Malware Trend Report, Q October November December

Size: px
Start display at page:

Download "Malware Trend Report, Q4 2014 October November December"

Transcription

1 Malware Trend Report, Q October November December January 2015 Copyright RedSocks B.V All Rights Reserved.

2 This page is left blank on purpose. Page 1 of 28

3 Table of Contents 1. Introduction Summary Collecting Malware Processing Malware Detecting Malware Classifying Malware Trends Adware Backdoors and Bots Exploits Rootkits Trojans Worms bit Malware Malicious Others Geolocation Final Word Miscreants say "Je suis Charlie" too Appendix A: Detecting Malware Appendix B: Classifying Malware Page 2 of 28

4 Table of Figures Figure 1: Unique Malicious Files Q3-Q Figure 2: Space Need To Store New Malicious Files Q3-Q Figure 3: Detected vs. Not Detected October Figure 4: Detected vs. Not Detected December Figure 5: Detected vs. Not Detected November Figure 6: Amount of Identified Adware Q Figure 7: Distribution of Adware.Symmi Q Figure 8: Amount of Identified Backdoors and Bots Q Figure 9: Distribution of Backdoor.Bot Q Figure 10: Amount of Identified Exploits Q Figure 11: Amount of Identified Rootkits Q Figure 12: Amount of Identified Trojans Q Figure 13: Amount of Identified Worms Q Figure 14: Amount of Identified 64-Bit Malware Q Figure 15: 64-bit Malware Families Q Figure 16: Other Malware Q Figure 17: Je Suis Charlie Figure 18: Fake Movie Maker Message Table of Tables Table 1: File Metrics Q3-Q Table 2: Malware Categories Q Table 3: Top 3 Worm Families Q Table 4: Other Malware Q4 vs. Q Table 5: Top 10 Countries Hosting C&C Servers Q Table 6: Top 10 Countries Hosting C&C Servers Q Table 7: Malware Categories Q3 vs. Q Page 3 of 28

5 1. Introduction This is the last quarterly trend report for 2014 from the RedSocks Malware Research Lab for RedSocks is a Dutch company specializing in malware detection. Our solution, RedSocks Malware Threat Defender, is a network appliance that analyses digital traffic flows in real-time, based on algorithms and lists of malicious indicators. This critical information is compiled by the RedSocks Malware Intelligence Team (RSMIT). The team consists of specialists whose job is to identify new threats and trends on the Internet and to translate them into state-of-the-art malware detection capabilities. With this report, we hope to provide the reader with a deeper insight into the trends we see in the malware we process as we look at data collected during the fourth quarter of At RedSocks we analyses large numbers of malicious files on a daily basis, therefore we can cover only a few topics briefly in this trend report. Protecting your data from Internet-based threats is not an easy task, and relying solely on protection from Anti-Virus companies - no matter how established their brand - is not enough. Comprehensive protection requires an entirely new approach. Page 4 of 28

6 2. Summary The total number of new and unique malicious files processed per month went from 7.2 million in October to 8.2 million in November, and down to 7.8 million in December. The overall detection by Anti-Virus software this quarter was roughly 5 percent lower compared to the third quarter. The detection rate for October was percent. For November, it is percent and in December, the average detection was only 73.0 percent. This might not sound too bad, but it means that around 14 percent, 16 percent and 27 percent, respectively, were not detected. Please note that identification rates can change based on samples chosen and time scanned. During the fourth quarter, the number of identified adware went up from 1.2 million in October to 1.6 million in November only to drop to 1.5 million in December. During the third quarter the amount of identified backdoors and bots (B&B) increased from 117,000 to 140,000. In the last quarter of 2014, the B&B start in October with unique samples, which increased to in November and in December. Only 0.03 percent of the files were detected by the Anti-Virus software as exploit and 0.04 percent as rootkit in October by Anti-Virus software. In November, 0.06 percent were detected as rootkits and 0.02 percent as exploits. For December it is 0.11 percent exploits and 0.06 percent rootkits. Like in the first, second, and third quarter of this year, trojans are by far the most popular type of malware. In October, they made up for 3 million, and in November and December, 3.6 million. In October, 471,000 worm files were identified. In November, the number increased to 622,000. In December, 674,000 worms were added to our databases. Grouped together, all other malicious files such as flooders, hacktools, spoofers, spyware, viruses, etc., make up for 34, 26 and 28 percent of the total for October, November and December, respectively. As in the third quarter, most Command & Control (C&C) servers were hosted in the United States, followed by the Russian Federation. Germany could be found on the third place, but lost it to the United Kingdom. The Netherlands, like in the third quarter, can be found at 5 th. Page 5 of 28

7 2.1. Collecting Malware At the RedSocks Malware Research Labs, we track large numbers of malware from our globally-distributed honeypots, honey-clients, spam-nets and various botnet monitoring sensors. Due to the distribution of our honeypots, we are able to automatically collect and process new malicious samples from across the globe. We also exchange large quantities of malicious files with the Anti-Virus industry. Figure 1: Unique Malicious Files Q3-Q Processing Malware Working with malware is what we love to do. More than 200,000 new malicious files arrive every day at our automated malware collecting machines. Figure 2: Space Need To Store New Malicious Files Q3-Q Page 6 of 28

8 All samples were renamed according to their hash calculation. We then check to see if that particular piece of malware has already been processed. In figure 2, the total amount of disk space needed to store all the new malicious files in gigabytes. While the numbers of new malicious files stayed more or less the same, the average file size decreased a little bit. During the second quarter, we saw that malicious files, on average, shrunk percent. During the third quarter, the average file size increased with percent. New file metrics by month July August September October November December Average number of new files per day 279, , , , , ,238 Average file size in bytes 455, , , , , ,770 Average Anti-Virus Detection % % % % % % Table 1: File Metrics Q3-Q Detecting Malware At RedSocks Malware Labs we use an in-house classification system for grouping malware. We have classified over 300 types for which we have created detailed statistics. Once multiple anti-virus scanners (in paranoid mode) have performed their on-demand scan, we know which malware was detected and, perhaps more importantly, which was not. In the next three figures all the new and unique malicious files per day. The green section shows the percentage of all the files identified by Anti-Virus software and, in red, the percentage of files not detected. Figure 3: Detected vs. Not Detected October 2014 Page 7 of 28

9 Figure 5: Detected vs. Not Detected November 2014 Figure 4: Detected vs. Not Detected December 2014 In October, of all the malicious files we processed, about 14 percent of them were not detected by any of the Anti-Virus products we currently use. In November; 16 percent of the samples on average remained undetected. In December; the Anti-Virus detection dropped, missing 27 percent of all malicious samples we processed. In appendix A: Detecting Malware you will find detection results by both day and month. Page 8 of 28

10 2.4. Classifying Malware We categorise malware according to its primary feature. In the third quarter, malware was grouped as follows: All Malware Adware B&B Exploits Rootkits Trojans Worms Others Adware Droppers Backdoors ADODB (D)DoS Trojans -Worms (D)DoS Tools Adware Downloaders Bots HTML Banking Trojans Generic Worms AV Tools Toolbars Java Batch Trojans IM-Worms Constructors Table 2: Malware Categories Q4 JS FakeAV IRC-Worms DOS based Linux GameThief Trojans Net-Worms Encrypted Malware MSExcel Generic Trojans Net-Worms Flooders MSPPoint IRC Trojans P2P-Worms Fraud Tools MSWord Java Trojan Packed Worms Generic Malware OSX LNK Trojans Script Worms Hack Tools PDF Packed Trojans Macro based Script Password Stealing Trojans Malware Heuristic SWF Proxy Trojans Monitors Win32 Randsom Trojans Nukers Win64 Rogue Trojans Porn-Dialers Script Trojans SMS Trojans Spy Trojans Trojan Clickers Trojan Dialers Trojan Downloaders Trojan Droppers Trojan Flooders Trojan Mailfinder Trojan Notifiers Trojan RATs WinREG Trojans Porn-Downloaders Porn-Tools PSW-Tools PUPs RemoteAdmin Riskware Spammers Spoofers SpyTools Spyware Suspicious Viruses The Others category consists of malicious samples that do not fit in any of the six main categories. See appendix B: Classifying Malware for the numbers by day, category and month. Page 9 of 28

11 3. Trends Discovering malware-propagation-trends starts with an analysis of the raw data behind the collection and processing of malware. From October to December, RedSocks Malware Research Labs identified the following trends by malware category Adware During the third quarter, we identified around 3.3 million files as adware. During the fourth quarter, we identified 4.3 million. This is 18.7 percent of all the identified malware, a 4 percent increase compared with the third quarter. Figure 6: Amount of Identified Adware Q4 On the 29 th of December, over 119,000 variations of Symmi were identified. The distribution of Symmi started on Sunday the 7 th of December. The Symmi adware displays ads, usually in the internet browser by modifying displayed pages or opening additional pages which include ads. These adware programs are usually installed by the users themselves or come with other software that the users install themselves (usually in exchange for using the software for free or as a default install option). Users might be unaware that this software was installed or of its behaviour. This detection is meant to flag the file and the behaviour as part of legitimate ad-displaying software. It does not have its own spreading routine. Page 10 of 28

12 Figure 7: Distribution of Adware.Symmi Q Backdoors and Bots Files identified as having been infected with a backdoor, or as having bot functions, made up 1.4 percent in the third quarter. A total of 397,000 files were classified in this category in the fourth quarter. This is 1.7 percent of the total. Figure 8: Amount of Identified Backdoors and Bots Q4 Page 11 of 28

13 Since May 2014, the distribution of new and variations of backdoors and bots (B&B), have been low. From the second week of September the numbers are rising again. During the fourth quarter, B&B increased with 0.3 percent. All the spikes in figure 11 from 10,000 and or more are caused largely by variation of the Backdoor.Bot With over 165,000 unique samples, it was by far the most popular B&B. Figure 9: Distribution of Backdoor.Bot Q Exploits An exploit is an attack on a computer system, especially one that takes advantage of a particular vulnerability. The amount of exploits doubled compared to the third quarter. They went from 7,109 unique samples to 14,431 in the last quarter of Of all the samples we processed during the fourth quarter 0.06 percent were categorised as exploit. Page 12 of 28

14 Figure 10: Amount of Identified Exploits Q4 Like in the third quarter, variations of the Exploit CVE C are still very popular among cybercriminals. This exploit identifies malicious PDF files downloaded by the Blackhole exploit-kit that take advantage of a known vulnerability in Adobe Reader. To prevent successful exploitation, install the latest updates available for Adobe Reader and/or remove any old and unnecessary installations. Exploit CVE C was responsible for all spikes above the 500. From all the identified exploits a stunning percent made use of this exploit Rootkits A rootkit is a type of software designed to hide the fact that an operating system has been compromised. This can be done in various ways, such as replacing vital executables or by introducing a new kernel module. Rootkits allow malware to hide in plain sight. Rootkits themselves are not harmful, they are simply used to hide malware, bots and worms. To install a rootkit, an attacker must first gain sufficient access the target operating system. This could be accomplished by using an exploit, by obtaining valid account credentials or through social engineering. Because rootkits are activated before your operating system boots up, they are very difficult to detect and therefore provide a powerful way for attackers to access and use the targeted computer without the owner being aware of it. Due to the way rootkits are used and installed, they are notoriously difficult to remove. Rootkits today are usually not used to gain elevated access, but are instead used to mask malware payloads more effectively. Page 13 of 28

15 Figure 11: Amount of Identified Rootkits Q4 In the second and third quarter, we saw a slight drop in the usage of rootkits, and this drop continued in the fourth quarter. Around 800 rootkit families were identified in 9,759 unique files. The first two spikes above 300 are not caused by a specific rootkit family. The spikes on the 11 th and 20 th of December were primarily caused by members of Rootkit with 247 and 173 samples. Page 14 of 28

16 3.5. Trojans With more than 9.9 million (43 percent) new unique samples in the fourth quarter of 2014, trojans are by far the biggest category of malware. In the third quarter 8.8 million files (39 percent) were Trojans. An increase of 4 percent. Figure 12: Amount of Identified Trojans Q4 Of all the trojan families, we will only discuss the top three. In third place we find Trojan.Unruy.1, with 115,000 different samples distributed over 86 days its best day was on the 21 st of November, with almost 15,000 samples. In second place is Trojan.Symmi.47633, with 124,000 files spread over 64 days its best day was on the 4 th of December. Without a doubt, the most distributed trojan family is Trojan.Kazy : in 92 days we counted nearly a 141,000 new samples. Page 15 of 28

17 3.6. Worms In roughly 1.8 million new files we identified worm traces and functionalities. The first spike above 50,000, on the 12 th of November, was primarily caused by 44,000 samples of Worm.Generic On the 24 th and the 25 th of November, 25,000 and 26,000 minor variations of Win32.Worm.Benjamin.A were counted. Figure 13: Amount of Identified Worms Q3 The top 3 most identified Worm families include: AV-Identifier Total Amount First Seen Last Seen Best Day Amount Best Day Worm.Generic , , Win32.Worm.P2p.Picsys.C 113, , Win32.Worm.Benjamin.A 96, , Table 3: Top 3 Worm Families Q Days Seen Compared with the third quarter, a slight decrease in worm usage can be seen. In the third quarter 7.97 percent were worms. For the fourth quarter 7.63 percent of the total was classified as worm. Page 16 of 28

18 bit Malware Malware designed to run on Windows 64-bit was identified in 205,000 new malicious files in the fourth quarter - a gigantic increase when compared with the 33,000 of the third quarter. From all new files, 0.89 percent was able to infect 64-bit Windows files. Figure 14: Amount of Identified 64-Bit Malware Q4 Expiro designed to infect 32-bit and 64-bit files aims to maximise profit and infects executable files on local, removable and network drives. As for the payload, this malware installs extensions for the Google Chrome and Mozilla Firefox browsers. The malware also steals stored certificates and passwords from Internet Explorer, Microsoft Outlook and from the FTP client FileZilla. Browser extensions are used to redirect the user to a malicious URL as well as to hijack confidential information, such as account credentials or online banking information. The virus disables some services on the compromised computer, including Windows Defender and Windows Security Center, and can also terminate processes. In the third quarter a drop in the old Expiro usage and the rise of the second and third generation was seen. The Expiro third generation variations were seen three times more than the second generation in the fourth quarter. In figure 18 we can see the seven 64-bit families we intercepted and the amount of files which were infected by them. Page 17 of 28

19 Figure 15: 64-bit Malware Families Q Malicious Others After the adware, B&Bs, exploits, rootkits, worms, and the 64-bit malware, we are still left with 6.4 million identified malicious files. This is 28 percent of the total of this quarter and a decrease of 7.7 percent compared with the third quarter. Figure 16: Other Malware Q4 Page 18 of 28

20 In table 4, we divided the others over 10 categories. Q4 Category Count % of total +/- Count % of total +/- DOS based 5, % % 2, % % Encrypted Malware 9, % % 10, % % Generic Malware 4.018, % % 4,083, % % Macro based 7, % % 9, % % Malware Heuristic 465, % % 153, % % PUPs 768, % % 2,088, % % Riskware % % % % Suspicious 149, % % 62, % % (Hack)Tools 5, % % 3, % % Windows viruses % % 2, % % Total 5,430, % % 6,415, % % Table 4: Other Malware Q4 vs. Q3 % of total: The percentage of the category of all the malicious files processed in that quarter. +/-: Increase/decrease in percentage compared with the quarter before. Windows viruses: These are so called classic viruses for Microsoft Windows, true file infectors. Q3 Using generic malware detection we found Ramnit.N leftovers and infections in 1.1 million files. Ramnit.N spreads by infecting EXE, DLL, and HTML files; it can also be distributed via removable drives. Once active, the virus infects EXE, DLL and HTML files found on the computer. It will also drop a malicious file that attempts to connect to and download other files from a remote server. Page 19 of 28

21 4. Geolocation Last quarter, we located RAT hotspots by plotting the servers with the most traffic and connections on a map. RATs are short for Remote Administration Trojans or Remote Access Trojans (sometimes described as Remote Access Tools 1 ). This quarter we look at GoSmartVPS. According to their own website; GoSmartVPS provides cheap and affordable high quality virtual private servers. We're excited to start offering virtual private servers for as low as $7/mo. With no long term contracts and a 72 hour cancellation policy, there's no risk to try out GoSmartVPS!. This VPS (Virtual Private Server) network seems to host only botnet controllers (range /24): /32 controller no RSMIT-NLS - Citadel Botnet Controller /32 controller no RSMIT-NLS - Zeus Botnet Controller /32 controller no RSMIT-NLS - Citadel Botnet Controller /32 controller no RSMIT-NLS - Citadel Botnet Controller /32 controller no RSMIT-NLS - Citadel Botnet Controller /32 controller no RSMIT-NLS - Citadel Botnet Controller /32 controller no RSMIT-NLS - Citadel Botnet Controller /32 controller no RSMIT-NLS - Citadel Botnet Controller /32 controller no RSMIT-NLS - Citadel Botnet Controller /32 controller no RSMIT-NLS - Citadel Botnet Controller /32 controller no RSMIT-NLS - Citadel Botnet Controller /32 controller no RSMIT-NLS - Citadel Botnet Controller /32 controller no RSMIT-NLS - Zeus Botnet Controller /32 controller no RSMIT-NLS - Citadel Botnet Controller /32 controller no RSMIT-NLS - Citadel Botnet Controller /32 controller no RSMIT-NLS - Citadel Botnet Controller /32 controller no RSMIT-NLS - Citadel Botnet Controller GoSmartVPS /24 - DNS Registrations: ns1.fireballs.asia, ns2.fireballs.asia aaaaaaaaaaaaaaaaaaaazzzzzzzzzzzzzzzzzzzzzzbbbbbbbbbbbb.net gosmartvps.com onetapgaming.net Domain Name: GOSMARTVPS.COM Registrar: ENOM, INC. Sponsoring Registrar IANA ID: 48 Whois Server: whois.enom.com Referral URL: Name Server: NS-1370.AWSDNS-43.ORG Name Server: NS-153.AWSDNS-19.COM Name Server: NS-1590.AWSDNS-06.CO.UK Name Server: NS-975.AWSDNS-57.NET Status: clienttransferprohibited 1 These are not regular administrator tools, but ones which are developed and used for malicious remote access. Page 20 of 28

22 Updated Date: 17-sep-2014 Creation Date: 20-jul-2014 Expiration Date: 20-jul-2015 Website: At the moment GoSmartVPS seems to be down. But daily we see new Citadel Botnet Controllers added to the network daily. Top 10 Countries Hosting C&C July August September United States 1,491 United States 1,163 United States 870 Russian Federation 521 Russian Federation 529 Russian Federation 446 Germany 315 Germany 318 Germany 260 United Kingdom 311 United Kingdom 302 United Kingdom 259 Netherlands 225 Netherlands 208 Netherlands 156 China 216 Ukraine 202 China 152 Ukraine 160 China 196 Turkey 146 Korea 132 Turkey 154 Ukraine 130 France 129 Korea 137 Korea 102 Turkey 129 France 132 France 101 Table 5: Top 10 Countries Hosting C&C Servers Q3 In the third quarter the United States still led the pack, followed by the Russian Federation and Germany: Top 10 Countries Hosting C&C October November December United States 841 United States 898 United States 723 Russian Federation 471 Russian Federation 470 Russian Federation 513 Germany 282 United Kingdom 261 Germany 260 United Kingdom 265 Germany 247 United Kingdom 242 Netherlands 159 Netherlands 167 Netherlands 202 Turkey 142 China 146 Ukraine 163 Ukraine 140 Ukraine 143 China 144 China 139 Brazil 116 France 131 Brazil 128 France 113 India 113 France 115 Korea 94 Brazil 110 Table 6: Top 10 Countries Hosting C&C Servers Q4 The C&C Servers hosted in The Netherlands increased slightly during the last quarter. New on the list are C&C Servers hosted in India and Brazil. In total 11,642 active C&C servers were found and added to our blacklist (4,050 in October, 3,875 November, and 3,717 in December). And last but not least, below are some backdoors we found on North Korean IP s (all 1024 IP s): Page 21 of 28

23 IP : /32 (Past: /32, /32) Port : 7070/TCP Domain : hxxp://fgwegasgxcxb.ddns.net Totalhash : Detection : Dynamer, ServStart, Vehidis inetnum: netname: STAR-KP descr: Ryugyong-dong descr: Potong-gang District country: KP /24 badhood no - RSMIT-NLS - Known Hostile Network Ryugyong-dong (North Korea) /24 badhood no - RSMIT-NLS - Known Hostile Network Ryugyong-dong (North Korea) /24 badhood no - RSMIT-NLS - Known Hostile Network Ryugyong-dong (North Korea) /24 badhood no - RSMIT-NLS - Known Hostile Network Ryugyong-dong (North Korea) Page 22 of 28

24 5. Final Word In the third quarter of 2014, the total number of new malicious files processed was 21.6 million. For the fourth quarter it was 23.2 million an increase of 2.4 percent. The overall detection by Anti-Virus software improved by 3.32 percent compared with the third quarter. Altogether, around 4.4 million malicious files went undetected during the fourth quarter. By grouping and classifying the identified malware, we detected a decrease of popularity in 3 of the 7 main malware categories during the third quarter. These three categories are: rootkits, worms and others. The remaining four categories (adware, B&B, exploits, and trojans) increased. Category Total % of Total +/- compared to Q3 Largest Family Total number Q4 Adware 4,326, % % Adware.Linkury.M 361,707 Backdoors & Bots 396, % % Backdoor.Bot ,197 Exploits 14, % % Exploit:W32/CVE C 7,014 Rootkits 9, % % OnLineGames Trojans 9,951, % % Gen:Variant.Kazy ,419 Worms 1,767, % % Worm.Generic ,784 Others 6,706, % % Win32.Ramnit.N 1,117,874 Table 7: Malware Categories Q3 vs. Q4 Within the top 10 countries hosting C&C servers, there was little change. The top 3 countries stayed the same during the fourth quarter. United States led the third quarter of 2014, followed by the Russian Federation. Germany and the United Kingdom switched places three and four. The Netherlands kept the 5 th place in the fourth quarter Miscreants say "Je suis Charlie" too With thanks to Ashwin K. Vamshi from Blue Coat 2 : January 14, 2015 It is very common for malicious actors to attempt to exploit trending news in order to lure users to execute malicious programs. As a regular practice we keep track of such instances. In the most recent case I happened to come across an interesting malware (md5 hash 3c5266cab10c78f3a c217a40) with the theme "Je Suis Charlie", a slogan that has gone viral after the 7 January 2015 massacre at the Charlie Hebdo offices in Paris. This malware was found in our stream of incoming material so we don't yet know how it has been distributed. It is likely, given the subject, that it has been attempted to be spread using some kind of social engineering trick. The malware in question is the infamous DarkComet RAT, a freely available remote administration tool which also can double as a powerful backdoor trojan. DarkComet was originally developed by the French hacker DarkCoderSc, who stopped further development on the project in Nevertheless, its ease of 2 Page 23 of 28

25 use and rich set of features have kept it popular by all sorts of attackers from script kiddies and activists to more sinister players. The variant used in the present attack is obfuscated to make it less noticed by AV scanners. The DarkComet Delphi code is enveloped in a.net wrapper, making the telltale signs of DarkComet hard to spot. Indeed, the AV detection rate of this executable is at the time of writing poor only 2/53 scanners had detection on the VirusTotal online scanner service. The sample drops a copy of itself with the name svchost.exe and launches an image of a new-born baby with a band carrying the name Je suis Charlie. This image appears to have been harvested from public sources. Figure 17: Je Suis Charlie The sample also displays a message in French to mislead the user to believe that the binary is created a previous version of MovieMaker: Figure 18: Fake Movie Maker Message The Command and Control host is a subdomain under the no-ip dynamic DNS domain. This is a well-known legitimate dynamic DNS service which is however often used by malicious actors. The actual domain address is: snakes63.no-ip.org This address currently resolves to an IP address located with the French service provider Orange. The French IP address and the error message in French reinforces the impression that this malware was targeted at French users, though we have no indication as to who the attackers are or what they are after. The French authorities have been informed about this malware. We will continue to monitor activities in this space and keep you posted. For now, just be alert that items of great media interest like this may contain malware. There really is nothing so sacred that bad people won t try to exploit it. We hope you that you enjoyed our last Malware Trend Report of 2014 and that it provides you with insight into the trends we have seen during the fourth quarter of We continue to innovate, so please check back with us for our next quarterly trend report. Questions, comments and requests can be directed towards the RedSocks Malware Research Labs. RedSocks B.V. W: T: +31 (0) E: info@redsocks.nl G.J.Vroon Anti-Malware Behavioural Researcher Page 24 of 28

26 Appendix A: Detecting Malware October November December Day Files/day Detected Undetected Files/day Detected Undetected Files/day Detected Undetected 1 221, ,528 21, , ,643 29, , ,287 79, , ,146 7, , ,018 37, , ,627 69, , ,775 23, , ,869 76, , ,940 83, , ,034 16, , ,877 27, , ,720 28, , ,983 14, , ,853 53, , ,133 36, , ,114 51, , ,029 51, , ,824 33, , ,171 42, , ,800 51, , ,247 62, , ,867 42, , ,714 54, , ,055 57, , ,431 34, , ,353 50, , ,446 14, , ,366 48, , ,994 44, , ,309 27, , ,244 48, , ,742 76, , ,534 73, , ,136 58, , ,380 21, , , , , ,397 32, , ,394 33, , ,878 60, , ,297 46, , ,911 28, , , , , ,408 39, , ,486 43, , , , , ,631 31, , ,825 48, , ,681 49, , ,926 39, , ,366 20, , ,886 53, , ,651 40, , ,577 76, , ,455 63, , ,891 31, , ,024 21, , ,201 55, , ,104 79, , ,826 86, , ,483 65, , ,454 28, , ,213 18, , ,288 72, , ,374 23, , ,708 31, , ,313 69, , ,158 9, , ,522 93, , ,555 81, , ,505 24, , ,747 22, , ,215 75, , ,447 21, , ,505 72, , ,065 53, , ,228 18, , ,750 9, , ,761 38, , ,240 28, , ,730 26, , ,061 80, , ,458 25, , ,548 52, , ,278 77, , ,706 22, , ,482 35, , ,679 42, , ,906 17, , ,670 28, , ,613 64, , ,665 27, , ,493 67,249 7,233,995 6,235, ,377 8,150,022 6,826,555 1,323,467 7,788,369 5,705,903 2,082,467 Page 25 of 28

27 Appendix B: Classifying Malware October Day Adware Backdoors Exploits Rootkits Trojans Worms Other 1 29,142 3, ,371 21,971 75, ,304 4, ,061 16,921 51, ,977 3, ,731 38, , ,499 1, ,273 19,933 47, ,258 1, ,170 16,586 39, ,250 3, ,577 15, , ,607 6, ,077 12,122 83, ,251 6, ,111 12,690 73, ,105 8, ,391 15,580 61, ,341 9, ,025 15,720 83, ,726 7, ,938 14,279 80, ,129 3, ,788 16, , ,742 6, ,265 13,382 81, ,803 4, ,580 32, , ,787 5, ,987 29,158 89, ,506 8, ,135 27, , ,128 1, ,503 9,970 75, ,505 1, ,228 5,402 51, , ,649 11,941 66, ,477 2, , ,007 19, , ,952 2, ,511 16,512 74, ,956 2, ,081 10,863 84, ,879 2, ,415 8,553 69, ,910 2, ,932 12,110 93, ,613 1, ,131 2,910 45, ,172 2, ,035 4,614 77, ,102 2, ,727 8,190 67, ,489 1, ,147 13,727 58, ,507 3, ,669 15,447 72, ,067 3, ,188 8,435 95, ,450 2, ,161 3,789 75,179 Total 1,217, ,868 1,911 3,042 2,975, ,243 2,445,466 Page 26 of 28

28 November Day Adware Backdoors Exploits Rootkits Trojans Worms Other 1 41,245 2, ,422 8,238 74, ,454 1, ,944 5,188 51, , ,116 1,322 61, , ,653 5,471 36, ,242 1, ,849 3,278 55, ,446 5, ,430 4,288 55, ,531 7, ,434 5,596 75, ,808 2, ,932 4,833 89, ,441 3, ,497 10,960 84, ,751 3, ,853 31,226 69, ,319 5, ,658 36,641 83, ,788 5, ,523 37,257 85, ,887 1, ,962 25,362 56, ,560 1, ,468 7,537 60, ,295 3, ,699 10,661 57, ,774 2, ,981 17,628 86, ,906 5,059 2, ,590 32,967 77, ,854 2, ,994 14,302 69, ,746 4, ,367 7,640 74, ,683 1, ,790 14,164 68, ,703 1, ,161 6,934 69, ,302 18, ,852 19,613 75, ,842 12, ,202 60, , ,160 4, ,995 47,645 56, ,584 5, ,701 71,258 68, ,982 2, ,518 20,353 48, ,650 1, ,136 20,019 67, ,060 2, ,854 39,141 75, ,060 8, ,668 39, , ,580 14, ,540 13,377 80,269 Totals 1,646, ,044 4,330 1,928 3,618, ,496 2,119,594 Page 27 of 28

29 December Day Adware Backdoors Exploits Rootkits Trojans Worms Other 1 39,265 18, ,313 14,661 79, ,897 9, ,362 15,609 65, ,607 1, ,543 35, , ,775 1, ,917 19,731 54, ,194 1, ,620 22,771 61, ,800 2, ,756 47,126 73, ,206 5, ,010 32,907 84, ,462 2, ,705 23,010 67, ,710 5, ,928 27,473 81, ,945 4, ,780 22,715 59, ,175 4, ,473 30,280 57, ,504 4, ,558 41,199 55, ,202 9, ,159 42,448 45, ,162 11,512 2, ,305 41,233 61, ,627 5,781 1, ,880 37,848 51, ,624 5, ,225 32,882 45, ,407 9, ,989 23,183 69, ,248 5, ,682 18,232 82, ,051 4, ,168 12,577 84, ,203 5, ,592 13, , ,744 1, ,397 13,382 97, ,292 1, ,016 22,089 92, ,187 2, ,963 19,049 80, ,876 2, ,316 14,884 71, ,356 1, ,349 4,669 43, ,059 2, ,786 4,591 41, ,119 1, ,986 9, , ,095 1, ,224 5,910 79, ,926 2, ,228 10,820 8, ,262 1, ,311 6,928 55, ,651 1, ,952 7,187 64,386 Totals 1,461, ,973 8,191 4,788 3,356, ,163 2,141,133 Page 28 of 28

30 REDSOCKS RedSocks is a Dutch company specialised in malware detection. RedSocks supplies RedSocks malware threat defender as a network appliance. This innovative appliance analyses digital traffic flows in real time based on the algorithms and lists of malicious indicators compiled by the RedSocks Malware Intelligence Team. This team consists of specialists in identifying new threats on the internet and translating them into state-of-the-art malware detection. Boogschutterstraat 9C, 7324 AE Apeldoorn, The Netherlands Tel +31 (0) info@redsocks.nl Website

Malware Trend Report, Q2 2014 April May June

Malware Trend Report, Q2 2014 April May June Malware Trend Report, Q2 2014 April May June 5 August 2014 Copyright RedSocks B.V. 2014. All Rights Reserved. Table of Contents 1. Introduction... 3 2. Overview... 4 2.1. Collecting Malware... 5 2.2. Processing...

More information

This page is left blank on purpose.

This page is left blank on purpose. This page is left blank on purpose. page 1 of 30 Table of Contents 1. Introduction... 5 2. Summary... 6 2.1. Collecting Malware... 7 2.2. Processing Malware... 7 2.3. Identifying Malware... 8 2.4. Detecting

More information

Malware Trend Report, Q1 2015 January February March

Malware Trend Report, Q1 2015 January February March Malware Trend Report, Q1 215 January February March April 215 Copyright RedSocks B.V. 214-215. All Rights Reserved. This page is left blank on purpose. Page 1 Table of Contents 1. Introduction... 4 2.

More information

Windows Malware Annual Report 2014 And prognosis 2015

Windows Malware Annual Report 2014 And prognosis 2015 Windows Malware Annual Report 2014 And prognosis 2015 February 2015 Copyright RedSocks B.V. 2014-2015. All Rights Reserved. This page is left blank on purpose. Page 1 Table of Contents 1. Introduction...

More information

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform

More information

Computer Security DD2395

Computer Security DD2395 Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh11/ Fall 2011 Sonja Buchegger buc@kth.se Lecture 7 Malicious Software DD2395 Sonja Buchegger 1 Course Admin Lab 2: - prepare

More information

Protection for Mac and Linux computers: genuine need or nice to have?

Protection for Mac and Linux computers: genuine need or nice to have? Protection for Mac and Linux computers: genuine need or nice to have? The current risk to computers running non-windows platforms is small but growing. As Mac and Linux computers become more prevalent

More information

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY EXPLOIT KITS UP 75 PERCENT The Infoblox DNS Threat Index, powered by IID, stood at 122 in the third quarter of 2015, with exploit kits up 75 percent

More information

Using big data analytics to identify malicious content: a case study on spam emails

Using big data analytics to identify malicious content: a case study on spam emails Using big data analytics to identify malicious content: a case study on spam emails Mamoun Alazab & Roderic Broadhurst Mamoun.alazab@anu.edu.au http://cybercrime.anu.edu.au 2 Outline Background Cybercrime

More information

Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic

Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic The Leader in Cloud Security RESEARCH REPORT Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic ABSTRACT Zscaler is a cloud-computing,

More information

TECHNICAL REPORT. An Analysis of Domain Silver, Inc..pl Domains

TECHNICAL REPORT. An Analysis of Domain Silver, Inc..pl Domains TECHNICAL REPORT An Analysis of Domain Silver, Inc..pl Domains July 31, 2013 CONTENTS Contents 1 Introduction 2 2 Registry, registrar and registrant 3 2.1 Rogue registrar..................................

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

Malware B-Z: Inside the Threat From Blackhole to ZeroAccess

Malware B-Z: Inside the Threat From Blackhole to ZeroAccess Malware B-Z: Inside the Threat From Blackhole to ZeroAccess By Richard Wang, Manager, SophosLabs U.S. Over the last few years the volume of malware has grown dramatically, thanks mostly to automation and

More information

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4) Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware

More information

Information Security Threat Trends

Information Security Threat Trends Talk @ Microsoft Security Day Sep 2005 Information Security Threat Trends Mr. S.C. Leung 梁 兆 昌 Senior Consultant 高 級 顧 問 CISSP CISA CBCP M@PISA Email: scleung@hkcert.org 香 港 電 腦 保 安 事 故 協 調 中 心 Introducing

More information

Operation Liberpy : Keyloggers and information theft in Latin America

Operation Liberpy : Keyloggers and information theft in Latin America Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

How to easily clean an infected computer (Malware Removal Guide)

How to easily clean an infected computer (Malware Removal Guide) How to easily clean an infected computer (Malware Removal Guide) Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather

More information

Phishing Activity Trends

Phishing Activity Trends Phishing Activity Trends Report for the Month of, 27 Summarization of Report Findings The number of phishing reports received by the (APWG) came to 23,61 in, a drop of over 6, from January s previous record

More information

Phishing Activity Trends Report June, 2006

Phishing Activity Trends Report June, 2006 Phishing Activity Trends Report, 26 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial account

More information

MALICIOUS REDIRECTION A Look at DNS-Changing Malware

MALICIOUS REDIRECTION A Look at DNS-Changing Malware MALICIOUS REDIRECTION A Look at DNS-Changing Malware What are Domain Naming System (DNS)-changing malware? These recently garnered a lot of attention due to the recent Esthost takedown that involved a

More information

MOBILE MALWARE REPORT

MOBILE MALWARE REPORT TRUST IN MOBILE MALWARE REPORT THREAT REPORT: H2/2014 CONTENTS At a Glance 03-03 Forecasts and trends 04-04 Current situation: 4.500 new Android malware instances every day 05-05 Third-party App-Stores

More information

Keeping you and your computer safe in the digital world.

Keeping you and your computer safe in the digital world. Keeping you and your computer safe in the digital world. After completing this class, you should be able to: Explain the terms security and privacy as applied to the digital world Identify digital threats

More information

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013 Integrated Approach to Network Security Lee Klarich Senior Vice President, Product Management March 2013 Real data from actual networks 2 2012, Palo Alto Networks. Confidential and Proprietary. 2008: HTTP,

More information

Phishing Activity Trends Report. 1 st Half 2009. Committed to Wiping Out Internet Scams and Fraud

Phishing Activity Trends Report. 1 st Half 2009. Committed to Wiping Out Internet Scams and Fraud 1 st Half 2009 Committed to Wiping Out Internet Scams and Fraud January June 2009 Phishing Report Scope The quarterly APWG analyzes phishing attacks reported to the APWG by its member companies, its Global

More information

ZNetLive Malware Monitoring

ZNetLive Malware Monitoring Introduction The criminal ways of distributing malware or malicious software online have gone through a change in past years. In place of using USB drives, attachments or disks to distribute viruses, hackers

More information

ASEC REPORT VOL.29 2012.06. AhnLab Monthly Security Report. Malicious Code Trend Security Trend Web Security Trend

ASEC REPORT VOL.29 2012.06. AhnLab Monthly Security Report. Malicious Code Trend Security Trend Web Security Trend ASEC REPORT VOL.29 2012.06 AhnLab Monthly Security Report Disclosure to or reproduction for others without the specific written authorization of AhnLab is prohibited. Copyright (c) AhnLab, Inc. All rights

More information

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

Botnets: The Advanced Malware Threat in Kenya's Cyberspace Botnets: The Advanced Malware Threat in Kenya's Cyberspace AfricaHackon 28 th February 2014 Who we Are! Paula Musuva-Kigen Research Associate Director, Centre for Informatics Research and Innovation (CIRI)

More information

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Lab Exercises Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Review Questions 1) In class, we made the distinction between a front-door attack and

More information

Phishing Activity Trends Report for the Month of December, 2007

Phishing Activity Trends Report for the Month of December, 2007 Phishing Activity Trends Report for the Month of December, 2007 Summarization of December Report Findings The total number of unique phishing reports submitted to APWG in December 2007 was 25,683, a decrease

More information

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey

More information

What you need to know to keep your computer safe on the Internet

What you need to know to keep your computer safe on the Internet What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security

More information

Ethical Hacking Course Layout

Ethical Hacking Course Layout Ethical Hacking Course Layout Introduction to Ethical Hacking o What is Information Security? o Problems faced by the Corporate World o Why Corporate needs Information Security? Who is a Hacker? o Type

More information

Introduction The Case Study Technical Background The Underground Economy The Economic Model Discussion

Introduction The Case Study Technical Background The Underground Economy The Economic Model Discussion Internet Security Seminar 2013 Introduction The Case Study Technical Background The Underground Economy The Economic Model Discussion An overview of the paper In-depth analysis of fake Antivirus companies

More information

Email David-Kovarik@northwestern.edu Phone 847-467-5930 Fax 847-467-6000

Email David-Kovarik@northwestern.edu Phone 847-467-5930 Fax 847-467-6000 Information Technology Information and Systems Security/Compliance Northwestern University 1800 Sherman Av Suite 209 Evanston, IL 60201 Email David-Kovarik@northwestern.edu Phone 847-467-5930 Fax 847-467-6000

More information

CITADEL TROJAN OUTGROWING ITS ZEUS ORIGINS

CITADEL TROJAN OUTGROWING ITS ZEUS ORIGINS CITADEL TROJAN OUTGROWING ITS ZEUS ORIGINS May 2012 As of April 30th, 2012 the Citadel Trojan was at its fourth upgrade with Version 1.3.4.0 already in the hands of its customers. Citadel s features, bug

More information

The Nitro Attacks. Security Response. Stealing Secrets from the Chemical Industry. Introduction. Targets. Eric Chien and Gavin O Gorman

The Nitro Attacks. Security Response. Stealing Secrets from the Chemical Industry. Introduction. Targets. Eric Chien and Gavin O Gorman The Nitro Attacks Stealing Secrets from the Chemical Industry Eric Chien and Gavin O Gorman Contents Introduction... 1 Targets... 1 Attack methodology... 2 Geographic Spread... 3 Attribution... 4 Technical

More information

Security A to Z the most important terms

Security A to Z the most important terms Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from

More information

Current Threat Scenario and Recent Attack Trends

Current Threat Scenario and Recent Attack Trends Current Threat Scenario and Recent Attack Trends Anil Sagar Additional Director Indian Computer Emergency Response Team (CERT-In) Objectives Current Cyber space Nature of cyberspace and associated risks

More information

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation

More information

Introduction: 1. Daily 360 Website Scanning for Malware

Introduction: 1. Daily 360 Website Scanning for Malware Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover

More information

What do a banking Trojan, Chrome and a government mail server have in common? Analysis of a piece of Brazilian malware

What do a banking Trojan, Chrome and a government mail server have in common? Analysis of a piece of Brazilian malware What do a banking Trojan, Chrome and a government mail server have in common? Analysis of a piece of Brazilian malware Contents Introduction.................................2 Installation: Social engineering

More information

CIT 480: Securing Computer Systems. Malware

CIT 480: Securing Computer Systems. Malware CIT 480: Securing Computer Systems Malware Topics 1. Anti-Virus Software 2. Virus Types 3. Infection Methods 4. Rootkits 5. Malware Analysis 6. Protective Mechanisms 7. Malware Factories 8. Botnets Malware

More information

A TASTE OF HTTP BOTNETS

A TASTE OF HTTP BOTNETS Botnets come in many flavors. As one might expect, these flavors all taste different. A lot of Internet users have had their taste of IRC, P2P and HTTP based botnets as their computers were infected with

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details: Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for

More information

Computer Viruses: How to Avoid Infection

Computer Viruses: How to Avoid Infection Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you

More information

Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team

Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team The Internet is in the midst of a global network pandemic. Millions of computers

More information

FORBIDDEN - Ethical Hacking Workshop Duration

FORBIDDEN - Ethical Hacking Workshop Duration Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once

More information

Mobile Malware Network View. Kevin McNamee : Alcatel-Lucent

Mobile Malware Network View. Kevin McNamee : Alcatel-Lucent Mobile Malware Network View Kevin McNamee : Alcatel-Lucent Agenda Introduction How the data is collected Lies, Damn Lies and Statistics Windows PC Malware Android Malware Network Impact Examples of malware

More information

Kaspersky Lab. Contents

Kaspersky Lab. Contents KASPERSKY DDOS INTELLIGENCE REPORT Q3 2015 Contents Contents... 1 Q3 events... 2 Attacks on financial organizations... 2 Unusual attack scenario... 2 XOR DDoS bot activity... 2 DDoS availability... 3 Statistics

More information

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security 2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security For 10 years, Microsoft has been studying and analyzing the threat landscape of exploits, vulnerabilities, and malware.

More information

WHITE PAPER. Understanding How File Size Affects Malware Detection

WHITE PAPER. Understanding How File Size Affects Malware Detection WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through

More information

You ll learn about our roadmap across the Symantec email and gateway security offerings.

You ll learn about our roadmap across the Symantec email and gateway security offerings. #SymVisionEmea In this session you will hear how Symantec continues to focus our comprehensive security expertise, global intelligence and portfolio on giving organizations proactive, targeted attack protection

More information

24/7 Visibility into Advanced Malware on Networks and Endpoints

24/7 Visibility into Advanced Malware on Networks and Endpoints WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction

More information

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010) Indian Computer Emergency Response Team (CERT-In) Annual Report (2010) Indian Computer Emergency Response Team (CERT-In) Department of Information Technology Ministry of Communications & Information Technology

More information

Context Threat Intelligence

Context Threat Intelligence Context Threat Intelligence Threat Advisory The Monju Incident Context Ref. Author TA10009 Context Threat Intelligence (CTI) Date 27/01/2014 Tel +44 (0) 20 7537 7515 Fax +44 (0) 20 7537 1071 Email threat@contextis.co.uk

More information

Getting Ahead of Malware

Getting Ahead of Malware IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,

More information

Real World and Vulnerability Protection, Performance and Remediation Report

Real World and Vulnerability Protection, Performance and Remediation Report Real World and Vulnerability Protection, Performance and Remediation Report A test commissioned by Symantec Corporation and performed by AV-Test GmbH Date of the report: September 17 th, 2014, last update:

More information

How Spyware and Anti-Spyware Work

How Spyware and Anti-Spyware Work 22 PART 1 INTERNET SECURITY CHAPTER 3 How Spyware and Anti-Spyware Work 23 THESE days, the biggest danger you face when you go onto the Internet might be spyware a type of malicious software that can invade

More information

Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway

Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Websense Support Webinar January 2010 web security data security email security

More information

Loophole+ with Ethical Hacking and Penetration Testing

Loophole+ with Ethical Hacking and Penetration Testing Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,

More information

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy For Public Use G/On Basic Best Practice Reference Guide Version 6 Make Connectivity Easy 2006 Giritech A/S. 1 G/On Basic Best Practices Reference Guide v.6 Table of Contents Scope...3 G/On Server Platform

More information

Corporate Account Takeover & Information Security Awareness

Corporate Account Takeover & Information Security Awareness Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation is for information purposes

More information

Deep Discovery. Technical details

Deep Discovery. Technical details Deep Discovery Technical details Deep Discovery Technologies DETECT Entry point Lateral Movement Exfiltration 360 Approach Network Monitoring Content Inspection Document Emulation Payload Download Behavior

More information

SECTOR 2015 Malware Activity in Mobile Networks Kevin McNamee (Alcatel-Lucent)

SECTOR 2015 Malware Activity in Mobile Networks Kevin McNamee (Alcatel-Lucent) SECTOR 2015 Malware Activity in Mobile Networks Kevin McNamee (Alcatel-Lucent) Agenda How the data is collected Lies, Damn Lies and Statistics Windows PC Malware Android Malware Examples of malware Conclusion

More information

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning SECURITY TERMS: Advisory - A formal notice to the public on the nature of security vulnerability. When security researchers discover vulnerabilities in software, they usually notify the affected vendor

More information

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud AARP can help you Spot & Report Fraud Fraud Fighter Call Center: Talk to a volunteer trained in how to spot and report fraud. Call the Fraud Fighter Call Center at (877) 908-3360 Fraud Watch Campaign What

More information

The Underground Economy of the Pay-Per-Install (PPI) Business

The Underground Economy of the Pay-Per-Install (PPI) Business The Underground Economy of the Pay-Per-Install (PPI) Business Kevin Stevens, Security Researcher SecureWorks Counter Threat Unit (CTU) History of the PPI Business The Pay-Per-Install business model (PPI)

More information

ESET NOD32 Antivirus. Table of contents

ESET NOD32 Antivirus. Table of contents ESET NOD32 Antivirus ESET NOD32 Antivirus provides state-of-theart protection for your computer against malicious code. Based on the ThreatSense scanning engine first introduced in the awardwinning NOD32

More information

How To Protect Yourself From A Web Attack

How To Protect Yourself From A Web Attack Five Stages of a Web Malware Attack A guide to web attacks plus technology, tools and tactics for effective protection By Chris McCormack, Senior Product Marketing Manager Today s web attacks are extremely

More information

Multifaceted Approach to Understanding the Botnet Phenomenon

Multifaceted Approach to Understanding the Botnet Phenomenon Multifaceted Approach to Understanding the Botnet Phenomenon Christos P. Margiolas University of Crete A brief presentation for the paper: Multifaceted Approach to Understanding the Botnet Phenomenon Basic

More information

Endpoint Security and the Case For Automated Sandboxing

Endpoint Security and the Case For Automated Sandboxing WHITE PAPER Endpoint Security and the Case For Automated Sandboxing https://enterprise.comodo.com A World of Constant Threat We live in a world of constant threat. Hackers around the globe work every hour

More information

Anti-exploit tools: The next wave of enterprise security

Anti-exploit tools: The next wave of enterprise security Anti-exploit tools: The next wave of enterprise security Intro From malware and ransomware to increasingly common state-sponsored attacks, organizations across industries are struggling to stay ahead of

More information

GlobalSign Malware Monitoring

GlobalSign Malware Monitoring GLOBALSIGN WHITE PAPER GlobalSign Malware Monitoring Protecting your website from distributing hidden malware GLOBALSIGN WHITE PAPER www.globalsign.com CONTENTS Introduction... 2 Malware Monitoring...

More information

white paper Malware Security and the Bottom Line

white paper Malware Security and the Bottom Line Malware Security Report: Protecting Your BusineSS, Customers, and the Bottom Line Contents 1 Malware is crawling onto web sites everywhere 1 What is Malware? 2 The anatomy of Malware attacks 3 The Malware

More information

From Georgia, with Love Win32/Georbot. Is someone trying to spy on Georgians?

From Georgia, with Love Win32/Georbot. Is someone trying to spy on Georgians? From Georgia, with Love Win32/Georbot Is someone trying to spy on Georgians? At the beginning of the year, a curious piece of malware came to our attention. An analyst in our virus laboratory noticed that

More information

Ten Tips to Avoid Viruses and Spyware

Ten Tips to Avoid Viruses and Spyware Ten Tips to Avoid Viruses and Spyware By James Wilson, CPA (480) 839-4900 ~ JamesW@hhcpa.com Oh, the deck is stacked. Don t think for a minute it s not. As a technology professional responsible for securing

More information

Types of cyber-attacks. And how to prevent them

Types of cyber-attacks. And how to prevent them Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual

More information

F-Secure Internet Security 2012

F-Secure Internet Security 2012 F-Secure Internet Security 2012 F-Secure Internet Security 2012 TOC 3 Contents Chapter 1: Getting started...7 How to use automatic updates...8 Check the update status...8 Change the Internet connection

More information

Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com

Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com Cybercrime: evoluzione del malware e degli attacchi Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com About Palo Alto Networks We are the network security company World-class

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Malware Analysis Quiz 6

Malware Analysis Quiz 6 Malware Analysis Quiz 6 1. Are these files packed? If so, which packer? The file is not packed, as running the command strings shelll reveals a number of interesting character sequences, such as: irc.ircnet.net

More information

The Case for Network-based Malware Detection The need for an additional layer of protection

The Case for Network-based Malware Detection The need for an additional layer of protection The Case for Network-based Malware Detection The need for an additional layer of protection Strategic White Paper Client-based anti-malware software is important in any approach to Internet security. Unfortunately,

More information

THE HOME LOAN SAVINGS BANK. Corporate Account Takeover & Information Security Awareness

THE HOME LOAN SAVINGS BANK. Corporate Account Takeover & Information Security Awareness THE HOME LOAN SAVINGS BANK Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation is

More information

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have

More information

Exploring the Black Hole Exploit Kit

Exploring the Black Hole Exploit Kit Exploring the Black Hole Exploit Kit Updated December 20, 2011 Internet Identity Threat Intelligence Department http://www.internetidentity.com http://www.internetidentity.com 12/29/11 Page 1/20 Summary

More information

Analysis of advanced issues in mobile security in android operating system

Analysis of advanced issues in mobile security in android operating system Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of

More information

CYBERTRON NETWORK SOLUTIONS

CYBERTRON NETWORK SOLUTIONS CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified

More information

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network

More information

ENEE 757 CMSC 818V. Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park

ENEE 757 CMSC 818V. Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park 21. Botnets ENEE 757 CMSC 818V Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park http://ter.ps/757 https://www.facebook.com/sdsatumd Today s Lecture Where we ve been AuthenDcaDon

More information

ETHICAL HACKING CYBER SECURITY

ETHICAL HACKING CYBER SECURITY ETHICAL HACKING & CYBER SECURITY (Winter Training Program 2013-14) PRESENTED BY In association with Magniva Technology Pvt. Ltd. Office: 217, Murli Bhawan, 10A Ashok Marg, Hazratganj, Lucknow, (U.P.) Email:

More information

The Increasing Threat of Malware for Android Devices. 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them

The Increasing Threat of Malware for Android Devices. 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them The Increasing Threat of Malware for Android Devices 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them INTRODUCTION If you own a smartphone running the Android operating system, like the

More information

Spyware Doctor Enterprise Technical Data Sheet

Spyware Doctor Enterprise Technical Data Sheet Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware

More information

AVeS Cloud Security powered by SYMANTEC TM

AVeS Cloud Security powered by SYMANTEC TM Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting

More information

Firewalls and Software Updates

Firewalls and Software Updates Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General

More information

LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains

LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way

More information

CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP

CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP August 2014 RSA agents recently traced a threat actor advertising a mobile credit card store application. The cybercriminal shared the information

More information