Today s New Breed of -based Cyber Attacks and What it Takes to Defend Against Them
|
|
|
- Randall Brooks
- 10 years ago
- Views:
Transcription
1 Spear Phishing: A Common Launch Point of Advanced Attacks Combatting the New Breed of Cyber Attacks: The Key Requirements Security Focus Shifts to Address the Risks of Targeted Attacks and Data Loss About FireEye Today s New Breed of -based Cyber Attacks and What it Takes to Defend Against Them Overview More often than not, businesses are being targeted by today s new breed of cyber attacks. In fact, during the time it takes you to read this newsletter, odds are that your organization will have been targeted by a cyber attack. Today s new breed of cyber attacks routinely circumvent firewalls, intrusion prevention systems (IPS), anti-virus (AV), and other defenses and enable cybercriminals to achieve their goals, whether they are looking to make financial gains, steal intellectual property, or further nation-state objectives. Traditional defenses are not working because today s attacks are Dynamic. Today s sophisticated attackers can quickly morph their attacks so they are new, never-been-seen-before attacks, causing them to go undetected by legacy signature-based security solutions. Targeted. Advanced attacks are sent only to the specific industries, companies, and individuals being targeted. By avoiding the noise of larger, scatter-shot campaigns, these highly targeted attacks can stay under the radar and go undetected by anti-virus and spam detection mechanisms. Multi-faceted. Many attacks combine Web and tactics in multiple stages so evade Web-only and -only defenses, which focus on just one stage of an advanced attack. But a single cyber attack may be comprised of sophisticated malware that exploits a zero-day vulnerability, a spear phishing , malicious websites appearing on dynamic URLs, and a complex network of command servers for controlling compromised devices and stealing targeted assets. Source: FireEye Featuring research from
2 2 Spear Phishing: A Common Launch Point of Advanced Attacks The new breed of cyber attacks has combined a range of different tactics, but it is clear that there is one very common characteristic: spear phishing is the primary channel through which the attacks are initiated. Operation Aurora, GhostNet, Night Dragon, the RSA breach, and the majority of the other attacks that have been publicly documented have been initiated at least in part through targeted spear phishing s. Spear phishing attacks often combine such tactics as victim segmentation, personalization, sender impersonation, and other techniques to bypass filters and trick targets into clicking a link or opening an attachment. By mining social networks, for example, the personalization and impersonation used in spear phishing s can be extremely accurate and compelling to the recipient. Understanding the tactics and characteristics of these spear phishing attacks is vital as security teams seek to establish effective defenses. FireEye researchers have discovered the following in analyzing spear phishing activities. Most Common File Names Often, attackers attach malicious files to spear phishing s. To lure unsuspecting users into opening these files and initiating the malicious code, attackers typically use file names with common business terms. The terms used tend to fall into three general categories: shipping and delivery, finance, and general business (see Figure 1 for the top five terms). Figure 1: Top 5 malicious attachment names used in spear phishing attacks 1 Rank File Name 1 Details.zip 2 UPS_document.zip 3 DCIM.zip 4 HP_Document.zip 5 Report.zip Top Words in Malicious Attachments Figure 2 outlines the top five terms that show up in malicious attachment file names. Similar to the top terms used in attachment names, these terms relate to shipping. Figure 2: Top 5 terms that show up in malicious attachment file names 1 Rank Word 1 ups 2 details 3 document 4 fedex 5 myups Malicious Attachment Extensions In evaluating file attachment extensions, it quickly becomes obvious that.zip files are currently the most common malware file type employed. This is because organizations typically do not block these file extensions, and attackers understand this. Further and more critically, attackers understand that, by embedding malicious payloads within.zip files, this code will go undetected by scanners. Malicious URLs in s Cybercriminals are increasingly employing malicious URLs for only a brief period of time before they move on to using new URLs. Throwaway domains are malicious domain names used only a handful of times, in approximately 10 or fewer spear phishing s. These domains are so infrequently used that they fly under the radar of URL blacklists and reputation analysis and remain largely ignored and unknown. 1 FireEye Advanced Threat Report 2H 2012 Source: FireEye
3 3 Combatting the New Breed of Cyber Attacks: The Key Requirements Today, organizations need a next-generation threat protection platform, one that detects and blocks the new breed of attacks. Organizations need an integrated, correlated view of all the potential attack vectors that spear phishers may use. This includes real-time, comprehensive views of the following threat vectors: . Spear phishing s represent one of the most common approaches for launching an advanced attack. Guarding against these types of threats requires real-time analysis of URLs in s, attachments, and Web objects to determine whether they are malicious. Web. Browser-based threats and malicious communications can take many forms and move across a range of protocols, including FTP, HTTP, and IRC. Websites and communications need to be tracked in real time, across these different protocols to thwart advanced attacks. Files. Even if Web and channels are secured, malicious files can still make it into a corporate network in any number of ways, whether through a USB drive, a mobile device, download from a cloud service, or a host of other means. Intelligence from across these threat vectors needs to be correlated to be truly effective. In order to guard against sophisticated spear phishing attacks, security teams need capabilities for discovering a Web-based attack in real time, tracing it to the initial that spawned the attack, and then doing the analysis required to determine if others within the organization have been targeted. How FireEye Delivers Effective Defense Against Advanced Attacks According to Gartner, the greater level of danger posed by targeted phishing attacks is shifting the focus of advanced security solutions within enterprises 2. The FireEye platform supplements traditional defenses with a new model of security to protect against today s new breed of cyber attacks. The unique FireEye platform provides the only nextgeneration threat protection that dynamically identifies and blocks cyber attacks in real time. Utilizing a signature-less, virtual execution engine that creates enterprise-specific threat intelligence across vectors, the FireEye platform secures against Web, , and file attacks. By detonating Web objects, and suspicious attachments within virtual environments, the FireEye platform is uniquely equipped to detect zero-day Web exploits, spear phishing attacks, and malware resident on file shares. By correlating multi-vector threat intelligence, this enables the FireEye platform to quarantine zero-day spear phishing s, block related multi-protocol command and control communications, and identify the intended victims. The FireEye Threat Protection Platform The FireEye platform secures against spear phishing attacks that bypass anti-spam and reputation-based technologies. To quarantine the spear phishing s used in advanced targeted attacks, the FireEye platform analyzes every attachment using a signature-less, Multi-Vector Virtual Execution (MVX) engine that can quickly and accurately identify zero-day attacks. It goes beyond signature and reputation-based systems by detonating each attachment against a crossmatrix of operating systems and applications, including multiple Web browsers and plug-ins. Administrators can quarantine s with malicious content for further analysis or deletion. In the research that follows, Gartner provides insight into targeted attacks and data loss prevention 2. FireEye believes that our research and the history of how cyber attacks have become more and more advanced, makes it clear that legacy security solutions need to be supplemented with next-generation threat protection to effectively protect intellectual property, sensitive information, and the integrity of business operations. Source: FireEye 2 Gartner Research, Security Focus Shifts to Address the Risks of Targeted Attacks and Data Loss, Peter Firstbrook, August 29, 2012
4 4 Research from Gartner Security Focus Shifts to Address the Risks of Targeted Attacks and Data Loss is still the most commonly used channel for corporate communications. As a result, it has become a conduit of targeted attacks and a potential source of data loss. Impacts The greater level of danger posed by targeted phishing attacks is shifting the focus of advanced security solutions within enterprises. The wide variety and quality of data loss prevention solutions and use cases require administrators to plan carefully. administrators are increasingly required to provide encryption to meet corporate and regulatory compliance standards. Recommendations Larger organizations and those that are often targeted should look for products that provide techniques to detect highly targeted phishing. Ideally, solutions will include malicious attachment and Web redirection techniques, and provide advanced reporting and forensic information. Currently, however, no solutions do it all. administrators should make an effort to understand business requirements for DLP over the next three years, and evaluate vendors and solutions accordingly. Employing an isolated SEG DLP solution is acceptable for a number of use cases; however, when IP protection is the primary requirement, an enterprise DLP solution is preferred. Organizations not yet using encryption should start collecting business requirements and plan deployments within the next 24 months. They should also consider encryptioncritical criteria when selecting an SEG solution. Incumbent SEG vendors offer opportunities to simplify encryption deployments, but only if the encryption solution meets business requirements and is well-integrated. Strategic Planning Assumption Enterprise use of encryption and data loss prevention will grow from 30% in 2012 to more than 60% of enterprises by 2015 and, thus, become a standard of due care for protecting private information. Analysis Despite the growth in other communications channels, remains the foundation of corporate communications. The prevailing use of has made it a preferred conduit of targeted attacks and a significant, potential source of data loss or compliance issues. Secure gateways (SEGs) have become adept at defending against typical spam and virus attacks, at the same time that spam volumes are declining. While there is still work to do to improve spam detection accuracy and clean up irritating bulk , administrators should be turning their attention to more difficult-to-detect inbound targeted attacks, which are on the rise. 1 IT organizations are becoming increasingly aware of the business risk of careless data handling with each new regulation and data breach. is the easiest way to exchange files and data with colleagues and partners. Unrestricted usage can result in careless storage and transmission of sensitive information. Data loss prevention (DLP) techniques are the primary mechanism to prevent the misuse of sensitive information; thus, it is emerging as a critical requirement of security systems. However, eliminating all sensitive data from is impractical for most organizations; therefore, encryption is a necessary function. The greater level of danger posed by targeted phishing attacks is shifting the focus of advanced security solutions within enterprises Some of the leading SEG solutions (for example, Cisco, Symantec and Proofpoint are starting to focus on the very difficult problem of detecting targeted phishing messages, which are used to
5 5 FIGURE 1 Impacts and Top Recommendations for Security Impacts The danger posed by targeted attacks is shifting the focus of security solutions. The variety and quality of DLP solutions and use cases require administrators to plan carefully. The requirement to provide encryption to meet compliance is increasing. Top Recommendations Targeted organizations should look for products that provide techniques to detect targeted phishing. Ideally, solutions will include malicious attachment and Web redirection techniques. Understand business requirements for DLP over the next three years, and evaluate vendors and solutions according to needs. Organizations not yet using encryption should consider deployments within the next 24 months, and start collecting business requirements. Gartner (August 2012) initiate targeted attacks. 2 These attacks are also called spear phishing. These messages are difficult to detect because they look like any other person-to-person s. Targeted attacks typically use two methods to infect their target s endpoint: malicious attachments, which contain the initial exploit, or Web redirection, which lures the reader to a malicious website. In 2011, approximately 60% of malicious s used attachments, while 40% used Web redirection. 3 These attacks are usually aimed only at high-value employees (such as C-level executives and privileged administrators), and often are researched using content from LinkedIn, Facebook and other public information to tailor the spear phish method. Malicious Attachments Most organizations already block or quarantine executable attachments, 4 so attackers now use document-type attachments that have high business use and are difficult to block by policy. Currently, the most common malicious attachment types 3 are PDF, zip/rar, Office documents and RTF. These files typically exploit vulnerabilities in the reader application (that is, Adobe Reader or Word), exploit the powerful scripting capabilities within the reader, or are used as containers to camouflage the malicious executable files (that is, password-protected zip files). Approaches to detecting advanced targeted attachment malware can be categorized in two buckets: 1 Static code analysis: Reading the file to detect and remove suspicious commands or code blocks. Most vendors do at least some level of static analysis, making it difficult to validate the marketing claims without testing. 2 Dynamic code analyses: Executing the code in a sandbox environment to detect malicious behavior. Examples of vendors include FireEye, Trend Micro and AhnLab. To detect malicious code in containers such as zip and RAR files, gateways should be capable of unzipping files. Although attackers often make it difficult to automatically unpack files, desktop-to-desktop encryption utilities can also make unpacking impossible for gateways. Organizations need to set policies for handling packed files that cannot be opened by the gateway. One approach is to deliver these messages to the recipient s inbox with an append to the subject line that includes a warning and, depending on the end user, caution and endpoint protection. Higher-security organizations should quarantine the file for inspection by an administrator on an isolated machine; however, this increases the administration effort and requires experienced security operators.
6 6 Web Redirection Most SEG solutions detect URLs in and perform checks against a list of known bad URLs in an onboard database, or perform a real-time lookup with a cloud database. Some solutions (such as Cisco or Trend Micro) also use a reputation score to detect URLs that are not currently malicious, but are suspected to become malicious in the future. The weakness in these approaches is the dynamic nature of the current threat. The URL can point to good content at the time of delivery, but change postdelivery to the recipient s inbox. More-advanced solutions (such as Cisco and Proofpoint) are starting to rewrite suspect URLs with a custom URL that points to the SEG provider. At the time when the URL is clicked, the SEG solution will perform a final inspection of the website to detect malicious activity, and, if none is found, provide the client with a URL redirect to the original site. It is important to make a distinction between solutions that simply check the database one more time and those that actually check the website for new signs of malicious activity. Some solutions (such as Cisco) will remain in-path and inspect the Web content as it is delivered to the end user using their cloudbased secure Web gateways to detect malware in transit to the client. Generic SWGs can also protect users from malicious websites, regardless of how the user is redirected to the website, and are an important component of a layered approach. However, SWGs typically do not correlate the Web click with a particular , nor are they often under the management of the same team as the gateway. We expect to see leading SEG solutions provide more reporting and forensic information about targeted phishing attacks for security incident response teams. Recommendation: Larger organizations and those that are often targeted should look for products that provide techniques to detect highly targeted phishing. Ideally, solutions will include malicious attachment and Web redirection techniques, and provide advanced reporting and forensic information. Currently, however, no solutions do it all. The wide variety and quality of data loss prevention solutions and use cases require administrators to plan carefully In our 2012 reference customer survey, 5 75% of respondents said that DLP was an important or very important critical capability of an SEG, 31% were actively using DLP capabilities, and another 35% had plans for DLP in the next 24 months. DLP is critical for: 1 Regulatory and industry compliance 2 Keeping users from storing intellectual property (IP) or regulated data in the system 3 Acceptable usage monitoring 4 Enabling automatic encryption of sensitive data 5 Protecting IP from accidental loss Although it is not optimal, the SEG DLP capability can be implemented independently of enterprise DLP for the four use cases listed above. For IP protection, however, buyers of SEG DLP must understand how it will fit into an enterprise data management strategy. No SEG DLP solutions integrate easily with an enterprise DLP solution from other vendors. However, some allow for integration with the vendor s enterprise DLP. Most SEG solutions are poor at managing the workflow for compliance officers, allowing policy objects to be reused and allowing for extensible notification s that include dynamic information, such as the type of violation or event or the actual offending text. Recommendation: administrators should make an effort to understand business requirements for DLP over the next three years, and evaluate vendors and solutions accordingly. Employing an isolated SEG DLP solution is acceptable for a number of use cases; however, when IP protection is the primary requirement, an enterprise DLP solution is preferred.
7 7 administrators are increasingly required to provide encryption to meet corporate and regulatory compliance standards In our 2012 reference customer survey, 5 65% of respondents said that advanced encryption was an important or very important critical capability of an SEG, 34% already used encryption, and 32% had plans for encryption in the next 24 months. systems are not designed as secure repositories of critical information, and organizations should strive to keep sensitive information out of storage; however, the utility of to business means that sensitive information will find its way in regardless of policy. The deployment of DLP systems will usually result in the immediate deployment of encryption. Very few organizations will find no sensitive information in s once they start looking, and it is rarely an option to simply reject these s. The encryption requirements for business-tobusiness and business-to-consumer (B2C) will differ, however. Most encryption vendors offer solutions that work with both use cases, and it should be a design goal to acquire a single solution for both use cases. The majority of SEG solutions provide encryption via a partner (such as ZixCorp, Voltage Security or Echoworx). These dedicated encryption partners often provide very extensive and mature encryption capabilities; however, access to the full management capabilities of the encryption solution is often lacking. As a result, setup monitoring and changes often require calls to vendor support rather than self-service. Native solutions that are integrated with the management console by the SEG vendor are preferred due to lower administration complexity, integrated tracing, lower cost and simpler routing. However, these solutions may not be as robust as the dedicated partnership solution. We recommend that encryption buyers consider their incumbent SEG provider as a leading shortlist candidate, but acknowledge that buying directly from dedicated vendors may be a better choice for advanced needs. Critical considerations for encryption include content versus transport encryption, the need for recipient clients, certificate management and integration with existing directories, and the experience for the recipient and sender using mobile devices. IT organizations and administrators should also recognize potential operational problems with encryption and educate the business on steps to mitigate the impact of these issues. encryption sometimes requires endpoints to have a specific type of client reader or browser. Any time a new client component is required, it increases recipients level of frustration and the amount of support required. This is especially true for B2C requirements. Encrypted s often look phishy to recipients and, as a result, are not opened. Whenever implementing a new encryption solution or changing an existing solution, send notifications and prepare post education/instructional resources for recipients ahead of the changes. Also prepare help desk resources to resolve issues arising from encryption. Advertise and maintain a consistent look and feel of encrypted messages so that recipients understand what they are. Encrypted can also end up in spam quarantines. Avoid marketing messages within encrypted messages, because these may trigger spam filtering. Recipients generally are not inclined to take multiple steps to read encrypted unless it is something they are really interested in. Avoid multistep processes and use encryption only when the added inconvenience to the recipient is justified. Encrypted that creates yet another password for recipients to remember will require self-service password reset mechanisms. For most use cases, passwords should not be required, because authentication to the inbox may be sufficient identification. Where passwords are required, they should ideally be synchronized with other usernames and password systems, such as a website authentication directory, and set up selfservice password recovery schemes.
8 8 Recommendation: Organizations not yet using encryption should start collecting business requirements and plan deployments within the next 24 months. They should also consider encryptioncritical criteria when selecting an SEG solution. Incumbent SEG vendors offer opportunities to simplify encryption deployments, but only if the encryption solution meets business requirements and is well-integrated. Do not ignore the potential operational challenges and recipient experience associated with encrypted , and prepare to mitigate these. Evidence 1 From the June 2012 Symantec Intelligence Report. During the first half of the year, the total number of daily targeted attacks continued to increase at a minimum rate of 24%. 2 Verizon s 2012 Data Breach Investigations Report found that was used in 17% of social engineering attacks, but quite a bit higher, however, when examining breaches affecting larger organizations. 3 Internet Security Threat Report, Volume 17 4 Microsoft TechNet advice regarding attachment types to block. 5 In May 2012, Gartner conducted an online survey of 111 vendor-supplied reference customers. Gartner RAS Core Research Note G , John Pescatore 5 August 2011
9 9 About FireEye FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors, including Web, , and files and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 1,000 customers across more than 40 countries, including over one-third of the Fortune 100. For more information, visit: 4 Gartner Research Security Focus Shifts to Address the Risks of Targeted Attacks and Data Loss, Peter Firstbrook, August 29, 2012 Today s New Breed of -based Cyber Attacks and What it Takes to Defend Against Them is published by FireEye. Editorial supplied by FireEye is independent of Gartner analysis. All Gartner research is 2013 by Gartner, Inc. All rights reserved. All Gartner materials are used with Gartner s permission. The use or publication of Gartner research does not indicate Gartner s endorsement of FireEye s products and/or strategies. Reproduction or distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner s Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see Guiding Principles on Independence and Objectivity on its website,
SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal
WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise
Spear Phishing Attacks Why They are Successful and How to Stop Them
White Paper Spear Phishing Attacks Why They are Successful and How to Stop Them Combating the Attack of Choice for Cybercriminals White Paper Contents Executive Summary 3 Introduction: The Rise of Spear
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
White Paper. Advantage FireEye. Debunking the Myth of Sandbox Security
White Paper Advantage FireEye Debunking the Myth of Sandbox Security White Paper Contents The Myth of Sandbox Security 3 Commercial sandbox evasion 3 Lack of multi-flow analysis and exploit detection 3
White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks
White Paper Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks White Paper Executive Summary Around the world, organizations are investing massive amounts of their budgets
Securing Cloud-Based Email
White Paper Securing Cloud-Based Email A Guide for Government Agencies White Paper Contents Executive Summary 3 Introduction 3 The Risks Posed to Agencies Running Email in the Cloud 4 How FireEye Secures
Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks
White Paper Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks A Guide for CIOs, CFOs, and CISOs White Paper Contents The Problem 3 Why You Should Care 4 What You Can Do About It
Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth
Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference
Symantec Advanced Threat Protection: Network
Symantec Advanced Threat Protection: Network DR150218C April 2015 Miercom www.miercom.com Contents 1.0 Executive Summary... 3 2.0 Overview... 4 2.1 Products Tested... 4 2.2. Malware Samples... 5 3.0 How
SPEAR-PHISHING ATTACKS
SPEAR-PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM WHITE PAPER RECENTLY, THERE HAS BEEN A RAPID AND DRAMATIC SHIFT FROM BROAD SPAM ATTACKS TO TARGETED EMAIL-BASED-PHISHING CAMPAIGNS THAT
Content Security: Protect Your Network with Five Must-Haves
White Paper Content Security: Protect Your Network with Five Must-Haves What You Will Learn The continually evolving threat landscape is what makes the discovery of threats more relevant than defense as
Advanced Persistent Threats
White Paper INTRODUCTION Although most business leaders and IT managers believe their security technologies adequately defend against low-level threats, instances of (APTs) have increased. APTs, which
Defending Against. Phishing Attacks
Defending Against Today s Targeted Phishing Attacks DeFending Against today s targeted phishing attacks 2 Introduction Is this email a phish or is it legitimate? That s the question that employees and
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
Advanced Targeted Attacks
White Paper Advanced Targeted Attacks How to Protect Against the Next Generation of Cyber Attacks White Paper Contents Executive Summary 3 Nature of Next-Generation Threats 4 The Price of The Problem 6
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
The Ostrich Effect In Search Of A Realistic Model For Cybersecurity
The Ostrich Effect In Search Of A Realistic Model For Cybersecurity 1 Contents Introduction 3 Threats Stealthy, Sophisticated & Successful 4 Operation Beebus 5 G20 Brisbane 2014 6 Redefining the Debate
ENABLING FAST RESPONSES THREAT MONITORING
ENABLING FAST RESPONSES TO Security INCIDENTS WITH THREAT MONITORING Executive Summary As threats evolve and the effectiveness of signaturebased web security declines, IT departments need to play a bigger,
Anti-Phishing Best Practices for ISPs and Mailbox Providers
Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing
SPEAR PHISHING AN ENTRY POINT FOR APTS
SPEAR PHISHING AN ENTRY POINT FOR APTS threattracksecurity.com 2015 ThreatTrack, Inc. All rights reserved worldwide. INTRODUCTION A number of industry and vendor studies support the fact that spear phishing
The Cyber Threat Landscape
The Cyber Threat Landscape Oliver Rochford Research Director Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without
WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW
WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW Challenge The nature of email threats has changed over the past few years. Gone are the days when email security, better known as anti-spam, was primarily tasked
Unified Security, ATP and more
SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users
Managing Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
CISO Guide to Next Generation Threats
White Paper CISO Guide to Next Generation Threats Combating Advanced Malware, Zero-Day and Targeted APT Attacks White Paper Table of Contents Introduction The Moving Target: From PII to IP to Credentials
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES
WEB PROTECTION Features SECURITY OF INFORMATION TECHNOLOGIES The web today has become an indispensable tool for running a business, and is as such a favorite attack vector for hackers. Injecting malicious
Finding Email Security in the Cloud
WHITE PAPER: FINDING EMAIL SECURITY IN THE CLOUD Finding Email Security in the Cloud CONTENTS Introduction 3 I. Why Good Enough Security is Never Good Enough 3 Mind your security gaps 4 II. Symantec Email
Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond
Trend Micro Cloud App Security for Office 365 October 27, 2015 Trevor Richmond Too many malware incidents >90% Targeted Attacks Start with Email Attackers: Target specific companies or individuals Research
REVOLUTIONIZING ADVANCED THREAT PROTECTION
REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my
Anti-exploit tools: The next wave of enterprise security
Anti-exploit tools: The next wave of enterprise security Intro From malware and ransomware to increasingly common state-sponsored attacks, organizations across industries are struggling to stay ahead of
Securing Office 365 with Symantec
January, 2016 Solution Overview: Enterprise Security Adoption of Microsoft Office 365, Google Apps, and other cloud-based productivity solutions is growing. Microsoft in its Ignite 2015 session claimed
Cisco Advanced Malware Protection
Solution Overview Cisco Advanced Malware Protection Breach Prevention, Detection, Response, and Remediation for the Real World BENEFITS Gain unmatched global threat intelligence to strengthen front-line
isheriff CLOUD SECURITY
isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console
WHITE PAPER ADVANCED TARGETED ATTACKS: How to Protect Against the New Generation of Cyber Attacks SECURITY REIMAGINED
WHITE PAPER ADVANCED TARGETED ATTACKS: How to Protect Against the New Generation of Cyber Attacks SECURITY REIMAGINED CONTENTS Executive Summary...3 Nature of the New Generation of Threats...4 The Five
How To Prevent Hacker Attacks With Network Behavior Analysis
E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION How ThreatBLADES add real-time threat scanning and alerting to the Analytics Platform INTRODUCTION: analytics solutions have become an essential weapon
Practical Threat Intelligence. with Bromium LAVA
Practical Threat Intelligence with Bromium LAVA Practical Threat Intelligence Executive Summary Threat intelligence today is costly and time consuming and does not always result in a reduction of successful
AVG AntiVirus. How does this benefit you?
AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Organizations Must Employ Effective Data Security Strategies
Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security
Perspectives on Cybersecurity in Healthcare June 2015
SPONSORED BY Perspectives on Cybersecurity in Healthcare June 2015 Workgroup for Electronic Data Interchange 1984 Isaac Newton Square, Suite 304, Reston, VA. 20190 T: 202-618-8792/F: 202-684-7794 Copyright
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading
ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper
ADVANCED THREATS IN THE ENTERPRISE Finding an Evil in the Haystack with RSA ECAT White Paper With thousands of workstations and servers under management, most enterprises have no way to effectively make
INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe
INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
Email Migration Project Plan for Cisco Cloud Email Security
Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f
The Advanced Cyber Attack Landscape
The Advanced Cyber Attack Landscape FireEye, Inc. The Advanced Cyber Attack Landscape 1 Contents Executive Summary 3 Introduction 4 The Data Source for this Report 5 Finding 1 5 Malware has become a multinational
Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education
White Paper Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education Online criminals are constantly looking for new ways to reach their targets
Email Correlation and Phishing
A Trend Micro Research Paper Email Correlation and Phishing How Big Data Analytics Identifies Malicious Messages RungChi Chen Contents Introduction... 3 Phishing in 2013... 3 The State of Email Authentication...
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor
Why Device Fingerprinting Provides Better Network Security than IP Blocking How to transform the economics of hacking in your favor Why Device Fingerprinting Provides Better Network Security than IP Blocking
Carbon Black and Palo Alto Networks
Carbon Black and Palo Alto Networks Bring Together Next-Generation Endpoint and Network Security Solutions Endpoints and Servers in the Crosshairs of According to a 2013 study, 70 percent of businesses
TRITON APX. Websense TRITON APX
TRITON APX Unified protection and intelligence against Advanced Threats and data theft Your organization is faced with an increasing number of Advanced Threats that lead to data theft, denial of service
By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION
THE NEXT (FRONT) TIER IN SECURITY When conventional security falls short, breach detection systems and other tier 2 technologies can bolster your network s defenses. By John Pirc THREAT HAS moved beyond
IBM Security re-defines enterprise endpoint protection against advanced malware
IBM Security re-defines enterprise endpoint protection against advanced malware Break the cyber attack chain to stop advanced persistent threats and targeted attacks Highlights IBM Security Trusteer Apex
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
Integrating MSS, SEP and NGFW to catch targeted APTs
#SymVisionEmea #SymVisionEmea Integrating MSS, SEP and NGFW to catch targeted APTs Tom Davison Information Security Practice Manager, UK&I Antonio Forzieri EMEA Solution Lead, Cyber Security 2 Information
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
When less is more (Spear-Phishing and Other Methods to Steal Data) Alexander Raczyński
When less is more (Spear-Phishing and Other Methods to Steal Data) Alexander Raczyński 1 Agenda Spear-Fishing the new CEO Fear How to Fight Spear-Fishing It s All About the Data Evolution of the bad guys
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3
Modular Network Security. Tyler Carter, McAfee Network Security
Modular Network Security Tyler Carter, McAfee Network Security Surviving Today s IT Challenges DDos BOTS PCI SOX / J-SOX Data Exfiltration Shady RAT Malware Microsoft Patches Web Attacks No Single Solution
Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?
A Cloud Security Primer : WHAT ARE YOU OVERLOOKING? LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and should not be construed
Threat Center. Real-time multi-level threat detection, analysis, and automated remediation
Threat Center Real-time multi-level threat detection, analysis, and automated remediation Description Advanced targeted and persistent threats can easily evade standard security, software vulnerabilities
WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013
Security Architecture: From Start to Sustainment Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013 Security Architecture Topics Introduction Reverse Engineering the Threat Operational
Technology Blueprint. Protect Your Email. Get strong security despite increasing email volumes, threats, and green requirements
Technology Blueprint Protect Your Email Get strong security despite increasing email volumes, threats, and green requirements LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
Web 2.0 and Data Protection. Paul Tsang Security Consultant McAfee
Web 2.0 and Data Protection Paul Tsang Security Consultant McAfee Criminal Motivators For Profit Targeted Attacks Cyber Warfare (Credit Cards, PII, Criminal Infrastructure) (Nation-State Secrets, Trade
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
Mimecast Email Security
DATA SHEET Mimecast Email Security A fully integrated email security, continuity and archiving cloud based solution that delivers total end-to-end control of your email, mitigating email risks and reducing
Cisco Cyber Threat Defense Solution: Delivering Visibility into Stealthy, Advanced Network Threats
Solution Overview Cisco Cyber Threat Defense Solution: Delivering Visibility into Stealthy, Advanced Network Threats What You Will Learn The network security threat landscape is ever-evolving. But always
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
V1.4. Spambrella Email Continuity SaaS. August 2
V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Symantec Protection Suite Add-On for Hosted Email and Web Security
Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication
Stop Spam. Save Time.
Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
IBM Security Strategy
IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration
Proxy Blocking: Preventing Tunnels Around Your Web Filter. Information Paper August 2009
Proxy Blocking: Preventing Tunnels Around Your Web Filter Information Paper August 2009 Table of Contents Introduction... 3 What Are Proxies?... 3 Web Proxies... 3 CGI Proxies... 4 The Lightspeed Proxy
