MALWARE THREATS AND TRENDS. Chris Blow, Director Dustin Hutchison, Director



Similar documents
Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Anti-exploit tools: The next wave of enterprise security

Chapter 9 Firewalls and Intrusion Prevention Systems

Desktop Security. Overview and Technology Guidance. Michael Ramsey Network Specialist, NC DPI

What Do You Mean My Cloud Data Isn t Secure?

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

CompTIA Security+ (Exam SY0-410)

WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security

Deep Security Vulnerability Protection Summary

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

Symantec Endpoint Protection

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

NetDefend Firewall UTM Services

Top five strategies for combating modern threats Is anti-virus dead?

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Next Gen Firewall and UTM Buyers Guide

How To Protect A Network From Attack From A Hacker (Hbss)

24/7 Visibility into Advanced Malware on Networks and Endpoints

Host-based Intrusion Prevention System (HIPS)

NetDefend Firewall UTM Services

EC Council Certified Ethical Hacker V8

What you need to know to keep your computer safe on the Internet

Endpoint Security and the Case For Automated Sandboxing

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Endpoint protection for physical and virtual desktops

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Malware and Other Malicious Threats

Unified Threat Management, Managed Security, and the Cloud Services Model

Computer Viruses: How to Avoid Infection

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

End-user Security Analytics Strengthens Protection with ArcSight

[CEH]: Ethical Hacking and Countermeasures

Simple security is better security Or: How complexity became the biggest security threat

McAfee Deep Safe. Security beyond the OS. Kai-Ping Seidenschnur Senior Security Engineer. October 16, 2012

Integrated Protection for Systems. João Batista Territory Manager

Endpoint protection for physical and virtual desktops

Secure Your Mobile Workplace

Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities?

The Challenge of a Comprehensive Network Protection. Introduction

Open an attachment and bring down your network?

Content-ID. Content-ID URLS THREATS DATA

Importance of Web Application Firewall Technology for Protecting Web-based Resources

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Internet threats: steps to security for your small business

Why The Security You Bought Yesterday, Won t Save You Today

Defending Against Cyber Attacks with SessionLevel Network Security

AVeS Cloud Security powered by SYMANTEC TM

CORPORATE AV / EPP COMPARATIVE ANALYSIS

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Building a Web Security Ecosystem to Combat Emerging Internet Threats

ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper

IBM Protocol Analysis Module

Security Consultant Scenario INFO Term Project. Brad S. Brady. Drexel University

How to easily clean an infected computer (Malware Removal Guide)

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Top tips for improved network security

Symantec Endpoint Protection

The McAfee SECURE TM Standard

Total Defense Endpoint Premium r12

APPLICATION PROGRAMMING INTERFACE

Virtualization Journey Stages

Endpoint Security Management

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Network and Host-based Vulnerability Assessment

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Symantec Endpoint Protection Analyzer Report

NATIONAL CYBER SECURITY AWARENESS MONTH

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

Redefining Endpoint Security: Symantec Endpoint Protection Russ Jensen

Cyber Security Awareness

EndUser Protection. Peter Skondro. Sophos

Zone Labs Integrity Smarter Enterprise Security

PROACTIVE PROTECTION MADE EASY

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

Transcription:

MALWARE THREATS AND TRENDS Chris Blow, Director Dustin Hutchison, Director

WHAT IS MALWARE? Malicious Software Viruses Worms Trojans Rootkits Spyware Ransomware 2

MALWARE ORIGINS Users bring it from home USB drives Pirated software BYOD (or BYOID Bring your own infected device) Social engineering Malicious email attachments Instant messaging Web site drive by s PHP website compromised and malware being served to visitors 3 rd Party ads compromised on legitimate websites Why? Used to be to cause chaos or for fun Now more financially driven Reference: http://arstechnica.com/security/2013/10/hackers-compromise-official-php-website-infect-visitors-with-malware/ 3

BROWSER BASED THREATS Browser-based threats is one of the leading sources for malware distribution Largest browser threats in the wild as of Q3 2013 HTTP: Microsoft JPEG Processing Buffer Overrun HTTP: Multiple Browser Window Injection Vulnerability RTSP: Apple QuickTime Overly Long Content-Type Buffer Overflow HTTP: Microsoft Internet Explorer CHTML Use-After- Free Remote Code Execution 4

HISTORICAL APPROACH Proactive OS patching but ignoring 3 rd party patching Anti-Virus (AV) Initial detection rate of new malware is around 3-5% Some AV vendors can take up to 4 weeks to detect new malware from the time of the initial scan AV is part of a layered security approach Help mitigate well-known existing attacks Malware creators/exploit kits are doing what they can to disable or circumvent AV ALL THE TIME AV will not stop targeted malware Corporate AV misconfigurations? Reviewed many help desk forums for popular AV and found many enterprises with misconfigured AV Lack of heuristics enabled Not keeping AV up to date Misconfigured add-ons 5

REACTIONARY MEASURES Specialized Malware Removal Software AV may possibly quarantine the threat, but this removes the payload - which is what continues its propagation Usually complimentary to corporate AV solutions Still doesn t detect targeted malware and/or 0-day threats Examples: MalwareBytes Anti-Malware (MBAM) SpyBot Search & Destroy Ashampoo Anti-Malware Various programs from popular AV brands for specific malware 6

Relying solely on AV is like wearing flip flops in a bar bathroom 7

GENERAL MALWARE THREATS No signs of slowing down - steadily growing 8

PSH I VE GOT A MAC Malware on Macs more than tripled since the end of 2012 9

RANSOMWARE Ransomware has been growing exponentially since Q3 2012 Roughly 320,000 new unique samples at the end of Q2 2013 10

THE STATE OF MOBILE MALWARE Mobile malware is still on the rise By the end of Q2, McAfee Labs has collected as many mobile malware samples as it did in all of 2012 Backdoor Trojans and spyware to steal banking information was the largest area of gain in Q2 2013 Majority of mobile malware is Android-based 11

WHAT CAN WE DO? Defense in depth 12

DEFENSE IN DEPTH Policies, Procedures, and Awareness Physical Security Technical Perimeter Internal Network Host Application Data 13

OPTIONS Firewalls Proxies Unified threat management (UTM) Host based intrusion prevention (HIPS) Network intrusion prevention systems (NIPS) Network intrusion detection systems (NIDS) 14

PREVENTION FAILS (REMEMBER AV?) Firewalls Proxies Unified threat management (UTM) Host based intrusion prevention (HIPS) Network intrusion prevention systems (NIPS) 15

NETWORK SECURITY MONITORING Leverages IDS Relies on signature based identification, but also interactive analysis Full content data 16

NETWORK SECURITY MONITORING 17

EVENT CORRELATION 18

EVENT INVESTIGATION 19

EVENT INVESTIGATION 20

ADDITIONAL BENEFITS Policy violations (installation of unapproved software) Early detection DNS analysis Unexpected services available internally and externally 21

SO YOU VE BEEN BREACHED How long does it normally take to spot a breach? 22

BREACH DETECTION 69% of breaches were spotted by an external party 9% of breaches were spotted by customers 23

WHERE DO WE GO FROM HERE? Baby steps Have AV? Make sure it s functioning and up-to-date! Ensure operating system and applications are up-to date Properly segment your network Regularly scan your environment for vulnerabilities Backups on critical systems Critical asset log monitoring (firewalls, DNS, etc.) Firewall rule review Network Security Monitoring Begin looking at: Application sandboxing, honeypots / darknets 24

Q&A