2014: mid-year threat review

Post on 15-Jan-2015

849 Views

Category:

Software

6 Downloads

Preview:

Click to see full reader

DESCRIPTION

Our researcher Aryeh Goretsky took a look at some of the more interesting pieces of malware and threats that have occurred over the first six months of the year 2014. And what a year it has been, with some serious new developments as well as persistence of numerous older threats.

TRANSCRIPT

2014 Mid-Year Threat Review

The good, the bad and the ugly

Presenter

Aryeh Goretsky, MVP, ZCSEDistinguished ResearcherESET North America

✉ askeset@eset.com@eset (global)

@esetna (US + Canada)

About ESET

• Leading security solution provider for companies of all sizes, home and phones

• Pioneered and continues to lead the industry in proactive threat detection

• Presence in more than 180 countries worldwide• Protecting over 100 million users• Ten years of consecutive VB100 awards†• 5th Largest Endpoint Security Vendor‡

†Source: Virus Bulletin Magazine‡Source: IDC, Worldwide Endpoint Security 2013-2017 Forecast and 2012 Vendor Shares

What’s on the agenda?

• A brief look into ESET’s threat database• Android malware• Banking bots & Bitcoin thieves• Heartbleed SSL vulnerability• Internet of Things (IoT)

• Mac & iPhone• Nation-state malware• Windigo/Ebury malware campaign• Windows XP reaches its end of life

What this presentation is not about

• BYOD & mobile device threats• Data breaches (eBay, Target, …)• Edward Snowden, NSA, et al• Multifactor authentication• Passwords and PINs• Phishing, scams & social media• Windows 8.1 Update

Threat Database Updates

Threat Database Updates

[CHART REDACTED]

To view this slide, please see the presentation at:

https://www.brighttalk.com/webcast/1718/110971

Android is becoming Windows

Android Malware

• Amount of malware continues to grow• Can be deployed by Windows malware (q.v.)• Reports of smartphones & tablets shipping

with pre-installed malware• Everything old is new again: – first worm discovered, Android/Samsapo– first ransomware discovered, Android/Simplocker

• On the plus side– Google plans to periodically re-scan installed apps–Most malware originates outside of Google Play,

device or carrier stores

Android Malware

Have you seen any malware, potentially unwanted applications or junk apps on your Android devices?

Yes

no

Banking bots & Bitcoin thieves

• Arrival of *coin mining and stealing on multiple platforms, technologies (Android, BAT, MSIL, Win32, VBS)

• Win32/Corkow banking Trojan targets Bitcoin wallets, Android developers and Russian business bank accounts

• Win32/Qadars banking bot now drops Android iBanking component Android/Spy.Agent.AF via Facebook webinject

Heartbleed SSL Vulnerability

• 2 year old flaw in OpenSSL allows eavesdropping into communications

• About two-thirds of web sites were affected• Also affected networking gear from Cisco,

Juniper and others; in VPN software, etc.• Windows 8 inbox VPN clients, too• May have been exploited for those 2 years

before being discovered

Internet of Things

• Smart TVs – “Red Button” bot in your living room? – Script injection, credential theft, malware?– all via broadcast (EU standard, soon in US)

• Smart TVs – the spy in your living room?– Some have microphones and webcams

• Not apparent when they’re on; or how to turn off (or if)• Can be remotely taken over (Samsung)

– Sent viewing habits, URLs, filenames of private videos (LG)

– Replace images/videos on screen (Philips)

• Tesla’s iPhone app, used to lock/unlock vehicle, vulnerable to brute-forcing

Infected

^

IOiT: Routers and DVRs, etc.

• Residential gateway broadband routers under attack from worms like Win32/RBrute– DNS changing

• Browser injection– Ad injection substitution, spying, etc.

• Credential theft– bank fraud, shopping, social media, webmail …

• Search engine redirection– Bing, Google, Yahoo redirect to sponsored & PPC searches

– coin mining (DVR, NAS...)• Nowhere near as effective as PCs, but remember:

“Quantity has a quality all its own.” – Joseph Stalin

IOiT: Routers and DVRs, etc.

[LIST OF AFFECTED VENDORS REDACTED]

To view this slide, please see the presentation at:

https://www.brighttalk.com/webcast/1718/110971

IOiT: Routers and DVRs, etc.

Reminder:

1. Disable access to admin settings on LAN and wireless interfaces

2. Update firmware to latest version (manual check may be required-do not rely on autoupdate)

3. Use a str0ng password

IOiT: Fighting router-based threats

Internet of Things

Do you use any of these Internet connected devices?

Home Automation (thermostat, fire/CO2 alarms, X10, Zigbee, etc.)

Network Attached Storage (NAS) Next-gen gaming console Router / Wi-FI Access Point Smart TV and/or Digital Video Recorder

(DVR)

Infected

^

Mac, iPad & iPhone an Apple a day…

No major campaigns targeting OS X & iOS, but…

• GotoFail, a critical SSL vulnerability is patched

• Targeted attacks continue, such as against Chinese and Tibetan advocacy groups

• Weird ransomware attacks target Australian and New Zealand iPhones, iPads & Macs

Nation-state malware update

• OSX/Appetite trojan used against Falun Gong and Tibetan activists

• MiniDuke (aka Win32/SandaEva) continues to be used– Targets include European governments,

institutions and NGOs

• Use of Win32/Agent.VXU against Ministry of Natural Resources and the Environment in Vietnam (US equivalent: EPA)

The Windigo Campaign…anything but Windows

• Started with investigation into Linux/Ebury– OpenSSH backdoor + credential stealer–Malicious library and patch to OpenSSH

binaries– Took several steps to avoid detection

• Includes Linux/Cdorked, Perl/Calfbot and Win32/Glupteba.M families

• Over 25,000 servers infected over past 2 years

• Affected Linux, FreeBSD, OpenBSD, Mac OS X– Plus some Windows servers running Perl +

Cygwin

Windows XP reaches EOL status

• On April 8th, support ended for Windows XP– An update, MS14-021, released on 5/1/14 due

to extraordinary circumstances– One-time event, don’t expect it again

• Globally, 30% of PCs still running XP– Regionally, ranging from 11% to 61% usage

• If you’re still running XP:– Patch systems to final set of updates– Isolate– Figure out migration strategy now

Resources: Internet of Things (1/4)

ESET’s We Live Security (blog)

• Attack on Samsung’s Boxee TV service leaks 158,000 passwords and emails

• Channel Cybercrime: Bug allows hackers to hijack screen of Philips TVs

• Fridge raiders: Will 2014 really be the year your smart home gets hacked?

• Hacker amasses $620,000 in cryptocurrency using infected computers

• LG admits that its Smart TVs have been watching users and transmitting data without consent

Resources: Internet of Things (2/4)

ESET’s We Live Security (blog)

• ‘Major’ Smart TV vulnerability could allow mass wireless attacks

• More than 300,000 wireless routers hijacked by criminals in global attack

• Mysterious ‘Moon’ worm spreads into many Linksys routers – and hunts new victims

• Simplocker Ransomware: New variants spread by Android downloader apps

• Smart TVs can be infected with spyware – just like smartphones

Resources: Internet of Things (3/4)

ESET’s We Live Security (blog)

• Stop TVs spying on us. U.S. Senator calls for safer Smart devices

• Surveillance cameras hijacked to mine Bitcoin while watching you

• Tesla shocker as researcher picks electric supercar’s lock

• The Internet of Things isn’t a malware-laced game of cyber-Cluedo… yet

• Win32/Sality newest component: a router’s primary DNS changer named Win32/Rbrute

Resources: Internet of Things (4/4)

ESET’s Virus Radar (threat encyclopedia)

• Win32/Sality

• Win32/Rbrute

Resources: Mac Malware

ESET’s We Live Security (blog)

• 10 years of Mac OS X malware

• Five tips to help control your privacy on Mac OS X

• iPhone and Apple ransom incidents? Don’t delay locking down your i-stuff

• Master of Mavericks: How to secure your Mac using Apple’s latest update

• Urgent iPhone and iPad security update, Mac OS X as well

ESET’s Virus Radar (threat encyclopedia)

• OSX/Appetite

Resources: Windigo Campaign

ESET’s We Live Security (blog)

• An in-depth Analysis of Linux/Ebury

• Interview: Windigo victim speaks out on the ‘stealth’ malware that attacked his global company

• Operation Windigo – the vivisection of a large Linux server-side credential-stealing malware campaign

• Over 500,000 PCs attacked every day after 25,000 UNIX servers hijacked by Operation Windigo

• Windigo not Windigone: Linux/Ebury updatedESET research papers

• Operation Windigo (PDF)

Resources: Windows XP EOL

ESET’s We Live Security (blog)

• 5 Tips for protecting Windows XP machines after April 8, 2014

• Goodbye, Windows XP!

• With just days to go, just how many PCs are still running Windows XP?

• Windows exploitation in 2013

• XP-diency: beyond the end of the line

Special Thanks

Kudos to

Bruce P. BurrellDavid HarleyAmelia HewEmilio PlumeyJavier SeguraAaron SheinbeinMarek Zeman

for their assistance with the ESET 2014 Mid Year Threat Report!

I would like to request one of the following

Contact from ESET SalesBusiness Edition TrialPassMark® Competitive Analysis ReportMonthly Global Threat Report

Polling question:

Q&A Discussion

top related