EVOLUTION OF EXPLOIT KITS
|
|
|
- Jesse Henry
- 10 years ago
- Views:
Transcription
1 EVOLUTION OF EXPLOIT KITS Exploring Past Trends and Current Improvements Joseph C. Chen Brooks Li
2 CONTENTS Introduction...ii Exploit Kit Attack Scenario... 1 Contact... 1 Redirect... 1 Exploit and Infect... 1 Exploit Kit Evolution... 2 Early Versions... 2 Evolution... 3 Current Trends in Exploit Kits... 3 Top Exploit Kits... 3 Top Targets... 4 Used Exploits... 4 Evasion Techniques: Antivirus/Virtualization Product Detection... 5 Evasion Techniques: File Obfuscation... 6 Exploit Kits in Solutions for Exploit Kits... 8 Appendix...iii References...v TREND MICRO LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all situations and may not reflect the most current situation. Nothing contained herein should be relied on or acted upon without the benefit of legal advice based on the particular facts and circumstances presented and nothing herein should be construed otherwise. Trend Micro reserves the right to modify the contents of this document at any time without prior notice. Translations of any material into other languages are intended solely as a convenience. Translation accuracy is not guaranteed nor implied. If any questions arise related to the accuracy of a translation, please refer to the original language official version of the document. Any discrepancies or differences created in the translation are not binding and have no legal effect for compliance or enforcement purposes. Although Trend Micro uses reasonable efforts to include accurate and up-to-date information herein, Trend Micro makes no warranties or representations of any kind as to its accuracy, currency, or completeness. You agree that access to and use of and reliance on this document and the content thereof is at your own risk. Trend Micro disclaims all warranties of any kind, express or implied. Neither Trend Micro nor any party involved in creating, producing, or delivering this document shall be liable for any consequence, loss, or damage, including direct, indirect, special, consequential, loss of business profits, or special damages, whatsoever arising out of access to, use of, or inability to use, or in connection with the use of this document, or any errors or omissions in the content thereof. Use of this information constitutes acceptance for use in an as is condition.
3 INTRODUCTION An exploit kit, or exploit pack, is a type of hack toolkit that cybercriminals seem to have favored in the last few years to perform Web-based attacks to distribute malware. Several kits have since been developed then sold or rented out like commercial products in underground markets. The earliest hack toolkit made available in the crimeware market on record was seen sometime in [1] A typical exploit kit usually provides a management console, a bunch of vulnerabilities targeted to different applications, and several add-on functions that make it easier for a cybercriminal to launch an attack. The rise of exploit kits in underground markets pushes exploit kit developers to improve the stealth and efficiency of their product. Currently, there are 70 different exploit kits in the wild that take advantage of more than a hundred vulnerabilities. In this paper, we will discuss what an exploit kit is, how it works, and how it has changed over time.
4 EVOLUTION OF EXPLOIT KITS Research Paper EXPLOIT KIT ATTACK SCENARIO CONTACT REDIRECT EXPLOIT INFECT One of the things that make an exploit kit effective is that a lot of its routines are executed automatically. To better illustrate how an exploit kit works, we deconstruct a typical attack scenario and explain its stages. Normal Website Compromised Website Malicious Advertisement Traffic Direction System Exploit Server Kit Ransomware Banking Trojan Contact Spammed Link Malware Contact is the beginning of infection, Four stages of the exploit kit infection chain where an attacker attempts to make people access the link of an exploit kit server. Contact is often done through spammed , wherein recipients are tricked into clicking a link through social engineering lures. [2] Aside from spammed s, compromised websites are also widely used as a contact path. Attackers would inject malicious code that, in turn, will redirect website visitors to the exploit kit. Malvertisement is another form of advanced attack, wherein the Web advertisement redirects website visitors to the exploit kit server. [3 4] This technique makes any website that displays the malicious advertisement a possible infection vector. Redirect Traffic redirection system refers to the capacity with which the exploit kit operator can screen through victims based on certain condition sets. This is done through a traffic direct system, such as SutraTDS or KeitaroTDS, for aggregating and filtering redirect traffic before accessing the exploit kit server. [5] The source of traffic redirection isn t always directly managed by the exploit kit operator but by the traffic provider who sells the traffic in underground markets. The traffic subscriber, who, in this case, is the exploit kit operator, can specify their target and filter out victims who don t meet certain requirements. For example, an exploit kit operator can target a specific country by filtering client IP address by geolocation. Exploit and Infect Once users are successfully tricked into clicking the link of an exploit kit server in the contact stage and filtered in the redirect stage, they will be directed to the exploit kit s landing page. The landing page is responsible for profiling client environment and in determining which vulnerabilities should be used in the ensuing attack. 1 Page 2015 Trend Micro Incorporated
5 Once the vulnerable applications are identified, the page will send requests to the exploit kit server to download the exploit files that would attack the targeted applications. The vulnerabilities found in Web browsers, Java, Adobe Flash Player, and Adobe Acrobat and Reader are the ones most targeted by exploit kits. After successfully exploiting a vulnerability, the attacker can now download and execute the malware in the victim s environment. We ve seen various types of malware downloaded in exploit kit attacks, the most notable ones being online banking malware and ransomware. [6 7] EXPLOIT KIT EVOLUTION US$1,000. Compared to WebAttacker, the control panel of Mpack provided a more detailed statistics on its victim, such as their location. More than 3,000 compromised websites had the redirect links of Mpack. Several exploit kits were also released in 2007 in underground markets, namely, NeoSploit, Phoenix, Tornado, and Armitage exploit kits, but Mpack was seen as one of the serious exploit kit threats that year. [8 9] Fiesta, AdPack, and FirePack exploit kits emerged in 2008, and the infamous Blackhole Exploit Kit surfaced in The success of earlier-released exploit kits led to the subsequent creation and release of other kits that have been hitting legitimate businesses hard. The Timeline Record of Exploit Kits Early Versions The first recorded exploit kit attack could be traced back in 2006, which used the WebAttacker kit. This was the first exploit kit found in the Russian underground market. It came with technical support and was sold for US$20. The redirect link of WebAttacker was distributed via spam and compromised websites. It targeted multiple vulnerabilities found in Microsoft Windows, Mozilla Firefox, and Java applications to distribute malware in wild. The second exploit kit, Mpack, was developed by three Russian programmers sometime in the middle of The first complete version was released December that same year and was sold for Number of Active Exploit Kit Timeline record of exploit kits Number of New Released Exploit Kit Figure 2 shows the number of active exploit kits found in the wild and the number of new ones seen each year since It can be observed that this threat was on an upward trend from 2006 to 2013, with Page 2015 Trend Micro Incorporated
6 EVOLUTION OF EXPLOIT KITS Research Paper new ones identified in 2012 alone. This, however, slowly dropped in 2013 and sharply declined in The number of active exploit kits also decreased in The arrest of Paunch, the author of Blackhole Exploit Kit, in October 2013 might have sent a strong message in underground cyber markets, given the radical changes in the statistics of exploit kits. Note that Blackhole was the widely used exploit kit in 2012 and 2013, posing a major threat to users. Evolution Despite the decrease in activity, the threats exploit kits pose upon users have not changed. Several exploit kits were still in use in 2014, some of which were Fiesta, Nuclear, SweetOrange, Styx, FlashPack, Neutrino, Magnitude, Angler, and Rig. [10 12] Fiesta is the newer version of NeoSploit identified in Nuclear was identified in 2010 but was upgraded to version 3 with new exploits in SweetOrange, Styx, and FlashPack were first used in attacks in Neutrino, Magnitude, and Angler were identified in 2013; Rig was first seen in April CURRENT TRENDS IN EXPLOIT KITS Top Exploit Kits One can say that Blackhole Exploit Kit took a back seat in underground markets when its creator, Paunch, was arrested. Several exploit kits then emerged and took its place in the spotlight, so to speak. Figure 3 shows the distribution of exploit kit attacks seen in Distribution of exploit kit attacks 3 Page 2015 Trend Micro Incorporated
7 EVOLUTION OF EXPLOIT KITS Research Paper Figure 3 shows the distribution of exploit kit attack we identified in SweetOrange, used in malvertisement attacks that distributed ransomware, took more than a third of the exploit kit preference share. The Angler Exploit Kit was also widely used and remains to be one of the most active to date. Top Targets In terms of impact, the U.S. is the most affected because it was the target of almost 60% of attacks that use exploit kits, as shown below. Distribution of top 10 countries attacked in 2014 Used Exploits The effectiveness of exploit kits depends on the exploits they utilize. An exploit for a new vulnerability can lead to more malware infections because, most likely, the vulnerability is yet to be patched by the user. This means that in order to keep the high infection rate of an exploit kit, exploit kit owners need to continuously update their exploits. Infection rate is important to exploit kit developers because it serves as a key feature. Developers use it to showcase the tenacity of their product in underground markets, which would eventually lead to more business. 4 Page 2015 Trend Micro Incorporated
8 EVOLUTION OF EXPLOIT KITS Research Paper Vulnerabilities Used in 2014 Exploit Kit Attacks Nuclear SweetOrange FlashPack Rig Angler Magnitude Fiesta Styx HanJuan Internet Explorer CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE Microsoft Silverlight CVE CVE CVE CVE CVE Adobe Flash Player CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE CVE Adobe Acrobat/ Reader CVE CVE Oracle Java CVE CVE CVE CVE CVE CVE XMLDOM ActiveX CVE CVE CVE CVE There have been more than a hundred vulnerabilities found integrated in exploit kits since 2006, which includes more than 10 different applications. Adobe Reader and Java exploits were popular targets in 2008; Java exploits was the top targeted application used by exploit kits in However, we found that PDF Reader and Java vulnerabilities were no longer updated in exploit kits since By contrast, 5 exploit kits used Microsoft Silverlight toward the end of 2013 all the way to 2014, making it the top target by exploit kits. Internet Explorer exploits were also considered a primary attack vector. Things changed, however, after Microsoft released a major Security Bulletin, which included a significant improvement for mitigating UAF (User After Free) vulnerability. [13] After that, only one Internet Explorer exploit was included in exploit kits, CVE , which Microsoft immediately patched. This change seems to have driven attackers toward Adobe Flash Player. This soon became the main targeted application with which the following exploits were found in exploit kits in just a short period: CVE , CVE , CVE , CVE , CVE , and CVE EVASION TECHNIQUES: ANTIVIRUS/VIRTUALIZATION PRODUCT DETECTION A new feature we saw added into exploit kits is the ability to detect installed security software. This means that if certain specific security products are installed, the exploit kit will stop itself from running. The security products mentioned here include both anti-virus products and virtual machine software. 5 Page 2015 Trend Micro Incorporated
9 Antivirus Products Detected in Exploit Kits EVASION TECHNIQUES: FILE OBFUSCATION Exploit Kit Angler Nuclear Rig Styx Evasion target (antivirus or virtualization software) Kaspersky Kaspersky Kaspersky Kaspersky Trend Micro Trend Micro Trend Micro ESET VMWare VirtualBox Parallels Desktop This behavior is done through a vulnerability in Internet Explorer (CVE ). This vulnerability allows an attacker to check for the presence of files and folders in an affected system. It was first reported to Microsoft in February 2014 but was only patched in September that same year as part of MS Below is an example for anti-virus product checking: Sample code of CVE in detecting antivirus software Obfuscation is a common technique used in several kinds of attacks to prevent the detection of the malicious payload. Through obfuscation, the payload is changed to have a different appearance in static but recovers during execution. Exploit kits regularly use various techniques to obfuscate their exploit file. In 2014, some exploit kits were changed to use new obfuscation techniques. In the cases that we ve seen, attackers used legitimate tools to obfuscate their files. For example, Angler Exploit Kit now uses Pack200 format to perform obfuscation on Java exploits. Pack200 is the archive format developed by Sun (Java s original developers) for compressing JAR files significantly. The tool to decompress these obfuscated files can be found in the original Java development kit. However, not all security products can fully support these formats, making detection possible to be missed. Another example is the technique used by FlashPack and Magnitude exploit kits for Flash player exploits. This involves a commercially available tool called DoSWF to hide their files. This tool allowed developers to hide the ActionScript contents of their Flash file from people who would copy or pirate the contents. Unfortunately, it can also work against the detection of a security software. Aside from landing page and exploit file obfuscation, most exploit kits now have the ability to obfuscate their payload/ malware. It means the payload can be transferred to a stream on the Internet with encryption. Therefore, the exploit kit can deliver its payload/malware in the victim s machine without being detected since it 6 Page 2015 Trend Micro Incorporated
10 EVOLUTION OF EXPLOIT KITS Research Paper doesn t look like an executable file through network traffic. There is no MZ magic code inside the surface of network traffic payload and it is also not an official PE file format. The exploit kit will decrypt the payload in memory by shellcode only after it was downloaded into the victim s machine. Payload encryption and decryption Figure 6 shows both the appearance of the payload in network traffic and the payload after decryption. The encryption can simply prevent the detection of most signature-based IDS/IPS system. After decrypting, some exploit kits will still drop the payload to the disk. However, Angler and Hanjuan exploit kits don t write their payload in the disk but can directly run in the memory to prevent anti-virus scan on a file system. The technique is now commonly referred to as fileless infection. The 7 Page 2015 Trend Micro Incorporated
11 table below shows which exploit kits use payload encryption and fileless infection. Payload Evasion Summary Payload (PE) Encryption Fileless Infection FlashPack Rig Magnitude Nuclear Fiesta Angler SweetOrange GongDa Styx HanJuan EXPLOIT KITS IN 2015 An exploit kit is now one of the most popular types of Web attack toolkits in underground markets and we can expect more activities related to this in Barely two months into the year and we already saw two Adobe Flash Player zero-day vulnerabilities (CVE and CVE ) in the wild delivered via exploit kit. [14 15] It s not rare for exploit kits to include zero-day exploits, and we think that this is a trend that we will see more of in The inclusion of zero-day exploits in exploit kits will make for a much more dangerous threat because this will automate the delivery and will have the ability to affect a bigger set of users in a shorter amount of time. SOLUTIONS FOR EXPLOIT KITS Exploit kits pose a multicomponent threat that requires a multicomponent solution. Users will need to utilize security strategies that provide protection from all threat components: Behavior-based solutions traces routines found in exploits and block them proactively can serve as the primary defense against exploit kits, especially those that include zero-day exploits in their arsenal. An example of this is the Sandbox with Script Analyzer engine, which is part of Trend Micro Deep Discovery. Web-based detection, through a Web-based solution like the Browser Exploit Prevention feature in our endpoint products such as Trend Micro Security, Trend Micro OfficeScan, and Trend Micro Worry-Free Business Security, blocks the exploit once the user accesses the URL it is hosted in. A Web reputation service can also add another layer of security to make sure that the redirection chains are blocked even before the malicious payload is downloaded into the system. File-based detection ensures that any payload successfully downloaded into the system will not be able to execute its routines. 8 Page 2015 Trend Micro Incorporated
12 APPENDIX Identified Exploit Kit List Year Old Exploit Kits New Exploit Kits 2006 MPack WebAttacker Kit 2007 MPack Armitage Exploit Pack IcePack Exploit Kit NeoSploit Exploit Kit 1.0 Phoenix Exploit Kit Tornado Exploit Kit 2008 IcePack Exploit Kit NeoSploit Exploit Kit 2.0/3.0 Phoenix Exploit Kit Tornado Exploit Kit 2009 Phoenix Exploit Kit 2.0 Tornado Exploit Kit 2010 CrimePack 2.0/3.0 Eleonore Exploit Kit Phoenix Exploit Kit 2.0 Siberia Pack Yes Exploit Kit Blackhole Exploit Kit 1.1/1.2 Bleeding Life Exploit Kit 3.0 Eleonore Exploit Kit NeoSploit Exploit Kit 4.0 Nuclear Exploit Kit 1.0 Phoenix Exploit Kit 2.0 SEO Sploit Pack Siberia Pack AdPack Fiesta Exploit Kit FirePack Exploit Kit CrimePack 1.0 Eleonore Exploit Kit Fragus Exploit Kit Just Exploit Kit Liberty Exploit Kit Lucky Sploit MyPoly Sploit Neon Exploit System SPack Siberia Exploit Pack Unique Sploits Exploit Pack Yes Exploit Kit 1.0/2.0 Blackhole Exploit Kit 1.0 Bleeding Life Exploit Kit 1.0/2.0 Dragon Pack Nuclear Exploit Kit 1.0 Papka Exploit Pack SEO Sploit Pack Best Pack G01Pack Exploit Kit Katrin Exploit Pack OpenSource Exploit Kit Sava Exploit Kit
13 Identified Exploit Kit List Year Old Exploit Kits New Exploit Kits 2012 Blackhole Exploit Kit 2.0 G01Pack Exploit Kit Hierarachy/Eleonore Exploit Kit NeoSploit Exploit Kit 4.0 Nuclear Exploit Kit 2.0 Phoenix Exploit Kit Blackhole Exploit Kit 2.0 CK Exploit Kit CrimeBoss Exploit Kit Fiesta/NeoSploit Exploit Kit FlackPack Exploit Kit G01Pack Exploit Kit GrandSoft Nuclear Exploit Kit 3.0 Phoenix Exploit Kit 3.0 RedKit/Goon Exploit Kit Sakura Exploit Kit Sibhost/Glazunov Exploit Kit Styx Exploit Kit SweetOrange Exploit Kit 2014 Angler Exploit Kit DotkaChef Exploit Kit Fiesta/NeoSploit Exploit Kit FlackPack Exploit Kit GongDa Exploit Kit Hello/LightsOut Exploit Kit RedKit/Infinity Exploit Kit Magnitude Exploit Kit Neutrino Exploit Kit Nuclear Exploit Kit 3.0 Styx Exploit Kit SweetOrange Exploit Kit Zuponcic Exploit Kit Alpha Pack CK Exploit Kit Cool Exploit Kit CrimeBoss Exploit Kit CritXPack GrandSoft Exploit Kit Impact Exploit Kit KaiXin Exploit Pack Kein Exploit Pack NucSoft Exploit Pack ProPack RedKit Exploit Kit Sakura Exploit Kit Serenity Exploit Pack Sibhost/Glazunov Exploit Kit Styx Exploit Kit 2.0 SweetOrange Exploit Kit Techno XPack Yang Pack ZhiZhu Exploit Kit Angler Exploit Kit Anonymous Exploit Kit DotkaChef Exploit Kit GongDa Exploit Kit Hello/LightsOut Exploit Kit HiMan Exploit Kit Magnitude/PopAds Exploit Kit Neutrino Exploit Kit Private Exploit Pack Red Dot Exploit Kit Safe Pack White Lotus Exploit Kit WhiteHole Exploit Kit Zuponcic Exploit Kit CottonCastle/Niteris Exploit Kit Rig Exploit Kit HanJuan Exploit Kit
14 REFERENCES [1] Trend Micro Incorporated. (September 20, 2006). TrendLabs Security Intelligence Blog. IE Zero Day + Web Attacker Kit. Last accessed February 24, 2015, [2] Jon Oliver, Sandra Cheng, Lala Manly, Joey Zhu, Roland Dela Paz, Sabrina Sioting, and Jonathan Leopando. (2012). Trend Micro. Blackhole Exploit Kit: A Spam Campaign, Not a Series of Individual Spam Runs. Last accessed February 24, 2015, com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_ blackhole-exploit-kit.pdf. [3] Brooks Li. (October 4, 2011). TrendLabs Security Intelligence Blog. Facebook Malvertisement Leads to Exploits. Last accessed February 24, 2015, facebook-malvertisement-leads-to-exploits/. [4] Joseph C. Chen. (October 14, 2014). TrendLabs Security Intelligence Blog. YouTube Ads Lead to Exploit Kits, Hit US Victims. Last accessed February 24, 2015, Last accessed February 24, 2015, blog.trendmicro.com/trendlabs-security-intelligence/youtube-ads-leadto-exploit-kits-hit-us-victims/. [5] Maxim Goncharov. (October 2011). Trend Micro. Traffic Direction Systems as Malware Distribution Tools. Last accessed February 24, 2015, [6] Joseph C. Chen. (August 21, 2014). TrendLabs Security Intelligence Blog. Website Add-on Targets Japanese Users, Leads to Exploit Kit. Last accessed February 24, 2015, trendlabs-security-intelligence/website-add-on-targets-japanese-usersleads-to-exploit-kit/. [7] Jay Yaneza. (November 17, 2014). TrendLabs Security Intelligence Blog. Flashpack Exploit Kit Used in Free Ads, Leads to Malware Delivery Mechanism. Last accessed February 24, 2015, trendmicro.com/trendlabs-security-intelligence/flashpack-exploit-kitused-in-free-ads-leads-to-malware-delivery-mechanism/. [8] Carolyn Guevarra. (June 18, 2007). TrendLabs Security Intelligence Blog. Another Malware Pulls an Italian Job. Last accessed February 24, 2015, another-malware-pulls-an-italian-job/. [9] Jovi Umawing. (April 2, 2008). TrendLabs Security Intelligence Blog. Old, Known Bugs Exploited by Neosploit. Last accessed February 24, 2015, old-known-bugs-exploited-by-neosploit/. [10] Michael Du. (November 24, 2014). TrendLabs Security Intelligence Blog. Obfuscated Flash Files Make Their Mark in Exploit Kits. Last accessed February 24, 2015,
15 [11] Yuki Chen. (November 25, 2013). TrendLabs Security Intelligence Blog. A Look at a Silverlight Exploit. Last accessed February 24, 2015, [12] Brooks Li. (September 23, 2014). TrendLabs Security Intelligence Blog. Nuclear Exploit Kit Evolves, Includes Silverlight Exploit. Last accessed February 24, 2015, [13] Jack Tang. (July 1, 2014). TrendLabs Security Intelligence Blog. Isolated Heap for Internet Explorer Helps Mitigate UAF Exploits. Last accessed February 24, 2015, [14] Weimin Wu. (January 22, 2015). TrendLabs Security Intelligence Blog. Flash Greets 2015 with New Zero-day. Last accessed February 24, 2015, [15] Peter Pi. (February 2, 2015). TrendLabs Security Intelligence Blog. Trend Micro Discovers New Adobe Flash Zero-day Exploit Used in Malvertisements. Last accessed February 24, 2015, trendmicro.com/trendlabs-security-intelligence/trend-micro-discoversnew-adobe-flash-zero-day-exploit-used-in-malvertisements/.
16 Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses and governments provide layered content security to protect information on mobile devices, endpoints, gateways, servers and the cloud. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro Smart Protection Network, and are supported by over 1,200 threat experts around the globe. For more information, visit by Trend Micro, Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. 225 E. John Carpenter Freeway Suite 1500 Irving, Texas U.S.A. Phone:
When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher
TrendLabs When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher Advanced persistent threats (APTs) refer to a category
Web. Paul Pajares and Max Goncharov. Connection. Edition. ios platform are also at risk, as. numbers via browser-based social.
RESEARCHBRIEF Fake Apps, Russia, and the Mobile Making the SMSS Fraud Connection Paul Pajares and Max Goncharov Web News of an SMS fraud service affecting many countries first broke out in Russia in 2010.
Email Correlation and Phishing
A Trend Micro Research Paper Email Correlation and Phishing How Big Data Analytics Identifies Malicious Messages RungChi Chen Contents Introduction... 3 Phishing in 2013... 3 The State of Email Authentication...
N J C C I C NJ CYBERSECURITY AND COMMUNICATIONS INTEGRATION CELL
4 N J C C I C NJ CYBERSECURITY AND COMMUNICATIONS INTEGRATION CELL Exploit Kits: A Prevailing Vector for Malware Distribution August 5, 2015 Since first appearing around 2006, exploit kits (EK) have evolved
43% Figure 1: Targeted Attack Campaign Diagram
TrendLabs Data exfiltration is the final stage of a targeted attack campaign where threat actors steal valuable corporate information while remaining undetected. 1 43% of most serious threats to the company
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY EXPLOIT KITS UP 75 PERCENT The Infoblox DNS Threat Index, powered by IID, stood at 122 in the third quarter of 2015, with exploit kits up 75 percent
Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?
A Cloud Security Primer : WHAT ARE YOU OVERLOOKING? LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and should not be construed
Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.
TrendLabs Everyone s online, but not everyone s secure. It s up to you to make sure that your family is. We live out our digital lives on the Internet. There, communication is quicker and easier, and our
Blackhole Exploit Kit: A Spam Campaign, Not a Series of Individual Spam Runs AN IN-DEPTH ANALYSIS
Trend Micro Incorporated Research Paper 2012 Blackhole Exploit Kit: A Spam Campaign, Not a Series of Individual Spam Runs AN IN-DEPTH ANALYSIS By: Jon Oliver, Sandra Cheng, Lala Manly, Joey Zhu, Roland
A number of factors contribute to the diminished regard for security:
TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand
How Do Threat Actors Move Deeper Into Your Network?
SECURITY IN CONTEXT LATERAL MOVEMENT: How Do Threat Actors Move Deeper Into Your Network? LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is
THREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
As threat actors target various types of networks, companies with improperly configured network infrastructures risk the following repercussions:
TrendLabs Targeted attacks often employ tools and routines that can bypass traditional security and allow threat actors to move deeper into the enterprise network. Threat actors do this to access data
HACKER INTELLIGENCE INITIATIVE. The Secret Behind CryptoWall s Success
HACKER INTELLIGENCE INITIATIVE The Secret Behind 1 1. Introduction The Imperva Application Defense Center (ADC) is a premier research organization for security analysis, vulnerability discovery, and compliance
Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities?
ANALYST BRIEF Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? Author Randy Abrams Tested Products Avast Internet Security 7 AVG Internet Security 2012 Avira Internet Security
DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?
A Special Primer on APTs DETECTING THE ENEMY INSIDE THE NETWORK How Tough Is It to Deal with APTs? What are APTs or targeted attacks? Human weaknesses include the susceptibility of employees to social
This document has been provided by the International Center for Not-for-Profit Law (ICNL).
This document has been provided by the International Center for Not-for-Profit Law (ICNL). ICNL is the leading source for information on the legal environment for civil society and public participation.
The Dark Side of Trusting Web Searches From Blackhat SEO to System Infection
The Dark Side of Trusting Web Searches From Blackhat SEO to System Infection Trend Micro, Incorporated Marco Dela Vega and Norman Ingal Threat Response Engineers A Trend Micro Research Paper I November
2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security
2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security For 10 years, Microsoft has been studying and analyzing the threat landscape of exploits, vulnerabilities, and malware.
MRG Effitas Real World Enterprise Security Exploit Prevention March 2015. Real World Enterprise Security Exploit Prevention Test.
Real World Enterprise Security Exploit Prevention Test March 2015 1 1 Executive summary...3 2 Certifications...6 3 Test methodology...7 3.1 Source of exploits...9 3.2 False positive test... 10 3.3 0-day
MRG Effitas Real World Enterprise Security Exploit Prevention March 2015. Real World Enterprise Security Exploit Prevention Test.
Real World Enterprise Security Exploit Prevention Test March 2015 1 1 Executive summary... 3 2 Certifications... 6 3 Test methodology... 7 3.1 Source of exploits... 9 3.2 False positive test... 10 3.3
FastPOS: Quick and Easy Credit Card Theft
A TrendLabs Report FastPOS: Quick and Easy Credit Card Theft TrendLabs Security Intelligence Blog Trend Micro Cyber Safety Solutions Team June 2016 Contents Introduction...1 Installation...1 Information
DIGITAL LIFE E-GUIDE. Keeping Your Cloud Data in Check
A DIGITAL LIFE E-GUIDE Keeping Your Cloud Data in Check Creating passwords, installing security software, practicing safe surfing habits these typical security measures are not enough to protect your
RIA SECURITY TECHNOLOGY
RIA SECURITY TECHNOLOGY Ulysses Wang Security Researcher, Websense Hermes Li Security Researcher, Websense 2009 Websense, Inc. All rights reserved. Agenda RIA Introduction Flash Security Attack Vectors
Anti-exploit tools: The next wave of enterprise security
Anti-exploit tools: The next wave of enterprise security Intro From malware and ransomware to increasingly common state-sponsored attacks, organizations across industries are struggling to stay ahead of
2015 TRUSTWAVE GLOBAL SECURITY REPORT
2015 TRUSTWAVE GLOBAL SECURITY REPORT Rahul Samant Trustwave Australia WHY DO CYBERCRIMINALS DO WHAT THEY DO? 1,425% Return on Investment (ROI) Estimated ROI for a one-month ransomware campaign Based on
Streamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
Devising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud
Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor
Why Device Fingerprinting Provides Better Network Security than IP Blocking How to transform the economics of hacking in your favor Why Device Fingerprinting Provides Better Network Security than IP Blocking
Devising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.
Invincea Advanced Endpoint Protection
SOLUTION OVERVIEW Invincea Advanced Endpoint Protection A next-generation endpoint security solution to defend against advanced threats combining breach prevention, detection, and response The battle to
Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth
Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference
FSOEP Web Banking & Fraud: Corporate Treasury Attacks
FSOEP Web Banking & Fraud: Corporate Treasury Attacks Your Presenters Who Are We? Tim Wainwright Managing Director Chris Salerno Senior Consultant Led 200+ penetration tests Mobile security specialist
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
IBM Advanced Threat Protection Solution
IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain
Latest Business Email Compromise Malware Found: Olympic Vision
A TrendLabs Report Latest Business Email Compromise Malware Found: Olympic Vision Technical Brief TrendLabs Security Intelligence Blog Jaaziel Carlos Junestherry Salvador March 2016 Introduction Olympic
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
YOUR DATA UNDER SIEGE: GUARD THE GAPS WITH PATCH MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next
YOUR DATA UNDER SIEGE: GUARD THE GAPS WITH PATCH MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next Your Data Under Siege: Guard the Gaps with Patch Management 1.0
CORPORATE AV / EPP COMPARATIVE ANALYSIS
CORPORATE AV / EPP COMPARATIVE ANALYSIS Exploit Evasion Defenses 2013 Randy Abrams, Dipti Ghimire, Joshua Smith Tested Vendors AVG, ESET, F- Secure, Kaspersky, McAfee, Microsoft, Norman, Panda, Sophos,
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT TESTED PRODUCTS: AVG Internet Security Network Edition v8.0 Kaspersky Total Space Security v6.0 McAfee Total Protection for Endpoint Sophos
WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
GFI White Paper. How Web Reputation increases your online protection
GFI White Paper How Web Reputation increases your online protection Contents Introduction to Web Reputation 3 Why use Web Reputation? 3 The value of using Web Reputation and antivirus software 3 The value
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
Unified Security, ATP and more
SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users
Practical Threat Intelligence. with Bromium LAVA
Practical Threat Intelligence with Bromium LAVA Practical Threat Intelligence Executive Summary Threat intelligence today is costly and time consuming and does not always result in a reduction of successful
Trend Micro Incorporated Research Paper 2012. Adding Android and Mac OS X Malware to the APT Toolbox
Trend Micro Incorporated Research Paper 2012 Adding Android and Mac OS X Malware to the APT Toolbox Contents Abstract... 1 Introduction... 1 Technical Analysis... 2 Remote Access Trojan Functionality...
White Paper. No Signature Required: The Power of Emulation in Preventing Malware
No Signature Required: The Power of Emulation in Preventing Malware Table of Contents Emerging Threats Require a New Approach to Protection....3 Real-Time Behavior Emulation of Web Content...3 Use Case
Advanced Persistent Threats
White Paper INTRODUCTION Although most business leaders and IT managers believe their security technologies adequately defend against low-level threats, instances of (APTs) have increased. APTs, which
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Connected Threat Defense Strategy. Eva Chen, Co-Founder and CEO
Connected Threat Defense Strategy Eva Chen, Co-Founder and CEO Japanese Pension Service Over a Million of Personal Data Leaked by APT IT Pro, June 1, 2015 Tokyo Government Office 9 PCs infected by watering
Top five strategies for combating modern threats Is anti-virus dead?
Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.
You ll learn about our roadmap across the Symantec email and gateway security offerings.
#SymVisionEmea In this session you will hear how Symantec continues to focus our comprehensive security expertise, global intelligence and portfolio on giving organizations proactive, targeted attack protection
OVERVIEW. Enterprise Security Solutions
Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s
Network Detection Evasion Methods
A Trend Micro Research Paper Network Detection Evasion Methods Blending with Legitimate Traffic Jessa Dela Torre and Sabrina Sioting Contents Introduction...3 Known Threats That Use Advanced Evasion Techniques...3
GFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is"
Types of cyber-attacks. And how to prevent them
Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual
Threat Spotlight: Angler Lurking in the Domain Shadows
White Paper Threat Spotlight: Angler Lurking in the Domain Shadows Over the last several months Talos researchers have been monitoring a massive exploit kit campaign that is utilizing hijacked registrant
Defending Against. Phishing Attacks
Defending Against Today s Targeted Phishing Attacks DeFending Against today s targeted phishing attacks 2 Introduction Is this email a phish or is it legitimate? That s the question that employees and
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
EyjafjallajöKull Framework (aka: Exploit Kits Krawler Framework)
EyjafjallajöKull Framework (aka: Exploit Kits Krawler Framework) Seeking Exploit Kits at Large Scale Made Easy By Sébastien Larinier / @Sebdraven & Guillaume Arcas / @y0m This Slide Intentionally Left
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
Exploring the Black Hole Exploit Kit
Exploring the Black Hole Exploit Kit Updated December 20, 2011 Internet Identity Threat Intelligence Department http://www.internetidentity.com http://www.internetidentity.com 12/29/11 Page 1/20 Summary
The evolution of virtual endpoint security. Comparing vsentry with traditional endpoint virtualization security solutions
The evolution of virtual endpoint security Comparing vsentry with traditional endpoint virtualization security solutions Executive Summary First generation endpoint virtualization based security solutions
The Mobile Cybercriminal Underground Market in China
A Trend Micro Research Paper Cybercriminal Underground Economy Series The Mobile Cybercriminal Underground Market in China Lion Gu Forward-Looking Threat Research Team Contents Cybercriminal Underground
Netsweeper Whitepaper
Netsweeper Inc. Corporate Headquarters 104 Dawson Road Suite 100 Guelph, ON, Canada N1H 1A7 CANADA T: +1 (519) 826-5222 F: +1 (519) 826-5228 Netsweeper Whitepaper The Evolution of Web Security June 2010
Addressing Big Data Security Challenges: The Right Tools for Smart Protection
Addressing Big Data Security Challenges: The Right Tools for Smart Protection Trend Micro, Incorporated A Trend Micro White Paper September 2012 EXECUTIVE SUMMARY Managing big data and navigating today
Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond
Trend Micro Cloud App Security for Office 365 October 27, 2015 Trevor Richmond Too many malware incidents >90% Targeted Attacks Start with Email Attackers: Target specific companies or individuals Research
How To Protect Yourself From A Web Attack
Five Stages of a Web Malware Attack A guide to web attacks plus technology, tools and tactics for effective protection By Chris McCormack, Senior Product Marketing Manager Today s web attacks are extremely
Spear Phishing Attacks Why They are Successful and How to Stop Them
White Paper Spear Phishing Attacks Why They are Successful and How to Stop Them Combating the Attack of Choice for Cybercriminals White Paper Contents Executive Summary 3 Introduction: The Rise of Spear
The Fundamental Failures of End-Point Security. Stefan Frei Research Analyst Director [email protected]
The Fundamental Failures of End-Point Security Stefan Frei Research Analyst Director [email protected] Agenda The Changing Threat Environment Malware Tools & Services Why Cybercriminals Need No 0-Days
SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal
WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!
I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by
SPEAR PHISHING AN ENTRY POINT FOR APTS
SPEAR PHISHING AN ENTRY POINT FOR APTS threattracksecurity.com 2015 ThreatTrack, Inc. All rights reserved worldwide. INTRODUCTION A number of industry and vendor studies support the fact that spear phishing
