Symantec Intelligence Quarterly - EMEA April - June 2010

Size: px
Start display at page:

Download "Symantec Intelligence Quarterly - EMEA April - June 2010"

Transcription

1 Symantec Intelligence Quarterly - EMEA

2

3 Quarterly Report: Symantec Intelligence Quarterly - EMEA Symantec Intelligence Quarterly - EMEA Contents Introduction Highlights Metrics Overview: The Microsoft Help and Support Center Zero-day Vulnerability Overview: The Adobe Flash Zero-day Vulnerability Overview: The Month of PHP Security Credits

4 Introduction Symantec has established some of the most comprehensive sources of Internet threat data in the world with the Symantec Global Intelligence Network. More than 240,000 sensors in over 200 countries and territories monitor attack activity through a combination of Symantec products and services such as Symantec DeepSight Threat Management System, Symantec Managed Security Services, Norton consumer products, and third-party data sources. Symantec also gathers malicious code intelligence from more than 133 million client, server, and gateway systems that have deployed its antivirus products. Additionally, the Symantec distributed honeypot network collects data from around the globe, capturing previously unseen threats and attacks and providing valuable insight into attack methods. Spam and phishing data is captured through a variety of sources including: the Symantec probe network, a system of more than 5 million decoy accounts; MessageLabs Intelligence, a respected source of data and analysis for messaging security issues, trends and statistics; and, other Symantec technologies. Over 8 billion messages (as well as over 1 billion Web requests) are processed each day across 16 data centers. Symantec also gathers phishing information through an extensive antifraud community of enterprises, security vendors, and over 50 million consumers. These resources give Symantec security analysts unparalleled sources of data with which to identify, analyze, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. This regional report will discuss notable aspects of malicious activity that Symantec has observed in Europe, the Middle East, and Africa (EMEA) in the second quarter of 2010 (April to June). An important note about these statistics The Symantec Global Intelligence Network uses automated systems to map the IP addresses of the attacking systems to identify the country in which they are located. However, because attackers frequently use compromised systems situated around the world to launch attacks remotely, the location of the attacking systems may differ from the location of the attacker. Highlights In EMEA, Germany was the top country for malicious activity during this quarter, accounting for 13 percent of the global total; In EMEA, the top Web-based attack for the quarter was related to malicious PDF activity, which accounted for 42 percent of the total; Globally, credit card information was the most commonly advertised item for sale on underground economy servers known to Symantec in this quarter, accounting for 28 percent of all goods and services; Symantec created 457,641 new malicious code signatures during this quarter from all worldwide sources of data; In EMEA, the most common malicious code sample by potential infections during this quarter was the Sality.AE virus; Globally, Symantec observed 12.7 trillion spam messages during this quarter, accounting for approximately 89 percent of all messages observed; 1

5 Globally, the majority of brands used in phishing attacks this quarter were in the financial sector, which accounted for 73 percent. Metrics Malicious activity by country This metric will assess the countries in which the highest amount of malicious activity took place or originated in EMEA during this quarter. Rankings are determined by calculating the average of the proportion of malicious activity that originated in each country. Germany was the top ranked country in EMEA for malicious activity this quarter, accounting for 13 percent of the total (table 1). Within specific category measurements, Germany ranked first in phishing website hosts, and bots. Table 1. Malicious activity by country, EMEA The United Kingdom had the second highest amount of malicious activity in EMEA this quarter, accounting for 9 percent of the total. Within specific category measurements, the United Kingdom ranked first in attack origin. Top Web-based attacks This metric will assess the top distinct Web-based attacks that originate either from compromised legitimate sites or malicious sites that have been created to intentionally target Web users. In this quarter, the top Web-based attack was related to malicious PDF activity, which accounted for 42 percent of Webbased attacks (table 2). Attempts to download suspicious PDF documents were specifically observed. This may indicate attempts by attackers to distribute malicious PDF content to victims via the Web. The attack is not directly related to a specific vulnerability, although the contents of the malicious file would be designed to exploit an arbitrary vulnerability in an application that processes it. This attack may be popular due to the common use and distribution of PDF documents on the Web and the practice of configuring browsers to automatically render PDF documents by default. 2

6 Table 2. Top Web-based attacks, EMEA The second most common Web-based attack this quarter was associated with the Microsoft Internet Explorer ADODB.Stream Object File Installation Weakness, 1 which accounted for 33 percent of the total globally. The weakness allows attackers to install malicious files on vulnerable computers when users visit websites hosting an exploit. To carry out this attack, an attacker must exploit another vulnerability that bypasses Internet Explorer security settings, allowing the attacker to execute malicious files installed by the initial security weakness. This issue was published on August 23, 2003, and fixes have been available since July 2, The continued popularity of this Web-based attack may indicate that many computers running Internet Explorer have not been patched or updated and are running with this exposed weakness. Underground economy servers goods and services available ailable for sale This section discusses the most frequently advertised items for sale observed globally by Symantec on underground economy servers, which are online black market forums for the promotion and trade of stolen information and services. In this quarter, the most frequently advertised item observed on underground economy servers globally was credit card information, accounting for 28 percent of all goods (table 3). Prices for credit card information ranged from $1 to $30 depending on the type of card, the country of origin, and the amount of bundled personal information used for card holder verification. 2 Symantec observed bulk purchase offers of 1,000 credit cards for $1, All currency in U.S. dollars 3

7 Symantec Intelligence Quarterly - EMEA Table 3. Goods and services available for sale on underground economy servers, globally The second most commonly advertised good on underground economy servers globally during this quarter was bank accounts, which accounted for 24 percent of all advertised goods. The advertised price for bank accounts ranged from $10 to $125 and bank balances ranged from $373 to $1.5 million. Top malicious code samples The most common malicious code sample by potential infections in EMEA during this quarter was the Sality.AE virus (table 4).3 This virus infects executable files on compromised computers and removes security applications and services. Once the virus is installed, it also attempts to download and install additional threats onto infected computers. Table 4. Top malicious code samples, EMEA The second ranked malicious code sample causing potential infections in EMEA during this quarter was Mabezat.B.4 This worm propagates by copying itself to any mapped or remote drives. It also attempts to copy itself to network shares by attempting to connect with weak passwords. The worm attempts to propagate through , modifies the built-in

8 Microsoft Windows CD burning feature to include the worm in burned CDs, and also encrypts numerous different file types. Top phishing sectors The majority of brands used in phishing attacks worldwide this quarter were in the financial services sector (table 5). These attacks accounted for 73 percent of the total reported phishing attacks observed globally by Symantec. The financial sector is commonly the largest sector targeted in phishing attacks because the various associated services are the most likely to yield data that could be directly used for financial gain. Many phishing attacks that spoof financial services brands will prompt users to enter credit card information or banking credentials into fraudulent sites. If these tactics are successful, the phishers can then capture and sell such information in the underground economy. Table 5. Top phishing sectors The second largest percentage of brands used in phishing attacks observed globally was in the ISP sector, accounting for 10 percent of the total number of phishing attacks reported this quarter. ISP accounts can be valuable to phishers because they may contain accounts, Web-hosting space, and authentication credentials. Overview: The Microsoft Help and Support Center Zero-day Vulnerability On June 9, 2010, a third-party researcher reported a zero-day vulnerability affecting the Help and Support Center application in Windows Server 2003 and Windows XP. Help and Support Center is the default application used for handling access to online Microsoft Windows documentation. Documentation can be accessed directly through other applications such as Web browsers by using Help and Support Center protocol (HCP) URIs. When the application receives an HCP request, the requested file is verified using a whitelist to restrict untrusted sites from accessing unauthorised data. The reported vulnerability occurs because of a flaw in the way that the application handles errors while checking the whitelist. By adding specially crafted data to an HCP URI, the flaw can be manipulated to bypass restrictions that are defined by the whitelist. This can result in unauthorised access to restricted help documents. The report included a proofof-concept URI to demonstrate exploitation of the vulnerability. Limited, targeted attacks using the proof-of-concept code were confirmed in the wild by June 15. 5

9 An attacker can exploit this issue by enticing a victim to follow a malicious URI. A successful attack would grant the attacker unauthorised access to restricted help documents on the victim s computer. The attack could be combined with exploits of other vulnerabilities such as the Microsoft Help and Support Center sysinfo/sysinformation.htm cross-site scripting weakness to execute malicious code on the target computer. An attacker who successfully exploits this issue can gain control of target computers and carry out additional malicious activities, such as stealing confidential information or using the victimised computers to send spam . On June 10, Microsoft released a security advisory to acknowledge its awareness of the report and that it was investigating the issue. Microsoft is currently developing a security update to address the vulnerability; in the interim, an automated workaround solution is available immediately to mitigate the vulnerability by unregistering HCP. Overview: The Adobe Flash Zero-day Vulnerability On June 4, 2010, Adobe issued a security bulletin indicating that they had received reports of the exploitation of an unpatched, previously unknown zero-day vulnerability affecting its Flash Player application. 5 As security researchers scrambled to identify the problem, knowledge of the bug spread to more attackers, slowly exacerbating the situation. With limited mitigations available, security vendors were under pressure to release detections and mitigation procedures, and for the vendor to create, test, and distribute an out-of-band patch. Timeline June 4, 2010 Adobe receives information that an unknown, unpatched issue exists in Flash Player; 6 June 4, 2010 Symantec issues BID 40586; 7 June 4, 2010 Adobe issues security advisory APSA10-01; 8 June 7, 2010 Adobe indicates that its quarterly security update regularly scheduled for July 13 would be pushed up, to June 29 for Adobe Reader and to July 10 for Flash Player; 9 June 10, 2010 The Metasploit Project publishes a reliable public exploit; 10 June 10, 2010 Adobe provides an update for Flash Player; Reader is still vulnerable; 11 June 14, 2010 Symantec analysts identify link between this vulnerability and IEPeers targeted attacks, and possibly other targeted attacks, from as far back as 2008; 12 June 29, 2010 Adobe issues an update for Reader. 13 Vulnerability The bug is a class of vulnerability referred to as an invalid or dangling pointer. 14 Discovering these bugs using binary static analysis is difficult, but not impossible. 15 The Flash file used in this attack came from a public source and it is highly the exploitation details of which can be found on the Symantec Security Response blog at 15-Static analysis is a technique for software verification that relies on analyzing the application without executing it. 6

10 unlikely that the file was originally intended to be malicious. 16 However, a specific, single-byte modification to the file results in an easily exploitable condition. There is a high possibility that this bug was found using a fuzzer tool. 17 Vulnerabilities in Flash are valuable to attackers. Flash is prolific and there are versions for virtually every browser on all major operating systems. The wide distribution of Flash, combined with the number of affected operating systems, make it an appealing target for attackers. The return on investment for this vulnerability is very high, especially if it was discovered using a fuzzer, because this often requires less time investment on the attacker s part. An exploitable weakness in Reader is also highly attractive to attackers because Reader is widely used for rendering PDF files and PDFs can contain embedded content. For example, Reader can render an embedded Flash file inside a PDF. Unlike JavaScript, there is currently no easy way to disable Flash from the user interface in Reader, which means the process of mitigating a Flash vulnerability in Reader is difficult for less technical users. Attacks Upon initial disclosure of the vulnerability, Symantec identified two cases in the wild that exploited Web and PDF documents, respectively. While these attacks exploited the same vulnerability, they did so in different products, with each having a separate, specific goal. Both attacks appeared to use the same malicious Flash file, with only slight variation (the Flash file had to be tweaked slightly to be used either in a PDF or in a Web browser). Although they appeared to use the same Flash file, each attack delivered a unique piece of malicious code, using radically different pieces of shellcode. 18 PDF-based attack While a good file format exploit 19 will replace a malicious document with a benign one, post-exploitation, this particular PDF attack made no such attempt. This could be a sign that the attacker was either not very sophisticated or was not concerned about the vulnerability being discovered and fixed. An unpatched vulnerability is a commodity for an attacker. There is a correlation between the number of people that know about an unpatched vulnerability and the value that it has. For example, an unpatched vulnerability that is exploitable and known by only a select few people has high value, while conversely, a vulnerability that is known by many and readily patched has low value. Often, once a bug is publicly known and more attackers gain access to it, there will be a surge of attacks that attempt to exploit any remaining unpatched systems. These attacks often lack the finesse of the original, with less regard for protecting the vulnerability because it is already well known (at least to more knowledgeable users). The shellcode in this attack made use of return oriented programming (ROP) techniques to disable Data Execution Prevention (DEP) on Windows XP systems, indicating some technical prowess. The malicious PDF was delivered to victims as an attachment, while the message was crafted to lure the victim into opening the attached malicious PDF. The malicious code installed by the PDF attack was unremarkable. It provided a rudimentary backdoor to attackers, but did not include direct functionality to harvest credentials or obtain sensitive information in an automated fashion. Web-based attack The Web-based attack was tailored toward users of Microsoft Internet Explorer. While the bug could be used against any browser that supports Flash, due to the nature of the vulnerability, making it work on different browsers required Fuzzers test an application for buffer overflows, format string vulnerabilities, and other errors that can subsequently be exploited; see 18-A shellcode is an assembly language program that executes a shell; shellcode can be used as an exploit payload 19-A file format exploit is a software exploit that makes use of a maliciously crafted file format used by the affected application 7

11 additional modifications. The way the Web-based attack was written implied a greater desire to protect the vulnerability. Whoever developed the shellcode implemented a number of checks to ensure that the application terminated quickly and without generating a crash report to leave few traces about the nature of the bug. Interestingly, high-quality exploits are usually those that attempt to continue execution of the application uninterrupted. An application that terminates immediately after loading a new file usually indicates that there is something amiss. Additionally, unlike the PDF-based attack, the shellcode did not attempt to disable DEP. The IEPeers-targeted attack link The shellcode used in the Web-based attack is eerily familiar to that used in the targeted attacks against the Microsoft Internet Explorer iepeers.dll Remote Code Execution Vulnerability, 20 which occurred in March 2010, and which targeted attacks against the Microsoft Internet Explorer XML Handling Remote Code Execution Vulnerability. 21 The only major differences in this shellcode appeared to be reliability enhancements. Attackers sharing and reusing shellcode is common and often not a definitive sign of the same exploit author; however, there are some convincing similarities in the malicious code used in the two attacks. For example, once a computer is compromised, the malicious code injects a DLL file named wshipm.dll into applications such as Internet Explorer, Firefox, and Outlook. Comparing this file at the binary level with the DLL that is used in the IEPeers targeted attack shows a number of distinct similarities in the source code. This lends credibility to the possibility that the malicious code in this attack is a derivative of the same malicious code used in the IEPeers targeted attacks. Whoever wrote the code for this attack definitely had access to the source code for portions of the malicious code used in the IEPeers targeted attack. As with the IEPeers attack, sensitive information can be harvested from the exploited applications and sent to the attacker in a remote location. Conclusion While these attacks exploited the same vulnerability, they did so in different ways with different agendas. The Web-based attack appears to be more tailored to obtaining sensitive information, while the PDF-based attack simply provided limited backdoor functionality, possibly for building a bot network or for the later distribution of additional malicious code. The Web-based attack appears to have been much more targeted and is far more sophisticated in both its attempts to hide the vulnerability and its post-exploitation activity. Overview: The Month of PHP Security The disclosure of security vulnerabilities in software has historically been a contentious topic between security researchers and software vendors. Vendors often do not want to publicly discuss security problems in their products on the chance that doing so will harm sales, make customers unhappy, and give hackers a vector to target with an exploit. Security researchers, even those who practice responsible disclosure, often feel frustration that vendors reveal few of the details about vulnerabilities, or hold the perception that some vendors do not take security seriously. In 2006, the first Month of Bugs project was launched as a way to increase awareness of security vulnerabilities in Web browsers. 22 The Month of Browser Bugs was a series of exploits published every day for a month against Internet Explorer, Mozilla Firefox, Apple Safari, and Opera. This project helped bring some publicity to browser security and may have

12 impelled vendors into fixing the issues faster than they normally would have. Other researchers have since used this strategy to help improve the security of various technologies; this includes the Month of Kernel Bugs, the Month of Apple Bugs, and the Month of PHP Bugs. The latest installment, in May 2010, was the Month of PHP Security (MoPS). The purpose of MoPS was to improve the security of PHP and the PHP ecosystem by disclosing vulnerabilities in PHP and PHP applications. The result was the disclosure of 60 security issues and the publication of a number of additional articles about PHP application security or tools specific to PHP security. Notably, the majority of the disclosed issues are not considered exploitable vulnerabilities, because a developer essentially must "attack themselves." Most of the issues involved interrupting internal functions by using a deprecated feature known as call-time pass-byreference. These bugs require that the "allow_call_time_pass_reference" configuration option is enabled, that an attacker has local access to his or her Web server, and that the server is configured to permit the execution of custom code. Of the remaining issues, 10 apply to applications that use PHP: Campsite 23 is prone to an SQL-injection vulnerability affecting the 'article_id' parameter; 24 ClanSphere 25 is prone to SQL-injection vulnerabilities that affect the CAPTCHA generator and the MySQL driver; 26 Clantiger 27 is prone to an SQL-injection vulnerability affecting the 's_ ' parameter; 28 DeluxeBB 29 is prone to an SQL-injection vulnerability affecting the 'memberid' cookie parameter; 30 efront 31 is prone to an SQL-injection vulnerability affecting the 'chatrooms_id' parameter; 32 Xinha 33 and Serendipity 34 are prone to a vulnerability that permits attackers to upload arbitrary files; 35 Cacti 36 is prone to an SQL-injection vulnerability affecting the 'rra_id' parameter; 37 CMSQlite 38 is prone to an SQL-injection vulnerability and a local file-include vulnerability; 39 e is prone to an SQL-injection vulnerability and a vulnerability that allows attackers to execute arbitrary PHP code. 41 The most serious of these issues is the arbitrary PHP code-execution vulnerability against e107, a popular content manager. Proofs-of-concept are available and the issue has not yet been patched by the vendor. Administrators of e107-based sites should disable bbcode functionality until a vendor patch is available. At the very least, restrict access to trusted networks, deploy network intrusion detection, and be sure only to run the application as a non-privileged user. In PHP itself, four vulnerabilities were reported: An integer-overflow vulnerability affects the 'php_dechunk()' function. 42 This function is used to decode remote HTTP chunked encoding streams. To exploit the issue, a PHP script must interact with a malicious Web server and

13 Multiple vulnerabilities that allow code-execution affect the PHP sqlite module. 43 The vulnerabilities reside in the 'sqlite_single_query()' and 'sql_array_query()' functions, and can be triggered if the 'rres' resource is not properly initialised before it is used. Multiple format-string vulnerabilities affect the PHP 'phar' extension. 44 The phar extension gives developers a way to place entire PHP applications into a single file i.e., a PHP archive. The vulnerabilities affect several functions within the extension that supply unsafe data to the core 'php_stream_wrapper_log_error()' function. PHP has addressed these issues with patches applied to the project's SVN repository. Multiple vulnerabilities affect the PHP 'Mysqlnd' extension. 45 This native driver extension is a replacement for the MySQL client library libmysql. The four reported vulnerabilities consist of three buffer-overflow vulnerabilities and an information-disclosure issue that lets attackers harvest the contents of heap-based memory. Only the issues affecting the 'phar' extension have been addressed by PHP so far. PHP administrators should implement the following mitigations: Run PHP with the least privileges possible; Deploy NIDS to monitor network traffic for signs of malicious activity; Implement nonexecutable and randomly mapped memory segments if possible; Restrict access to PHP-based sites to trusted networks and computers only. PHP servers can be made more secure in general by disabling global variables, using a chroot jail, and restricting file uploads

14 Credits Marc Fossi Executive Editor Manager, Development Dean Turner Director, Global Intelligence Network Amanda Andrews Editor Eric Johnson Editor Trevor Mack Editor Téo Adams Threat Analysis Engineer Joseph Blackbird Threat Analyst Brent Graveland Threat Analyst Darren Kemp Threat Analyst Debbie Mazurek Threat Analyst 11

15

16 About Symantec Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. For specific country offices and contact numbers, please visit our website. Symantec World Headquarters 350 Ellis St. Mountain View, CA USA +1 (650) (800) Symantec helps organizations secure and manage their information-driven world with security management, endpoint security, messaging security and application security solutions. Copyright 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. NO WARRANTY. The information in this document is being delivered to you AS-IS and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the information contained herein is at the risk of the user. This document may include technical or other inaccuracies or typographical errors. Symantec reserves the right to make changes without prior notice. 7/

Quarterly Report: Symantec Intelligence Quarterly

Quarterly Report: Symantec Intelligence Quarterly Symantec Intelligence Quarterly: Best Practices and Methodologies Quarterly Report: Symantec Intelligence Quarterly Symantec Intelligence Quarterly: Best Practices and Methodologies Contents Symantec

More information

Symantec enterprise security. Symantec Internet Security Threat Report April 2009. An important note about these statistics.

Symantec enterprise security. Symantec Internet Security Threat Report April 2009. An important note about these statistics. Symantec enterprise security Symantec Internet Security Threat Report April 00 Regional Data Sheet Latin America An important note about these statistics The statistics discussed in this document are based

More information

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

IBM Protocol Analysis Module

IBM Protocol Analysis Module IBM Protocol Analysis Module The protection engine inside the IBM Security Intrusion Prevention System technologies. Highlights Stops threats before they impact your network and the assets on your network

More information

Anti-exploit tools: The next wave of enterprise security

Anti-exploit tools: The next wave of enterprise security Anti-exploit tools: The next wave of enterprise security Intro From malware and ransomware to increasingly common state-sponsored attacks, organizations across industries are struggling to stay ahead of

More information

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

Web Application Worms & Browser Insecurity

Web Application Worms & Browser Insecurity Web Application Worms & Browser Insecurity Mike Shema Welcome Background Hacking Exposed: Web Applications The Anti-Hacker Toolkit Hack Notes: Web Security Currently working at Qualys

More information

Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities?

Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? ANALYST BRIEF Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? Author Randy Abrams Tested Products Avast Internet Security 7 AVG Internet Security 2012 Avira Internet Security

More information

WEB ATTACKS AND COUNTERMEASURES

WEB ATTACKS AND COUNTERMEASURES WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Recommended Practice Case Study: Cross-Site Scripting. February 2007

Recommended Practice Case Study: Cross-Site Scripting. February 2007 Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber

More information

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY EXPLOIT KITS UP 75 PERCENT The Infoblox DNS Threat Index, powered by IID, stood at 122 in the third quarter of 2015, with exploit kits up 75 percent

More information

Tespok Kenya icsirt: Enterprise Cyber Threat Attack Targets Report

Tespok Kenya icsirt: Enterprise Cyber Threat Attack Targets Report Tespok Kenya icsirt: Enterprise Cyber Threat Attack Targets Report About this Report This report was compiled and published by the Tespok icsirt in partnership with the Serianu Cyber Threat Intelligence

More information

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to

More information

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top

More information

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise

More information

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference

More information

Advanced Endpoint Protection Overview

Advanced Endpoint Protection Overview Advanced Endpoint Protection Overview Advanced Endpoint Protection is a solution that prevents Advanced Persistent Threats (APTs) and Zero-Day attacks and enables protection of your endpoints by blocking

More information

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction

More information

Protect Your Business and Customers from Online Fraud

Protect Your Business and Customers from Online Fraud DATASHEET Protect Your Business and Customers from Online Fraud What s Inside 2 WebSafe 5 F5 Global Services 5 More Information Online services allow your company to have a global presence and to conveniently

More information

IBM Security re-defines enterprise endpoint protection against advanced malware

IBM Security re-defines enterprise endpoint protection against advanced malware IBM Security re-defines enterprise endpoint protection against advanced malware Break the cyber attack chain to stop advanced persistent threats and targeted attacks Highlights IBM Security Trusteer Apex

More information

Spear Phishing Attacks Why They are Successful and How to Stop Them

Spear Phishing Attacks Why They are Successful and How to Stop Them White Paper Spear Phishing Attacks Why They are Successful and How to Stop Them Combating the Attack of Choice for Cybercriminals White Paper Contents Executive Summary 3 Introduction: The Rise of Spear

More information

Practical Threat Intelligence. with Bromium LAVA

Practical Threat Intelligence. with Bromium LAVA Practical Threat Intelligence with Bromium LAVA Practical Threat Intelligence Executive Summary Threat intelligence today is costly and time consuming and does not always result in a reduction of successful

More information

Advanced Persistent Threats

Advanced Persistent Threats White Paper INTRODUCTION Although most business leaders and IT managers believe their security technologies adequately defend against low-level threats, instances of (APTs) have increased. APTs, which

More information

Protecting the Infrastructure: Symantec Web Gateway

Protecting the Infrastructure: Symantec Web Gateway Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options

More information

2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report

2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report 2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report 28 September 2012 Submitted to: Donald Lafleur IS Audit Manager ND State Auditor

More information

Symantec Global Internet Security Threat Report Trends for 2009. Volume XV, Published April 2010

Symantec Global Internet Security Threat Report Trends for 2009. Volume XV, Published April 2010 Symantec enterprise security Symantec Global Internet Security Threat Report Trends for 2009 Volume XV, Published April 2010 Marc Fossi Executive Editor Manager, Development Security Technology and Response

More information

Microsoft Security Intelligence Report volume 7 (January through June 2009)

Microsoft Security Intelligence Report volume 7 (January through June 2009) Microsoft Security Intelligence Report volume 7 (January through June 2009) Key Findings Summary Volume 7 of the Microsoft Security Intelligence Report provides an in-depth perspective on malicious and

More information

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security 2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security For 10 years, Microsoft has been studying and analyzing the threat landscape of exploits, vulnerabilities, and malware.

More information

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure

More information

How To Manage Web Content Management System (Wcm)

How To Manage Web Content Management System (Wcm) WEB CONTENT MANAGEMENT SYSTEM February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Windows Remote Access

Windows Remote Access Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by

More information

VALIDATING DDoS THREAT PROTECTION

VALIDATING DDoS THREAT PROTECTION VALIDATING DDoS THREAT PROTECTION Ensure your DDoS Solution Works in Real-World Conditions WHITE PAPER Executive Summary This white paper is for security and networking professionals who are looking to

More information

Basic Security Considerations for Email and Web Browsing

Basic Security Considerations for Email and Web Browsing Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable

More information

Penetration Testing Report Client: Business Solutions June 15 th 2015

Penetration Testing Report Client: Business Solutions June 15 th 2015 Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]

More information

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning SECURITY TERMS: Advisory - A formal notice to the public on the nature of security vulnerability. When security researchers discover vulnerabilities in software, they usually notify the affected vendor

More information

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

THREAT VISIBILITY & VULNERABILITY ASSESSMENT THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings

More information

IBM Advanced Threat Protection Solution

IBM Advanced Threat Protection Solution IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain

More information

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer

More information

Symantec Advanced Threat Protection: Network

Symantec Advanced Threat Protection: Network Symantec Advanced Threat Protection: Network Data Sheet: Advanced Threat Protection The Problem Today s advanced attacks hide themselves on legitimate websites, leverage new and unknown vulnerabilities,

More information

Symantec Protection Suite Add-On for Hosted Email and Web Security

Symantec Protection Suite Add-On for Hosted Email and Web Security Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication

More information

Cyber Essentials Scheme

Cyber Essentials Scheme Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these

More information

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security

More information

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda

More information

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010 S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...

More information

Secure Your Mobile Workplace

Secure Your Mobile Workplace Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in

More information

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked. This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out

More information

Fighting Advanced Threats

Fighting Advanced Threats Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.

More information

Why Web Applications are making a hackers life easy. Presented by Jon Grew BT SBS

Why Web Applications are making a hackers life easy. Presented by Jon Grew BT SBS Why Web Applications are making a hackers life easy. Presented by Jon Grew BT SBS Acknowledgements Ed Barlow Technical Director EMEA Ed sends his apologies. The following presentation is based on the talk

More information

Post-Stuxnet Industrial Security: Zero-Day Discovery and Risk Containment of Industrial Malware

Post-Stuxnet Industrial Security: Zero-Day Discovery and Risk Containment of Industrial Malware Post-Stuxnet Industrial Security: Zero-Day Discovery and Risk Containment of Industrial Malware A White Paper presented by: Torsten Rössel Director of Business Development Innominate Security Technologies

More information

Tracking Anti-Malware Protection 2015

Tracking Anti-Malware Protection 2015 Tracking Anti-Malware Protection 2015 A TIME-TO-PROTECT ANTI-MALWARE COMPARISON TEST Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to measure

More information

Managing Web Security in an Increasingly Challenging Threat Landscape

Managing Web Security in an Increasingly Challenging Threat Landscape Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.

More information

Streamlining Web and Email Security

Streamlining Web and Email Security How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor

More information

INSTANT MESSAGING SECURITY

INSTANT MESSAGING SECURITY INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part

More information

Security Practices for Online Collaboration and Social Media

Security Practices for Online Collaboration and Social Media Cisco IT Best Practice Collaboration Security Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 2013 Cisco and/or its affiliates. All rights reserved.

More information

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

SECURITY TRENDS & VULNERABILITIES REVIEW 2015 SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall

More information

Why Digital Certificates Are Essential for Managing Mobile Devices

Why Digital Certificates Are Essential for Managing Mobile Devices WHITE PAPER: WHY CERTIFICATES ARE ESSENTIAL FOR MANAGING........... MOBILE....... DEVICES...................... Why Digital Certificates Are Essential for Managing Mobile Devices Who should read this paper

More information

The Dark Side of Trusting Web Searches From Blackhat SEO to System Infection

The Dark Side of Trusting Web Searches From Blackhat SEO to System Infection The Dark Side of Trusting Web Searches From Blackhat SEO to System Infection Trend Micro, Incorporated Marco Dela Vega and Norman Ingal Threat Response Engineers A Trend Micro Research Paper I November

More information

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection

More information

Insight. Security Response. Deployment Best Practices

Insight. Security Response. Deployment Best Practices Insight Deployment Best Practices Overview Symantec Insight is a reputation-based security technology that leverages the anonymous software adoption patterns of Symantec s hundreds of millions of users

More information

WHITE PAPER. Understanding How File Size Affects Malware Detection

WHITE PAPER. Understanding How File Size Affects Malware Detection WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

INSIDE. Malicious Threats of Peer-to-Peer Networking

INSIDE. Malicious Threats of Peer-to-Peer Networking Symantec Security Response WHITE PAPER Malicious Threats of Peer-to-Peer Networking by Eric Chien, Symantec Security Response INSIDE Background Protocols New Vector of Delivery Malicious Uses of Peer-to-Peer

More information

ASL IT SECURITY XTREME XPLOIT DEVELOPMENT

ASL IT SECURITY XTREME XPLOIT DEVELOPMENT ASL IT SECURITY XTREME XPLOIT DEVELOPMENT V 2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: The most dangerous threat is the one which do not have a CVE. Until now developing reliable exploits

More information

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR RUNNING SEP ON.... AZURE.................................... Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform Who should

More information

Five Tips to Reduce Risk From Modern Web Threats

Five Tips to Reduce Risk From Modern Web Threats Five Tips to Reduce Risk From Modern Web Threats By Chris McCormack, Senior Product Marketing Manager and Chester Wisniewski, Senior Security Advisor Modern web threats can infect your network, subvert

More information

10 Things Every Web Application Firewall Should Provide Share this ebook

10 Things Every Web Application Firewall Should Provide Share this ebook The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

The Prevalence of Flash Vulnerabilities on the Web

The Prevalence of Flash Vulnerabilities on the Web TECHNICAL BRIEF FLASH FLOODING The Prevalence of Flash Vulnerabilities on the Web Adobe Flash Player is a cross-platform, browser plugin that provides uncompromised viewing of expressive applications,

More information

Web Application Security 101

Web Application Security 101 dotdefender Web Application Security Web Application Security 101 1 Web Application Security 101 As the Internet has evolved over the years, it has become an integral part of virtually every aspect in

More information

Getting Ahead of Malware

Getting Ahead of Malware IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,

More information

Closing the Vulnerability Gap of Third- Party Patching

Closing the Vulnerability Gap of Third- Party Patching SOLUTION BRIEF: THIRD-PARTY PATCH MANAGEMENT........................................ Closing the Vulnerability Gap of Third- Party Patching Who should read this paper IT Managers who are trying to manage

More information

Why should I care about PDF application security?

Why should I care about PDF application security? Why should I care about PDF application security? What you need to know to minimize your risk Table of contents 1: Program crashes present an opportunity for attack 2: Look for software that fully uses

More information

Symantec Messaging Gateway powered by Brightmail

Symantec Messaging Gateway powered by Brightmail The first name in messaging security powered by Brightmail Overview, delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus protection, advanced

More information

Securing OS Legacy Systems Alexander Rau

Securing OS Legacy Systems Alexander Rau Securing OS Legacy Systems Alexander Rau National Information Security Strategist Sample Agenda 1 Today s IT Challenges 2 Popular OS End of Support & Challenges for IT 3 How to protect Legacy OS systems

More information

Adobe Flash Player and Adobe AIR security

Adobe Flash Player and Adobe AIR security Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,

More information

ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper

ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper ADVANCED THREATS IN THE ENTERPRISE Finding an Evil in the Haystack with RSA ECAT White Paper With thousands of workstations and servers under management, most enterprises have no way to effectively make

More information

Web Application Security

Web Application Security E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary

More information

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange

More information