2013 sophos security threat report

18
2013 Security Threat Report 5 Threats to Watch Richard Wang, SophosLabs

Upload: sophos

Post on 17-Jun-2015

470 views

Category:

Technology


1 download

DESCRIPTION

[Please view this presentation with notes] In 2012, we saw attackers extend their reach to new platforms like cloud services and mobile devices, adopt malware toolkits to build smarter attacks and target badly-configured websites to expose passwords and deliver malware. What does 2013 hold? Get the full report here: www.sophos.com/threatreport

TRANSCRIPT

Page 1: 2013 Sophos Security Threat Report

2013 Security Threat Report5 Threats to Watch

Richard Wang, SophosLabs

Page 2: 2013 Sophos Security Threat Report

Join us on Twitter

Live tweeting from @Sophos_News

Send us your thoughts #SophosLive

Page 3: 2013 Sophos Security Threat Report

Topics

Overview • 2012 in review

Specific threats • The year’s most widespread threats

Predictions • What 2013 will bring

Page 4: 2013 Sophos Security Threat Report

2012 in reviewPlus ça change …

Faster adoption of exploits

Web delivery still rules supreme

More platforms attacked

New moneymaking

schemes

Page 5: 2013 Sophos Security Threat Report

Significant threats of 2012

Page 6: 2013 Sophos Security Threat Report

Java

Page 7: 2013 Sophos Security Threat Report

Blackhole

Image:NASA

Page 8: 2013 Sophos Security Threat Report

Blackhole v2

Page 9: 2013 Sophos Security Threat Report

Blackhole deliveriesAugust – September 2012

ZbotRansomwarePWSSinowalFakeAVBackdoorZeroAccessDownloaderOther

Page 10: 2013 Sophos Security Threat Report

Ransomware

Page 11: 2013 Sophos Security Threat Report

75% unique

1 2 3 4 5 >50%

10%

20%

30%

40%

50%

60%

70%

80%

Attacks per malware binary

Page 12: 2013 Sophos Security Threat Report

3J-448481K3J-2443N4A4C-8293N4E3N-6464C1K4C-03J4A3P3N-04C1K3L4A3J-948481K3J-5443N4A4C-4293N4E3N-4464C1K4C-23J4A3P3N-04C1K3L4A3J-448481K3J-6443N4A4C-8293N4E3N-5464C1K4C-43J4A3P3N-74C1K3L4A

100,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000

Polymorphism

Page 13: 2013 Sophos Security Threat Report

Mobile threats

Page 14: 2013 Sophos Security Threat Report

2013

“Irreversible” attacks

Premiumattack kits

Better exploit mitigation

Page 15: 2013 Sophos Security Threat Report

Get Your Threat Report

www.sophos.com/threatreport

Page 16: 2013 Sophos Security Threat Report

Stay ahead of the curve

nakedsecurity.sophos.com

@NakedSecurity

@Sophos_News

www.facebook.com/SophosSecurity

Sophos North America

1-866-866-2802

[email protected]

UK & Worldwide

+44(0)8447 671131

[email protected]

Page 17: 2013 Sophos Security Threat Report

17

Questions

Page 18: 2013 Sophos Security Threat Report

Did we miss you?

Tweet us@Sophos_News