How To Protect Yourself From A Web Attack
|
|
|
- Eunice Newman
- 5 years ago
- Views:
Transcription
1 Five Stages of a Web Malware Attack A guide to web attacks plus technology, tools and tactics for effective protection By Chris McCormack, Senior Product Marketing Manager Today s web attacks are extremely sophisticated and multi-faceted, motivated by a massive underground economy that trades in compromised computers and user information. This paper shows you how modern web attacks work, broken down into five stages, from entry through execution. We ll explain the advanced techniques hackers use to infect web users and steal data or money, and how most web security products are failing. Most importantly, we ll give you insight into the layers of protection you need, and a checklist for evaluating your policies and the security capabilities of your web protection solution.
2 Contents Web Malware by the Numbers...3 How a Web Attack Works The Five Stages...4 Stage 1: Entry...5 Stage 2: Traffic Distribution Stage 3: Exploit...8 Stage 4: Infection...11 Stage 5: Execution...12 Sophos Web Protection...15 A Sophos Whitepaper November
3 Web Malware by the Numbers The web is a dangerous place. SophosLabs sees an average of 30,000 new malicious URLs every day, and 80% of them are compromised, legitimate websites. Eighty-five percent of all malware, including viruses, worms, spyware, adware and Trojans, comes from the web. Further, the opportunities for criminal hackers are growing at an astounding rate. Consider how big the web is and how many people use it daily. There are more than 2.7 billion users on the web each day, conducting 3 billion search queries. 1 There are roughly 700 million websites, a number that grows about 10% per year. Even if you haven t encountered a web threat or malicious site lately, it s happening to millions of web users every day, spreading the infection. In fact, according to Google s Transparency Report, 2 the number of sites deemed dangerous by Safe Browsing is consistently in the hundreds of thousands per week. Number of sites deemed dangerous by Safe Browsing Phishing sites Malware sites 600, , ,000 0 Figure 1: Number of users seeing warnings each week from Google Safe Browsing. Source: Google Transparency Report. 1 Infographic: The Incredible Growth of Web Usage [ ], WhoIsHostingThis, August 21, 2013, 2 Google Transparency Report A Sophos Whitepaper November
4 How a Web Attack Works The Five Stages This section shows you how modern web attacks work, broken down into five stages: entry, traffic distribution, exploit, infection and execution. Entry Point 1 You access a hijacked website. Malware downloads silently and you don t notice that you re being infected. 82% of malicious sites are hacked legitimate sites. 4,878 malware distribution agents per attack (on average) The initial malware redirects to an exploit server using fast-flux techniques based on what you re working with (Windows/Mac, IE/ Safari, Java, etc.). Distribution 2 Exploit 3 Commercially available and supported exploit packs will attempt to leverage vulnerabilities in the OS, browser, Java, PDF reader, media player and other plugins. 5,540 new vulnerabilities reported in 2013 Hackers can make $50,000 a day The malware downloads a malicious payload that will steal data or extort money from you. 4Infection Execution 5 Malware calls home with sensitive data like credentials, banking or credit card information, or tricks you into paying directly. Total cost per data breach: $ 5.4 million Figure 2: Infographic of the five stages of a web attack. A Sophos Whitepaper November
5 Stage 1: Entry The first part of an attack involves a drive-by download from an entry point, either a hijacked website or an that contains a malicious link. Drive-by downloads A drive-by download is the process of inadvertently downloading malicious web code simply by visiting a web page. A drive-by download happens automatically and without the user knowing. The most common type of drive-by download is an invisible 0x0 pixel iframe that contains malicious JavaScript code. And this sophisticated JavaScript can be masked by obfuscation (in other words, making them unreadable), as well as polymorphic (meaning, the code changes with each view). Traditional signature-based antivirus solutions can t detect this kind of tricky code. How trusted websites get hijacked Web servers like Apache and IIS, as well as their content management systems, have vulnerabilities. Savvy hackers using website exploit tools can attack these vulnerabilities to inject malicious code into web pages. One popular exploit tool is called Darkleech, a rogue Apache module that allows attackers to dynamically inject malicious iframes into websites hosted on the servers. From October 2012 to July 2013, more than 40,000 websites were infected by Darkleech. 3 Other websites can be taken over through stolen login credentials. Many sites hosted by Wordpress can be compromised using login credentials that are easily guessed or obtained through brute force attacks. Once hackers have the login credentials for your site, they can inject an endless stream of malware. Technology, tools and tactics for effective protection For years people have assumed that most threats lurk in the darker parts of the Internet, such as adult, gambling or hacking sites. If that were true, all we would need to stay protected is a URL filter to block those sites. Unfortunately, the truth is more complicated. When we look at the 10 most-infected website categories, adult sites rank last at just 2%. Categories like blogs, hosting and businesses are far more susceptible to hosting malware. 4 3 Rampant Apache website attack hits visitors with highly malicious software, Ars Technica, July 3, 2013, 4 Surprise! The Most Dangerous Web Sites Aren't Porn Sites, TechNewsDaily, June 4, 2012, A Sophos Whitepaper November
6 Top 10 infected website categories Blogs 20% Web Hosting 16% Business 10% Shopping 8% Education Technology 7% 7% Entertainment Automotive 4% 4% Health 3% Adult 2% 0% 5% 10% 15% 20% Figure 3: Top 10 categories of malicious sites. Source: TechNewsDaily And what s worse, malicious ad campaigns (also known as Malvertising) can have wide reach across a broad range of legitimate sites, further compounding the problem of solving this with URL filtering. So what do you need for effective protection? URL filtering is still important. But a better solution includes live reputation filtering that s updated continuously to catch newly infected sites. In addition, a safe surfing policy is only effective if users aren t able to easily bypass it, so make sure you can block anonymizing proxy abuse. Perhaps the most important technology you need to combat web threats at this layer, and beyond, is advanced web threat protection. You need the latest threat protection that scans all downloaded web page content for malware using advanced technologies like JavaScript emulation, which can detect suspicious or malicious code before it reaches the browser. And you need this not just at your network gateway, but also on your endpoints or in your desktop antivirus to protect offsite users. Also be sure to use a browser that supports Google s Safe Browsing API ( google.com/safe-browsing/) like Chrome, Firefox, or Safari that can identify some malicious sites in search results, giving users a heads-up before they attempt to visit an infected site. Also invest in some safe surfing training with your less computer savvy users to educate them on what to watch for and how to avoid common social engineering tricks and obvious scams in . Last but not least, make sure your site is not contributing to the problem. Use strong passwords for your website CMS or Wordpress blogs. And audit your site s code to find potential vulnerabilities. Protect your site with a web application firewall that can harden forms and stop unwanted attacks. A Sophos Whitepaper November
7 Stage 2: Traffic Distribution Once a drive-by download has reached the browser, the unsuspecting user is redirected to download an exploit kit. However, rather than sending users to known exploit kit hosting sites, elaborate traffic distribution systems (TDS) create multiple redirections that are nearly impossible to track and therefore black-list. Some TDS systems are legitimate, for instance those used for advertising and referral networks. But like any software, legitimate TDS solutions are prone to being hacked and exploited to drive traffic to malware hosting sites instead of a benign destination. Cybercriminals are using one TDS called Sutra to manage traffic from drive-by downloads based on a user s IP geolocation, operating system, browser or other metadata that can boost infection rates. Hackers can buy the latest version of Sutra TDS 3.4 for just $100, with a pay-off of more than a million clicks per hour on a low-end server. Figure 4: Commercial TDS solutions like Sutra are often employed by hackers to keep their malware hosting sites hidden behind a complex traffic distribution infrastructure. A Sophos Whitepaper November
8 What s more, these TDS networks often filter traffic to keep their sites hidden from search engine and security companies. They also use fast-flux networks to cycle thousands of IP addresses through DNS records, preventing their malware hosting sites from being blacklisted. Technology, tools and tactics for effective protection The stealthy nature of TDS makes security at this layer very challenging. It s impossible for the user to prevent a redirection chain since it happens instantly and silently in the background. It s also extremely challenging for most security companies to keep up. It s super important that your selected network security and web filtering solution come from a vendor that understands TDS and is investing in tracking TDS system abuse. For example, given the right resources, it s possible to monitor and track the reputation of DNS registrars to keep one step ahead of hackers, blocking proxies and redirects before they even come online. Stage 3: Exploit The next phase of a modern web attack is the downloading of an exploit pack from the malware hosting site. These kits execute a large number of exploits against vulnerabilities in web browsers and associated plugins such as Java, PDF readers, and media players. Exploit packs Cybercriminals typically purchase exploit packs on the black market, making money for their creators. Since it emerged in late 2010, the Blackhole exploit kit has become one of the most notorious. The Blackhole creators have built a sophisticated business around it selling it as a service for $500 a month. The Blackhole operators even offer a web-based management console and online technical support. A Sophos Whitepaper November
9 Figure 5: A screenshot of the Blackhole dashboard. In this snapshot of the Blackhole dashboard, we can see how the cybercriminals are able to track their infection success rate, the number of sites hosting the malware, the systems affected, and the country location of the infected sites. Once a user s browser has landed on a site hosting the Blackhole exploit kit, it will load files that target vulnerabilities relevant to the victim s computer based on information readily available from the browser. Four types of files are often used to exploit vulnerabilities in the users system: PDF: PDF files with embedded JavaScript attempt to exploit known vulnerabilities in Adobe Reader. Flash: Two types of flash files with specially designed code are often loaded to exploit Adobe Flash Player. Java: JAR files with either JavaScript or applet code are usually the most successful at finding an exploit. HTML/JS/VBS: Runtime code can be downloaded to target a vulnerability in Microsoft Help and Support Center. A Sophos Whitepaper November
10 Of course, as with all other parts of a web attack, the scripts, code and content loaded during the exploit kit phase is heavily obfuscated and polymorphic to evade detection. Java Rhino Unfortunately, Java is a hacker s dream. Billions of devices and browsers come equipped with Java, and it s on every platform. One of the more popular and successful exploits, Java Rhino, is a script engine included with Java that could be exploited to run arbitrary code outside of the Java sandbox. The exploit works on a vast number of clients running Java version 7 and earlier. Despite a patch being available, this is still a very effective exploit. According to Qualys, 80% of enterprise systems are running an outdated, unpatched version of Java. 5 Technology, tools and tactics for effective protection Advanced web malware detection is critical to blocking the exploit code as it s downloaded and before it can attack vulnerabilities. However, the authors of these kits use obfuscation and polymorphism to evade detection from antivirus engines. Effective web malware protection goes beyond signature-based detection, using a combination of URL filtering to block known hosting sites, and threat intelligence that continuously monitors and samples exploit kits to determine detection algorithms. Another essential strategy for reducing the surface area of attack is tightly controlling your users choice of web browsers and applications like PDF readers. By limiting the number and variety of these applications, and keeping those carefully selected applications patched, you can dramatically reduce the number of vulnerabilities exploit kits will take advantage of. It s sad but true 90% of attacks against application vulnerabilities could have been prevented with an existing patch. 6 However, users often forgo patching because it can be a tedious job. Fortunately, there are solutions that can integrate with your desktop security solution to control end-user applications and identify and prioritize security patches. In devising a web client software policy, here are a few key security considerations to keep in mind: Browser: Where possible, stick with a single mainstream browser that supports Google s Safer Browsing API such as Google Chrome, Mozilla Firefox or Apple Safari. Popular browsers invite more exploits but their vendors also have more resources to address vulnerabilities and provide patches more often. Java: Unless you require Java for business related web applications, disable or remove it from your users computers, or limit it to only those users that absolutely require it. 5 The Dark Side Of Java, Dark Reading, December 1, 2011, 6 Improving Your 2011 Security Bang for the Buck: Patching Depth and Breadth, Gartner blog, January 4, 2011, A Sophos Whitepaper November
11 PDF reader: Use a single mainstream PDF reader. Keep it patched with the auto-update feature enabled, and advise users to install patches as soon as they become available. Plugins, add-ons and toolbars: Avoid any browser plugins and toolbars. They only increase the attack surface area. Stage 4: Infection Once the attacker exploits an application vulnerability to gain some control over the computer, the next step in the attack is to download a malicious payload to infect the system. The payload is the actual malware or virus that will ultimately steal data or extort money from the user. The hacker can choose from a wide range of different infectious payloads. Here are some of the most common payloads used today. Zbot 25% Ransomware 18% PWS 12% Sinowal 11% Backdoor 6% ZAccess 6% Downloader 2% Other 9% FakeAV 11% Figure 6: A breakdown of payloads from Blackhole over a two-month period (August and September of 2012). Source: SophosLabs Zbot (Zeus): Zeus is a Trojan horse that steals personal information by logging keystrokes and grabbing frames in the browser. It initially targeted Windows machines but variants have been found that infect Android mobile devices as well. Ransomware: Ransomware is a class of malware that restricts access to a user s computer or files, demanding payment to regain access. It primarily targets Windows, but there s also a less harmful but equally annoying Mac variant that recently started appearing. PWS: PWS is a password stealing and remote access Trojan that infects Windows computers. Sinowal (Torpig): Torpig is a botnet infection which targets Microsoft Windows computers. It uses a rootkit to steal credentials and allow remote access. FakeAV: FakeAV (fake antivirus) installs a rouge security software client that appears to be a desktop antivirus application. It scans and finds numerous fake viruses and extorts the user into paying to clean up the viruses. It primarily plagued Windows systems, but is now being found on Macs as well. A Sophos Whitepaper November
12 Technology, tools and tactics for effective protection At this stage, malware is being downloaded to the victim s computer. At this point in the attack, you re relying on web malware scanning and content filtering that has so far failed to detect an attack. The only hope is that the payload is less sophisticated than the malicious code that escaped detection at the earlier stages. Obviously, this is not a dependable defense. The best strategy is to get better web malware protection to catch it at an earlier stage in the attack. Stage 5: Execution In this final stage of the attack, the malicious payload has been downloaded and installed on the victim s system and now its job is to make the criminal behind it some money. It can do that in a number of ways: by providing credentials, banking or credit card information that can be sold on the black market, or by extorting the user into paying directly. Ransomware and FakeAV are both examples of malware that extort victims into paying. Let s examine some of the latest variants of ransomware to see what goes on. Encrypting ransomware uses increasingly sophisticated encryption to make files inaccessible until the ransom is paid (usually around $100). In 2013, a new variant called Cryptolocker appeared that encrypts all personal and work related files and will only decrypt them in exchange for a $300 fee. The encryption is sophisticated enough that the only option, in lieu of restoring from a backup, is to pay the ransom. Non-encrypting ransomware is available in different variants that can lock a user out of their computer in exchange for ransom. One type displays a fake Windows activation message and payment option; another devious variant not only locks a user out, but displays a fake law enforcement message demanding payment of a fine for illegal software or child pornography possession. These latter types of ransomware go to great lengths to look legitimate including localization to fit the victim s language and country of residence. A Sophos Whitepaper November
13 Figure 7: A typical ransomware demand. Figure 8: Localized versions of the ransom demand for various countries. A Sophos Whitepaper November
14 Ransomware for Mac. With the growing market share of Apple Macs among consumers and corporate users, it s perhaps not surprising that there s now a variant of ransomware for the Mac. It works slightly differently, using a simple JavaScript that takes over the browser and constantly reloads the same ransom demand page, regardless of what the user does. In the case of this Mac variation (figure 7), the fix is rather simple. The problem is that the fix is not obvious to the average user and the impact is so annoying that this malware is likely very effective, and lucrative (at $300 per instance). Figure 9: A Mac ransomware message purports to come from the FBI. Source: Malwarebytes, Technology, tools and tactics for effective protection An attack at the execution stage moves past your web protection to your last line of defense your desktop antivirus. At this layer, the attack consists of an executable, rootkit, or other malware resident on the machine that s trying to steal sensitive data, encrypt files, or lock a person out of their machine. Once the attack reaches this point, only endpoint protection with real-time updates and advanced host intrusion prevention system (HIPS) technology can help prevent the infection. In the past, antivirus detection relied on signatures. When new threats were discovered, a new detection signature was issued as an update. Today, as we ve seen, the threats are too sophisticated and change with each instance to the point where signatures and old-fashioned antivirus updates are no longer effective. A Sophos Whitepaper November
15 The detection of today s advanced malware requires HIPS. It can catch threats normal antivirus engines cannot by detecting malicious behavior. HIPS engines consist of a set of advanced rules to detect suspicious system behavior and notify you or block it before it can do any substantial damage. The best HIPS implementations build in best practices so you don t have to set up your rules to prevent false positives while still catching new malware. Another technology that can combat infections at this stage is call-home detection. Call-home detection is a feature of some secure web gateway solutions that can detect infected computers by their requests for known malware command-and-control URLs. While this feature can t prevent infection, it can help you identify infected systems on your network. Checklist of Technology, Tools and Tactics for Effective Web Protection An effective web protection strategy requires policies to reduce the surface area of attack, appropriate tools and technology to enforce those policies, and protection to block attacks at every layer. Download our checklist of technology, tools and tactics for effective web protection to evaluate your policies and web protection. Download now Sophos Web Protection At Sophos, we make web protection simple to deploy, manage and maintain. Our web gateway solutions let you take control of your web traffic and block the latest threats everywhere users go - even when they're not on your network. They include advanced web malware protection with technologies like JavaScript emulation for complete peace of mind. Choose either a dedicated purpose-built web appliance, or a secure web gateway integrated into Sophos UTM. Plus at the endpoint our affordable bundles deliver comprehensive security for users and data all with a single license. We also offer the best protection supported by SophosLabs our global 24/7 threat analysis operation. And we provide the best support in the industry. Sign up for a free trial at Sophos.com Sophos Secure Web Gateway Sophos Enduser Protection Bundles United Kingdom and Worldwide Sales Tel: +44 (0) [email protected] North American Sales Toll Free: [email protected] Australia and New Zealand Sales Tel: [email protected] Asia Sales Tel: [email protected] Oxford, UK Boston, USA Copyright Sophos Ltd. All rights reserved. Registered in England and Wales No , The Pentagon, Abingdon Science Park, Abingdon, OX14 3YP, UK Sophos is the registered trademark of Sophos Ltd. All other product and company names mentioned are trademarks or registered trademarks of their respective owners wpna.simple
Five Tips to Reduce Risk From Modern Web Threats
Five Tips to Reduce Risk From Modern Web Threats By Chris McCormack, Senior Product Marketing Manager and Chester Wisniewski, Senior Security Advisor Modern web threats can infect your network, subvert
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
Botnets: The dark side of cloud computing
Botnets: The dark side of cloud computing By Angelo Comazzetto, Senior Product Manager Botnets pose a serious threat to your network, your business, your partners and customers. Botnets rival the power
Protecting Your Roaming Workforce With Cloud-Based Security
Protecting Your Roaming Workforce With Cloud-Based Security How to use the cloud to secure endpoints beyond your perimeter By Tsailing Merrem, Senior Product Marketing Manager Remote and roaming workers
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY EXPLOIT KITS UP 75 PERCENT The Infoblox DNS Threat Index, powered by IID, stood at 122 in the third quarter of 2015, with exploit kits up 75 percent
Simple Security Is Better Security
Simple Security Is Better Security How small and medium-sized businesses can benefit from cloud-based security By Tsailing Merrem, Senior Product Marketing Manager Most vendors seem to assume that small
2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security
2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security For 10 years, Microsoft has been studying and analyzing the threat landscape of exploits, vulnerabilities, and malware.
Top five strategies for combating modern threats Is anti-virus dead?
Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
Simplifying Branch Office Security
Simplifying Branch Office Security By Udo Kerst, Director Product Management Network Security It is more important than ever to secure your business. Malware, botnets and other malicious programs threaten
Anti-exploit tools: The next wave of enterprise security
Anti-exploit tools: The next wave of enterprise security Intro From malware and ransomware to increasingly common state-sponsored attacks, organizations across industries are struggling to stay ahead of
Protecting Your Data On The Network, Cloud And Virtual Servers
Protecting Your Data On The Network, Cloud And Virtual Servers How SafeGuard Encryption can secure your files everywhere The workplace is never static. Developments include the widespread use of public
Next Gen Firewall and UTM Buyers Guide
Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains
GlobalSign Malware Monitoring
GLOBALSIGN WHITE PAPER GlobalSign Malware Monitoring Protecting your website from distributing hidden malware GLOBALSIGN WHITE PAPER www.globalsign.com CONTENTS Introduction... 2 Malware Monitoring...
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Managing Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
The Dark Side of Trusting Web Searches From Blackhat SEO to System Infection
The Dark Side of Trusting Web Searches From Blackhat SEO to System Infection Trend Micro, Incorporated Marco Dela Vega and Norman Ingal Threat Response Engineers A Trend Micro Research Paper I November
Seven for 7: Best practices for implementing Windows 7
Seven for 7: Best practices for implementing Windows 7 The early reports are in, and it s clear that Microsoft s Windows 7 is off to a fast start thanks in part to Microsoft s liberal Windows 7 beta program
The enemy within: Stop students from bypassing your defenses
The enemy within: Stop students from bypassing your defenses Computer literate K-12 students regularly use anonymizing proxies to bypass their school s web filters to access pornography, social networking,
Introduction: 1. Daily 360 Website Scanning for Malware
Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion
Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion Many organizations are embracing cloud technology and moving from complex, rigid on-premise infrastructure and software to the simplicity
Spyware: Securing gateway and endpoint against data theft
Spyware: Securing gateway and endpoint against data theft The explosion in spyware has presented businesses with increasing concerns about security issues, from data theft and network damage to reputation
Stopping zombies, botnets and other email- and web-borne threats
Stopping zombies, botnets and other email- and web-borne threats Hijacked computers, or zombies, hide inside networks where they send spam, steal company secrets, and enable other serious crimes. This
How to stay safe online
How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2
FAQ WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2 WHAT IS UPTIME AND SPEED MONITORING 2 WHEN I TRY TO SELECT A SERVICE FROM
MALWARE THREATS AND TRENDS. Chris Blow, Director Dustin Hutchison, Director
MALWARE THREATS AND TRENDS Chris Blow, Director Dustin Hutchison, Director WHAT IS MALWARE? Malicious Software Viruses Worms Trojans Rootkits Spyware Ransomware 2 MALWARE ORIGINS Users bring it from home
The Fundamental Failures of End-Point Security. Stefan Frei Research Analyst Director [email protected]
The Fundamental Failures of End-Point Security Stefan Frei Research Analyst Director [email protected] Agenda The Changing Threat Environment Malware Tools & Services Why Cybercriminals Need No 0-Days
WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
The Sophos Security Heartbeat:
The Sophos Security Heartbeat: Enabling Synchronized Security Today organizations deploy multiple layers of security to provide what they perceive as best protection ; a defense-in-depth approach that
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
What you need to know to keep your computer safe on the Internet
What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security
Advanced Persistent Threats
White Paper INTRODUCTION Although most business leaders and IT managers believe their security technologies adequately defend against low-level threats, instances of (APTs) have increased. APTs, which
Sophistication of attacks will keep improving, especially APT and zero-day exploits
FAQ Isla Q&A General What is Isla? Isla is an innovative, enterprise-class web malware isolation system that prevents all browser-borne malware from penetrating corporate networks and infecting endpoint
Computer Viruses: How to Avoid Infection
Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you
Almost 400 million people 1 fall victim to cybercrime every year.
400,000000 Almost 400 million people 1 fall victim to cybercrime every year. A common way for criminals to attack people is via websites, unfortunately this includes legitimate sites that have been hacked
Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth
Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference
PROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
HTML5 and security on the new web
HTML5 and security on the new web By James Lyne, Director of Technology Strategy There are lots of changes happening to the key technologies that power the web. The new version of HTML, the dominant web
A Manager s Guide to Unified Threat Management and Next-Gen Firewalls
A Manager s Guide to Unified Threat Management and Next-Gen Firewalls Key factors to justify and evaluate UTM and NGFW systems By Udo Kerst, Director Product Management, Network Security and Barbara Hudson,
WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES
WEB PROTECTION Features SECURITY OF INFORMATION TECHNOLOGIES The web today has become an indispensable tool for running a business, and is as such a favorite attack vector for hackers. Injecting malicious
How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering
How To Protect Your Online Banking From Fraud
DETECT MONITORING SERVICES AND DETECT SAFE BROWSING: Empowering Tools to Prevent Account Takeovers SUMMARY The Federal Financial Institutions Examination Council (FFIEC) is planning to update online transaction
IBM Protocol Analysis Module
IBM Protocol Analysis Module The protection engine inside the IBM Security Intrusion Prevention System technologies. Highlights Stops threats before they impact your network and the assets on your network
N J C C I C NJ CYBERSECURITY AND COMMUNICATIONS INTEGRATION CELL
4 N J C C I C NJ CYBERSECURITY AND COMMUNICATIONS INTEGRATION CELL Exploit Kits: A Prevailing Vector for Malware Distribution August 5, 2015 Since first appearing around 2006, exploit kits (EK) have evolved
Ten Tips to Avoid Viruses and Spyware
Ten Tips to Avoid Viruses and Spyware By James Wilson, CPA (480) 839-4900 ~ [email protected] Oh, the deck is stacked. Don t think for a minute it s not. As a technology professional responsible for securing
SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal
WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages
LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,
Types of cyber-attacks. And how to prevent them
Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual
Sample Mobile Device Security Policy
Sample Mobile Device Security Policy Using this policy One of the challenges facing IT departments today is securing both privately owned and corporate mobile devices, such as smartphones and tablet computers.
The evolution of virtual endpoint security. Comparing vsentry with traditional endpoint virtualization security solutions
The evolution of virtual endpoint security Comparing vsentry with traditional endpoint virtualization security solutions Executive Summary First generation endpoint virtualization based security solutions
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
Blackhole Exploit Kit: A Spam Campaign, Not a Series of Individual Spam Runs AN IN-DEPTH ANALYSIS
Trend Micro Incorporated Research Paper 2012 Blackhole Exploit Kit: A Spam Campaign, Not a Series of Individual Spam Runs AN IN-DEPTH ANALYSIS By: Jon Oliver, Sandra Cheng, Lala Manly, Joey Zhu, Roland
Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor
Why Device Fingerprinting Provides Better Network Security than IP Blocking How to transform the economics of hacking in your favor Why Device Fingerprinting Provides Better Network Security than IP Blocking
Guideline for Prevention of Spyware and other Potentially Unwanted Software
Guideline for Prevention of Spyware and other Potentially Unwanted Software Introduction Most users are aware of the impact of virus/worm and therefore they have taken measures to protect their computers,
Advanced Persistent Threats: Detection, Protection and Prevention
Advanced Persistent Threats: Detection, Protection and Prevention By Barbara Hudson, Senior Product Marketing Manager The many ways in which industry experts have defined advanced persistent threats (APT)
NetDefend Firewall UTM Services
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering (WCF) for superior
INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. [email protected]
INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library [email protected] Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup
White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks
White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have
IT Resource Management vs. User Empowerment
Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile
Two Great Ways to Protect Your Virtual Machines From Malware
Two Great Ways to Protect Your Virtual Machines From Malware By Maxim Weinstein, CISSP, Senior Product Marketing Manager Virtualization promises to reduce operational costs, simplify management and increase
Top Four Considerations for Securing Microsoft SharePoint
Top Four Considerations for Securing by Chris McCormack, Product Marketing Manager, Sophos is now the standard for internal and external collaboration and content management in much the same way Microsoft
24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
Network protection and UTM Buyers Guide
Network protection and UTM Buyers Guide Using a UTM solution for your network protection used to be a compromise while you gained in resource savings and ease of use, there was a payoff in terms of protection
Securing Your Business s Bank Account
Commercial Banking Customers Securing Your Business s Bank Account Trusteer Rapport Resource Guide For Business Banking January 2014 Table of Contents 1. Introduction 3 Who is Trusteer? 3 2. What is Trusteer
4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud
AARP can help you Spot & Report Fraud Fraud Fighter Call Center: Talk to a volunteer trained in how to spot and report fraud. Call the Fraud Fighter Call Center at (877) 908-3360 Fraud Watch Campaign What
Threat Spotlight: Angler Lurking in the Domain Shadows
White Paper Threat Spotlight: Angler Lurking in the Domain Shadows Over the last several months Talos researchers have been monitoring a massive exploit kit campaign that is utilizing hijacked registrant
Why The Security You Bought Yesterday, Won t Save You Today
9th Annual Courts and Local Government Technology Conference Why The Security You Bought Yesterday, Won t Save You Today Ian Robertson Director of Information Security Michael Gough Sr. Risk Analyst About
Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014
Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Lisa D. Traina, CPA, CITP, CGMA Lisa Traina utilizes her 30+ years of experience as a CPA, CITP and CGMA
Spyware. Michael Glenn Technology Management [email protected]. 2004 Qwest Communications International Inc.
Spyware Michael Glenn Technology Management [email protected] Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
Simple security is better security Or: How complexity became the biggest security threat
Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components
Protecting personally identifiable information: What data is at risk and what you can do about it
Protecting personally identifiable information: What data is at risk and what you can do about it Virtually every organization acquires, uses and stores personally identifiable information (PII). Most
ZNetLive Malware Monitoring
Introduction The criminal ways of distributing malware or malicious software online have gone through a change in past years. In place of using USB drives, attachments or disks to distribute viruses, hackers
DATA SHEET. What Darktrace Finds
DATA SHEET What Darktrace Finds Darktrace finds anomalies that bypass other security tools, due to the uniqueness of the Enterprise Immune System, capable of detecting threats without reliance on rules,
MONTHLY WEBSITE MAINTENANCE PACKAGES
MONTHLY WEBSITE MAINTENANCE PACKAGES The security and maintenance of your website is serious business, and what you don t know can certainly hurt you. A hacked or spamvertised site can wreak havoc on search
isheriff CLOUD SECURITY
isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console
The Key to Secure Online Financial Transactions
Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on
Managing BitLocker With SafeGuard Enterprise
Managing BitLocker With SafeGuard Enterprise How Sophos provides one unified solution to manage device encryption, compliance and Microsoft BitLocker By Robert Zeh, Product Manager Full-disk encryption
