q4 2012, as opposed to the less than 1 percent from Q3. This change can be attributed to high-profile, newsworthy events that occurred during the quarter, such as the U.S. presidential election. Credit Score 2% Pharmaceutical 2% DocuSign 2% Discover 2% Sprint 2% Google Drive 2% FDIC 2% Vodaphone 2% Wire Transfer 2% LinkedIn/Careerbuilder 2% AT&T 2% Paypal 2% ACH 2% IRS/Tax 2% Xerox 3% Skype 3% Verizon 3% UPS/FedEx 17% Delta 5% CNN 5% Financials 15% Voice/Fax Messages 11% Facebook 6% Intuit 6% BBB 6% UPS/FedEx Financials Voice/Fax Messages BBB Facebook Intuit CNN Delta Verizon Skype Xerox IRS/Tax ACH Paypal AT&T LinkedIn/Careerbuilder Wire Transfer Vodaphone FDIC Google Drive Sprint Discover DocuSign Pharmaceutical Credit Score Figure 19: Observed Spam Themes (October-December 2012) Observed mass-mailing spam themes may encompass several factors such as campaign success, online popularity/ use, media attention, and the purchase of addresses tied to network breaches. Real-world events such as seasons, holidays, public events, news events, and global crises are also a factor in the most frequently observed mass-mailing spam themes. Observed mass-mailing spam themes consistently use business operations lures to reliably target a company s networks through its distant branches, telecommuting or contract employees, or any other employee unfamiliar with corporate policies for conveying company information. 26
29 4. Network Scanning/Reconnaissance Statistics The EINSTEIN system, developed in 2003, provides an automated process for collecting, correlating, and analyzing computer network security information from voluntary participating federal executive agencies. 13 It works by collecting network flow (NetFlow) records. NetFlow records are records of connections made to a federal executive agency s IT systems. The records identify the source Internet protocol (IP) address of the computer that connects to the federal system; the port the source uses to communicate; the time the communication occurred; the federal destination IP address; the protocol used to communicate; and the destination port. NetFlow records used by EINSTEIN do not contain any content transmitted over the network. Scanning activity collected from NetFlow records is measured using the Threshold Random Walk 14 and the Bayesian Logistic Regression 15 scan detection models. The charts below summarize the activity seen in Figure 20 displays the number of scans per day. Figure 21 displays the top countries from which scans originated, and Figure 22 demonstrates the top autonomous systems (AS) groups of IP addresses under a single control structure used for scanning Jan 1-Feb 1-Mar 1-Apr 1-May 1-Jun 1-Jul 1-Aug 1-Sep 1-Oct 1-Nov 1-Dec Figure 20: Scans per Day United States China Russian Federation Taiwan Korea, Republic of Romania Brazil Hungary Germany Japan India Italy Bulgaria Turkey Poland Bulgaria Canada France Spain Ukraine Millions of Scans Jung, J.; Paxson, V.; & Berger, A. W. Fast Portscan Detection Using Sequential Hypothesis Testing. Proceedings of the 2004 IEEE Symposium on Security and Privacy. Oakland, CA, pp Gates, C.; McNutt J.; Kadane J.; & Kellner, M. Scan Detection on Very Large Networks Using Logistic Regression Modeling. Proceedings of the IEEE Symposium on Computers and Communications, pp
30 Figure 21: Countries from Which Scans Originate AS4134 AS4837 AS3462 AS6830 AS8402 AS19262 AS4766 AS4812 AS9121 AS36375 AS4788 AS4808 AS21788 AS3269 AS12322 AS19994 AS20845 AS4713 AS6389 AS Millions of Scans Figure 22: Top Autonomous Systems Used for Scanning 28
31 5. Routing Statistics While not directly tied to the attack landscape, the shape of the Internet as it stands today is an important part of understanding the field on which network administrators are fighting modern threats to their networks. As such, this section presents some relevant routing information about the way the Internet operates, in particular as it relates to the United States at a commercial and governmental level. 5a. Announcing U.S. Government IP Space Border Gateway Protocol (BGP) is the routing protocol used at the core of the Internet to move packets between autonomous systems. BGP has no built-in security, which means that an autonomous system can announce that it is the appropriate route to networks that it does not own and then hijack traffic. It is impossible to say whether these erroneous announcements are malicious or merely mistakes. Historical BGP data from the RouteViews and RIPE NCC projects was used to determine which non-u.s. autonomous systems erroneously announced U.S.-government-owned IP space during The timeline in Figure 23 illustrates the announcements, which AS issued the erroneous announcement, for which IP block, and for how long. Table 2 supplements this figure by listing the location of the organizations that own the autonomous systems on the timeline. AS /24, /23 AS /24 AS /27 AS /24, /24, AS /24 AS /32 AS /24 AS / Figure 23: Non-U.S. Autonomous Systems Announcing U.S. Government IP Space 29
32 Table 2: Autonomous System by Country of Ownership Autonomous System AS12389 AS4538 AS9198 AS38410 AS577 AS2208 AS41313 AS13424 Country Russia China Kazakhstan South Korea Canada France Bulgaria Chile 5b. Centrality of U.S. Networks The centrality of U.S.-owned autonomous systems to the Internet at large is demonstrated by the percentage of Internet routes that require a U.S.-owned autonomous system to be complete. To determine this percentage, it is necessary to determine: (1) The percentage of Internet routes that start outside the United States and then touch a U.S.-owned autonomous system at some point (2) The percentage of Internet routes that use the United States in transit (i.e., the path starts outside the United States, touches one or more U.S.-owned autonomous systems, and then exits) Figure 24 illustrates the centrality of U.S. networks during 2012 based on these percentages. 100 Percentage of Routes that Enter the US and Exit Percentage of Routes that Enter the US 80 Percentage Time Figure 24: Centrality of U.S. Networks 30
33 The percentage remained relatively stable throughout 2012 in both cases, with a summary of the maximum, minimum, and average found in Table 3. Table 3: Percentage of Routes Using U.S. Networks Type Min Max Average Transit 47.4% 53.6% 51.8% Entry 70.4% 74% 72.5% There was an increase of 28.6 percent in the number of Internet routes available in There were increases in the number of routes entering the United States (25.6 percent) and in the number of routes that used the United States in transit (25 percent). The centrality of U.S. networks remained constant through the year, although the global Internet seems to be diversifying slightly. 5c. Service Providers Used by U.S. Government The U.S. government has peering relationships with autonomous system networks (ASNs) that provide for ingress/egress into the Internet at large. Figure 25 shows which service providers offered egress for the largest amount of government IP addresses during This assessment was performed on January 1, 2012 and on December 1, 2012 to show how these numbers changed over the course of the year. other MREN - Metropolitan Research and Education AARNET-AS-AP Australian Academic and CSUNET-NE - California State University STARTAP - National Center for No IP Whois data-3356 Provider Name - ASN ATT-INTERNET4 - AT&T Services Inc UUNET - MCI Communications Services Inc. NLR - National LambdaRail ESNET - ESnet-293 ABILENE - Internet End of 2012 Beginning of 2012 TWTC - tw telecom holdings inc Level 3 Communications-3549 AS1239 SprintLink Global Network-1239 ASN-QWEST-US NOVARTIS-DMZ-US-209 0% 10% 20% 30% 40% 50% 60% Percent of Federal Government IP space Advertised Figure 25: U.S. Government Increase in IPv6 Announcements in
34 5d. IPv6 Usage in U.S. Government During 2012, IPv6 announcements became more prevalent in response to the mandate that the U.S. government make all public-facing websites and services available over IPv6. Analysis of government IPv6 announcements into the Internet at large was also performed using data from RouteViews ( and RIPE ( Figure 26 displays the percentage of U.S.- government-owned autonomous system numbers (ASNs) that claim to have endpoints in some amount of IPv6 address space. Overall, there was a growth from 21.7 percent of U.S.-government-owned ASNs at the beginning of the year to 41 percent at the end of the year. In comparison, out of all ASNs on the Internet, 12.5 percent announced IPv6 address space at the beginning of the year, and 15.6 percent at the end. Considering only U.S.- based ASNs, the rates of IPv6 announcements were 5.4 percent at the beginning of the year and 7.4 percent at the end of the year Percentage of ASNs Time Figure 26: Growth of IPv6 32
35 6. Conclusions The single biggest conclusion we can draw from the data in this report is that the scale of the problem of malicious software continues to grow in nearly every facet: geography, number of domains and IP addresses contacted, the diversity of signatures (on the network and on the host), and the number and breadth of phishing and spam lure campaigns. The defender community must scale its efforts to address, contain, and thwart these activities. Dedicated financial theft Trojans (Section 1c), including Zeus, Citadel, and Ice IX, continue to grow in popularity. These are kits that are purchased, configured, and launched by a multitude of independent actors. The breadth of targets, the wide variety of versions, and the number of actors using these kits continue to grow as cybercrime s criminal element grows. The scale of botnets continues to grow as well. While new botnets have appeared, many of the old botnets such as Conficker, Grum, Virut, and others have not gone away, continuing to strain defenders resources. As a point of reference, it took nearly a decade for Code Red to be eradicated from the Internet, and data shows that the SQLSlammer worm can still be found on the Internet. Infected machines have a surprisingly long life, and they continue to cause damage. Cybercrime is an increasingly global problem, and 2012 statistics show that there is no end in sight. To address the global nature of cybercrime, private industry and security research communities continue to work on international outreach at all levels, with an emphasis on data sharing and collaboration. This report is the first of a series of annual reports, enabling comparisons of yearly data to reveal new trends, the effects of remediation efforts, and the emergence of new threats. 7. Further Information Contact Us To request information or provide suggestions about this report please contact the CERT Coordination Center at [email protected]. Feedback US-CERT continuously strives to improve its products and services. You can help by answering a short series of questions about this product at the following URL: Department of Homeland Security Disclaimer This report is a non-commercial publication intended to educate and inform personnel engaged in cybersecurity. Further reproduction or redistribution is subject to original copyright restrictions. DHS provides no warranty of ownership of the copyright, or accuracy with respect to the original source material. 33
36 US-CERT 2013 Security Trends Report: 2012 in Retrospect
24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY EXPLOIT KITS UP 75 PERCENT The Infoblox DNS Threat Index, powered by IID, stood at 122 in the third quarter of 2015, with exploit kits up 75 percent
Security Business Review
Security Business Review Security Business Review Q4: 2014 2 By Bitdefender Labs Security Business Review Botnet Anonymization Raises New Security Concerns Executive Overview While botnets, which are large
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Malware Trend Report, Q2 2014 April May June
Malware Trend Report, Q2 2014 April May June 5 August 2014 Copyright RedSocks B.V. 2014. All Rights Reserved. Table of Contents 1. Introduction... 3 2. Overview... 4 2.1. Collecting Malware... 5 2.2. Processing...
Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth
Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference
THREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
UNCLASSIFIED. Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC)
Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC) Cyber in the News 1 Tactics, Techniques and Procedures These observed tactics, techniques
Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic
The Leader in Cloud Security RESEARCH REPORT Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic ABSTRACT Zscaler is a cloud-computing,
Operation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
The Advanced Cyber Attack Landscape
The Advanced Cyber Attack Landscape FireEye, Inc. The Advanced Cyber Attack Landscape 1 Contents Executive Summary 3 Introduction 4 The Data Source for this Report 5 Finding 1 5 Malware has become a multinational
BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL
BOTNETS Douwe Leguit, Manager Knowledge Center GOVCERT.NL Agenda Bots: what is it What is its habitat How does it spread What are its habits Dutch cases Ongoing developments Visibility of malware vs malicious
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
Microsoft Security Intelligence Report volume 7 (January through June 2009)
Microsoft Security Intelligence Report volume 7 (January through June 2009) Key Findings Summary Volume 7 of the Microsoft Security Intelligence Report provides an in-depth perspective on malicious and
Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013
Integrated Approach to Network Security Lee Klarich Senior Vice President, Product Management March 2013 Real data from actual networks 2 2012, Palo Alto Networks. Confidential and Proprietary. 2008: HTTP,
Anti-exploit tools: The next wave of enterprise security
Anti-exploit tools: The next wave of enterprise security Intro From malware and ransomware to increasingly common state-sponsored attacks, organizations across industries are struggling to stay ahead of
Unknown threats in Sweden. Study publication August 27, 2014
Unknown threats in Sweden Study publication August 27, 2014 Executive summary To many international organisations today, cyber attacks are no longer a matter of if but when. Recent cyber breaches at large
Microsoft Security Response Center (MSRC) Microsoft Malware Protection Center (MMPC)
Security@Microsoft Trustworthy Computing (TwC) Programs supporting security outreach and engagement Microsoft Active Protections Program (MAPP), Government Security Program (GSP) (was SCP) Microsoft Security
How To Mitigate A Ddos Attack
VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT ISSUE 3 3RD QUARTER 2014 CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS 4 Mitigations by Attack Size 4 Mitigations by Industry 5
GlobalSign Malware Monitoring
GLOBALSIGN WHITE PAPER GlobalSign Malware Monitoring Protecting your website from distributing hidden malware GLOBALSIGN WHITE PAPER www.globalsign.com CONTENTS Introduction... 2 Malware Monitoring...
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
Phishing Activity Trends Report for the Month of December, 2007
Phishing Activity Trends Report for the Month of December, 2007 Summarization of December Report Findings The total number of unique phishing reports submitted to APWG in December 2007 was 25,683, a decrease
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Breaking the Cyber Attack Lifecycle
Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com
Streamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
Botnets: The Advanced Malware Threat in Kenya's Cyberspace
Botnets: The Advanced Malware Threat in Kenya's Cyberspace AfricaHackon 28 th February 2014 Who we Are! Paula Musuva-Kigen Research Associate Director, Centre for Informatics Research and Innovation (CIRI)
Phishing Trends Report
Phishing Trends Report Analysis of Online Financial Fraud Threats Second Quarter, 2009 For more information, please contact: [email protected] 888.239.6932 www.internetidentity.com Internet Identity
Innovations in Network Security
Innovations in Network Security Michael Singer April 18, 2012 AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies.
LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
BotNets- Cyber Torrirism
BotNets- Cyber Torrirism Battling the threats of internet Assoc. Prof. Dr. Sureswaran Ramadass National Advanced IPv6 Center - Director Why Talk About Botnets? Because Bot Statistics Suggest Assimilation
The Fundamental Failures of End-Point Security. Stefan Frei Research Analyst Director [email protected]
The Fundamental Failures of End-Point Security Stefan Frei Research Analyst Director [email protected] Agenda The Changing Threat Environment Malware Tools & Services Why Cybercriminals Need No 0-Days
High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe
2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Why The Security You Bought Yesterday, Won t Save You Today
9th Annual Courts and Local Government Technology Conference Why The Security You Bought Yesterday, Won t Save You Today Ian Robertson Director of Information Security Michael Gough Sr. Risk Analyst About
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? Drive-by Downloads are a common technique used by attackers to silently install malware on a victim s computer. Once a target website has been weaponized with
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Trend Micro Incorporated Research Paper 2012. Adding Android and Mac OS X Malware to the APT Toolbox
Trend Micro Incorporated Research Paper 2012 Adding Android and Mac OS X Malware to the APT Toolbox Contents Abstract... 1 Introduction... 1 Technical Analysis... 2 Remote Access Trojan Functionality...
[state of the internet] / SEO Attacks. Threat Advisory: Continuous Uptick in SEO Attacks
TLP: GREEN Issue Date: 1.12.16 Threat Advisory: Continuous Uptick in SEO Attacks Risk Factor High The Akamai Threat Research Team has identified a highly sophisticated Search Engine Optimization (SEO)
Threat Spotlight: Angler Lurking in the Domain Shadows
White Paper Threat Spotlight: Angler Lurking in the Domain Shadows Over the last several months Talos researchers have been monitoring a massive exploit kit campaign that is utilizing hijacked registrant
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform
WHITE PAPER Cloud-Based, Automated Breach Detection The Seculert Platform Table of Contents Introduction 3 Automatic Traffic Log Analysis 4 Elastic Sandbox 5 Botnet Interception 7 Speed and Precision 9
Alert (TA14-212A) Backoff Point-of-Sale Malware
Alert (TA14-212A) Backoff Point-of-Sale Malware Original release date: July 31, 2014 Systems Affected Point-of-Sale Systems Overview This advisory was prepared in collaboration with the National Cybersecurity
Security A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
DATA SHEET. What Darktrace Finds
DATA SHEET What Darktrace Finds Darktrace finds anomalies that bypass other security tools, due to the uniqueness of the Enterprise Immune System, capable of detecting threats without reliance on rules,
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
Threats to Local Governments and What You Can Do to Mitigate the Risks
Association of Minnesota Counties Threats to Local Governments and What You Can Do to Mitigate the Risks Andrew Dolan Director of Government Affairs Multi-State Information Sharing and Analysis Center()
CITADEL TROJAN OUTGROWING ITS ZEUS ORIGINS
CITADEL TROJAN OUTGROWING ITS ZEUS ORIGINS May 2012 As of April 30th, 2012 the Citadel Trojan was at its fourth upgrade with Version 1.3.4.0 already in the hands of its customers. Citadel s features, bug
Symantec enterprise security. Symantec Internet Security Threat Report April 2009. An important note about these statistics.
Symantec enterprise security Symantec Internet Security Threat Report April 00 Regional Data Sheet Latin America An important note about these statistics The statistics discussed in this document are based
Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)
Indian Computer Emergency Response Team (CERT-In) Annual Report (2010) Indian Computer Emergency Response Team (CERT-In) Department of Information Technology Ministry of Communications & Information Technology
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Practical Steps To Securing Process Control Networks
Practical Steps To Securing Process Control Networks Villanova University Seminar Rich Mahler Director, Commercial Cyber Solutions Lockheed Martin Lockheed Martin Corporation 2014. All Rights Reserved.
ZNetLive Malware Monitoring
Introduction The criminal ways of distributing malware or malicious software online have gone through a change in past years. In place of using USB drives, attachments or disks to distribute viruses, hackers
ENABLING FAST RESPONSES THREAT MONITORING
ENABLING FAST RESPONSES TO Security INCIDENTS WITH THREAT MONITORING Executive Summary As threats evolve and the effectiveness of signaturebased web security declines, IT departments need to play a bigger,
ENEE 757 CMSC 818V. Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park
21. Botnets ENEE 757 CMSC 818V Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park http://ter.ps/757 https://www.facebook.com/sdsatumd Today s Lecture Where we ve been AuthenDcaDon
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
IBM Protocol Analysis Module
IBM Protocol Analysis Module The protection engine inside the IBM Security Intrusion Prevention System technologies. Highlights Stops threats before they impact your network and the assets on your network
Perspectives on Cybersecurity in Healthcare June 2015
SPONSORED BY Perspectives on Cybersecurity in Healthcare June 2015 Workgroup for Electronic Data Interchange 1984 Isaac Newton Square, Suite 304, Reston, VA. 20190 T: 202-618-8792/F: 202-684-7794 Copyright
WHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware
WHITEPAPER How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware How a DNS Firewall Helps in the Battle against Advanced As more and more information becomes available
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014
Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Lisa D. Traina, CPA, CITP, CGMA Lisa Traina utilizes her 30+ years of experience as a CPA, CITP and CGMA
Adventures in Cybercrime. Piotr Kijewski CERT Polska/NASK
Adventures in Cybercrime Piotr Kijewski CERT Polska/NASK Would you like a Porsche? Porsche Cayenne S Turbo: 149 000 USD Or maybe a different type? Porsche 911 Turbo: 149 000 USD The car is there Porsche
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
5 Steps to Advanced Threat Protection
5 Steps to Advanced Threat Protection Agenda Endpoint Protection Gap Profile of Advanced Threats Consensus Audit Guidelines 5 Steps to Advanced Threat Protection Resources 20 Years of Chasing Malicious
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
Using big data analytics to identify malicious content: a case study on spam emails
Using big data analytics to identify malicious content: a case study on spam emails Mamoun Alazab & Roderic Broadhurst [email protected] http://cybercrime.anu.edu.au 2 Outline Background Cybercrime
Protecting your business from fraud
Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.
The Application Usage and Threat Report
The Application Usage and Threat Report An Analysis of Application Usage and Related Threats within the Enterprise 10th Edition February 2013 PAGE 1 Executive Summary Global Findings Since 2008, Palo Alto
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
VIRUS TRACKER CHALLENGES OF RUNNING A LARGE SCALE SINKHOLE OPERATION
VIRUS TRACKER CHALLENGES OF RUNNING A LARGE SCALE SINKHOLE OPERATION Kleissner & Associates Botconf 14, 3-5 Dec 2014, Nancy/France Worlds largest botnet monitoring system Since September 2012 Originally
Spyware: Securing gateway and endpoint against data theft
Spyware: Securing gateway and endpoint against data theft The explosion in spyware has presented businesses with increasing concerns about security issues, from data theft and network damage to reputation
LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages
LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,
DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest
DDoS Attacks: The Latest Threat to Availability Dr. Bill Highleyman Managing Editor Availability Digest The Anatomy of a DDoS Attack Sombers Associates, Inc. 2013 2 What is a Distributed Denial of Service
Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms
Overview Common Internet Threats Tom Chothia Computer Security, Lecture 19 Phishing Sites Trojans, Worms, Viruses, Drive-bydownloads Net Fast Flux Domain Flux Infiltration of a Net Underground economy.
Mobile App Reputation
Mobile App Reputation A Webroot Security Intelligence Service Timur Kovalev and Darren Niller April 2013 2012 Webroot Inc. All rights reserved. Contents Rise of the Malicious App Machine... 3 Webroot App
