Cybercrime & solutions for Home users and Small Businesses Eddy Willems Security Evangelist EICAR Director Information & Press Eddy.Willems@kaspersky.be
Agenda About Kaspersky Lab History Cyber Crime... Future
About Kaspersky Lab International leader in internet security, visionary part Gartner quadrant Advanced antivirus, antispyware, antispam and firewall More than 250 million protected users worldwide 10 R&D and virus labs worldwide Over 1400 employees, 450 developers & engineers Local sales, marketing and technical support Local virus detection by Benelux virus lab Fast reaction time and automatic hourly updates
Leading IT security players worldwide Have Chosen Kaspersky Lab Technology
The Kaspersky Virus Lab - sharing knowledge through malware research Antivirus experts and virus analysts Industry-leading knowledge resource http://www.viruslist.com Our team of virus analysts is active in AVIEN (Anti-Virus Information Exchange Network) CARO (Computer Antivirus Research Organization) ICSA (International Computer Security Association) AVAR (Association of Antivirus Asia Researchers) IMPACT (international partnership dedicated to combating terrorist activities in the area of information technology) EICAR (European Institute for Computer AntiVirus Research)
TIME
Some History: The old days!
Some years ago... Virus SPAM Worm Trojan
Today s Threats Trojan Worm Virus Root-kits Bot Zombie Keystroke logger Spyware Screen Pharming grabber Password grabber Phishing Remote- Control Agent Premium- Rate Dialer SPAM Adware
What are the real threats? Worms Adware Spyware Internal Hacker Viruses Bad Stuff Data Theft PeerToPeer attacks Spam External Hacker Exploits User Phishing Identity Theft Vulnerabilities DDoS Mailers DoS
The end of global epidemics 25 20 Epidemics 15 10 5 0 2002 2003 2004 2005 2006 2007 Quarters Source: Kaspersky Lab
Increasing Numbers 1.600.000 1.400.000 KL records 1.200.000 1.000.000 800.000 600.000 400.000 200.000 0 98 99 00 01 02 03 04 05 06 07 08 Source: Kaspersky Lab
Cyber crime Types of malware in daily updates 500 Cyber vandalism Petty fraud 400 300 200 100 Cyber crime 0 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 Source: Kaspersky Lab
The Ecosystem E-Criminals Victims Police ITTP Industry
The Rogues Gallery The Script Kiddies Chen Ing-Hau 24 (Taiwan) Arrested September 21, 2000 for the CIH virus Jeffrey Lee Parson 18 (USA) Arrested August 29, 2003 for the Lovesan.b virus Sven Jaschan 18 (Germany) Arrested May 7, 2004 for NetSky and Sasser viruses
The Rogues Gallery Binary Thieves Jeanson James Ancheta 20 (USA) Arrested November 3, 2005 for creating zombie networks and leasing them for spam mailing and DDoS attacks on websites Farid Essebar -18 (Morocco), Atilla Ekici 21 (Turkey) Arrested on August 26, 2005 for creating zombie networks using Mytob and Zotob (Bozori) worms
Today we are fighting these! Jeremy Jaynes Millionaire, and a spammer Jay Echouafni CEO, and a DDoS attacker Andrew Schwarmkoff Member of Russian mob, and a phisher
One of the big problems: Botnets
What is a botnet? part 1
What is a botnet? part 2
What is a botnet? part 3
What can you see?
Using botnet DDoS for fun and glory Sending spam, making spamlists Phishing Stealing private data Ransoming Botnet renting
New territories: Social Networking Blogs, forums Wiki MySpace, YouTube Other online communities: Who s on Facebook?
CyberCrime is Big Business Profitability Easy to do (technically and morally) Low risk business New services that are profitable to attack
Today s Networks Lack Clear, Crisp Boundaries Internal/External network Individual Users connect from multiple locations Managed/Unmanaged devices Individual devices operate both inside the network, and on public networks New Devices on the Network Internet eg. SmartPhones, etc. Network Telecomm uters Contrac Mobile Users Wireless Users
Top 10: Safe Internet Security Tips 1. Make backups 2. Update software regularly and check this 3. Use upgraded anti-virus/spyware software and update regularly and check this 4. Use a personal desktop firewall 5. Use difficult passwords 6. Be very carefull with unknown files or programs 7. Surf sure and browse logically 8. Thnik twice when leaving personal data somewhere 9. do not react on SPAM 10. Use common sense
What do we really need? Worms Adware Spyware Internal Hacker Viruses Bad Stuff Data Theft PeerToPeer attacks Spam External Hacker Exploits User Phishing Identity Theft Vulnerabilities DDoS Mailers DoS
Thank you
KOSS
Kaspersky Open Space Security
So what do we have? A perfect combination of. Legendary good detection with very quick reaction time New improved scanning engine with rootkit cleaning Improved Heuristic scanner (emulation+sandbox) Behaviour blocker + HIPS (proactive detection) An easy firewall Anti-Spam Vulnerability Scanner Web control and Device control Within one easy package!!!
Don t forget KMS
Kaspersky Anti-Virus Mobile On-access monitor intercepts all data channels On-demand monitor for manual scan SMS spam filtering and other value-add features Firewall Anti-theft: SMS Block, SMS Clean, SIM Watch : Unique feature Digitally signed updates via WAP, HTTP or from PC folder Minimal amount of system resources used Flexible customization options for OEMs, mobile operators, device vendors and content providers Supports all popular devices, including SonyEricsson, NOKIA, Siemens, Samsung, Panasonic, Sendo and other vendors Available for Symbian, Windows Mobile
A different view... KHSS
What do we offer? Kaspersky Hosted Mail Security Cascaded Virus protection Comprehensive Spam protection Content Control Inbound and Outbound Scalable Reporting Kaspersky Hosted Web Security Virus protection Content Control URL-Filter Scalable Reporting Kaspersky Hosted IM Security Virus protection SPIM protection Content Control Scalable Reporting
Consumer v2009 KAV & KIS
New Technologies in v2009 KAV / KIS v2009 (8.0) : AV signatures + PDM+ Emulator + Improved Heuristics - Behaviour control {Security Rating, WhiteListing, Rules engine} => Improved HIPS - Vulnerability Checker - Virtual Keyboard - In-the Cloud protection: Kaspersky Security Network - Online Check + Rescue Disk Image - Improved Anti-Rootkit - Improved Firewall - Improved Parental Control - Easier Wizards First Hybrid Technology Product in the world
Automatic Classification of Applications Avantages : Each application is automatically categorized based on criteria managed by KIS 2009 Much less user interaction needed while less false postives
Thank you! Questions? Eddy Willems Eddy.Willems@kaspersky.be