cosc 4765

32
Cosc 4765 SOPHOS Security Threat report about 2013 (and predictions for 2014)

Upload: anoush

Post on 25-Feb-2016

62 views

Category:

Documents


0 download

DESCRIPTION

Cosc 4765. SOPHOS Security Threat report about 2013 (and predictions for 2014). Side note . Independent test lab AV-Test, discovers it’s 50 millionth virus/malware (Jan 26, 2011) 220,000 new malware each day 9,166 every hour or 152 every minute or about 2.5 every second. History: - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Cosc  4765

Cosc 4765

SOPHOSSecurity Threat report about 2013

(and predictions for 2014)

Page 2: Cosc  4765

Side note

• Independent test lab AV-Test, • discovers it’s 50 millionth virus/malware (Jan 26, 2011)

– 220,000 new malware each day• 9,166 every hour or 152 every minute or about 2.5 every second.

– History: • 1985: 553 different viruses• 2000: 176,312• 2006: about 1 million• 2010: about 20 million new malware variants• 2013: about 83 million new malware variants

– Source: http://www.av-test.org/

Page 3: Cosc  4765

A bad day comes.

• April 8, 2014– The end security updates for • Windows XP• Office 2003

• What dangerous “zero-day-forever” attacks may follow it.

Page 4: Cosc  4765

All pictures and data are from SOPHOS 2013 report.

Page 5: Cosc  4765

Botnets Grow in Size & Stealth

• In the past 12 months, infected networks of computers called botnets have become more widespread, resilient and camouflaged—and they’re spreading dangerous new payloads like the nasty Cryptolocker ransomware.– Zeus source, leads to Gameover

• Which has a P2P Command&Control structure– ZeroAccess Botnet

• In least than 2 weeks, undoes all the countermeasures by antivirus companies.

– Watch: Cryptolocker in Action

Page 6: Cosc  4765

Botnets Grow in Size & Stealth (2)

• Ransomware has become more common, because fake AV and alert scams are now failing.

• Banking malware– Carberp steals over $250 million!– Malware like shylock/caphaw botnets targets

customers of Barclays, Bank of America, Capital One, Citi, and Wells Fargo.

Page 7: Cosc  4765

Botnets Grow in Size & Stealth (3)

• More use of the “Darknet”– Hidden networks such as Tor that are designed to

resist surveillance.– Wikileaks and many people use it to protect sources.

– Botnet C&C servers are hidden in the Tor network as well.

Page 8: Cosc  4765
Page 10: Cosc  4765
Page 11: Cosc  4765

Spam Reinvents Itself.

• From penny stock pump-and-dump schemes to natural weight loss scams, some spam just never goes away. In 2013, distributed networks of servers helped keep spam under the radar of filters, a technique called “snowshoe spamming.”– Distribute the load across a large area (botnet), so

they don’t sink like snow shoes.• Uses many IPs so it harder to filter spam out.

Page 12: Cosc  4765
Page 13: Cosc  4765

Android Malware• Android malware continues to grow and evolve.

– The Android Market place is an “open place”– Watch those permissions when installing.

• Does the facebook app really need all these permissions?– Call phone number, read your text messages, record audio, full location services, read/write

contacts, read/write call log– Add/modify calendar events, Read confidential information

» “send email to guest without owners’ knowledge”– Read/Modify/delete the content of USB storage– Add/remove accounts, find accounts on the device– Change network connectivity, connect/disconnect wifi, download files without notification– Retrieve and Reorder running apps– Draw over other apps, prevent phone from sleeping, control vibration, change audio

settings, read and change sync settings, expand/collapse status bar– And last install shortcuts and send “sticky broadcasts”.

• https://www.facebook.com/help/210676372433246

Page 14: Cosc  4765

Android Malware (2)

• Ransomware:– for the first time in 2013 began infecting

smartphones and other Android devices.• Botnets, mostly in China– Send premium SMS messages that charge the

user.• GinMaster: A Case Study in Android Malware

Page 15: Cosc  4765

Android Malware (2)

Page 16: Cosc  4765
Page 17: Cosc  4765

Windows: The Growing Risk of Unpatched Systems

• The two known big ones are WinXP and Office2010.– Here the real issue, because it’s not your PC.

• All though 31% of all PCs are running winXP.– There are millions of Point of Sale devices (POS)

• Running WinXP, some still running Win2K.• These handle Credit card information!

– And a really scarey note, many medical devices are WinXP as well….

Page 18: Cosc  4765

Windows: The Growing Risk of Unpatched Systems (2)

• So Win8/7/Vista are not new code. • A vulnerability in one those will point to a now

(possible) unpatched vulnerability in WinXP.

Page 19: Cosc  4765
Page 20: Cosc  4765

Web-Based Malware

• dangerous, difficult-to-detect web server attacks by Darkleech and exploit kits like Redkit have been responsible for more drive-by download attacks against vulnerable web users.– DarkLeech compromised over 40K domains • Delivered ransomware and other malware to users.

– Mostly in “drive-by attacks”• 93% of infected sites were running Apache.

Page 21: Cosc  4765

Web-Based Malware (2)

• Using kits (such as Blackhole and others)– Attacking Java, Adobe PDF and Flash– Other third party plugins.

– Stopping most “drive by-attacks”. • Plugins like no-script help, since no javascript, no java, no

nothing. Back to the “stone age” of browsers.• Unless there is an exploit in the browser itself of course.

Page 22: Cosc  4765

Web-Based Malware

• Malware 101: – http://www.youtube.com/watch?v=P1U9_s7j4Hg

• About an hour long video for beginning on how malware works and spreads.

Page 23: Cosc  4765
Page 24: Cosc  4765

Threats to Your Financial Account

• We are seeing more advanced persistent threats (APTs)—persistent, targeted, hard-to-detect attacks—aimed at compromising financial accounts.– What is APTs? Watch: APTs

Page 25: Cosc  4765
Page 26: Cosc  4765

Threats to Mac OS X

• Mac malware is becoming more widespread, with new versions of Mac Trojans, adware and ransomware emerging in 2013.

• And like Windows, a number of still common version of the Mac OS X are no longer receiving security updates.

Page 27: Cosc  4765
Page 28: Cosc  4765

Threats to linux growing

• Why?– Linux servers are widely used to run websites and

deliver web content, making them and the software running on them prime targets of attack.

– IE, it’s all about deliverables.

Page 29: Cosc  4765

Trends to watch for in 2014

• Attacks on corporate and personal data in the cloud

• More complex Android malware– Going after person data and financial data on

phones!– Attempts to spread via social networks as well.

• 64bit only malware.• At least it won’t work on 32bit OSs.

Page 30: Cosc  4765

Trends to watch for in 2014 (2)

• Hacking Everything– Attacks will continue to increase, but not to critical

levels in 2014.– Infrastructure– “Internet of Things”• From thermostats, network printers, and anything

connected to the network.

Page 31: Cosc  4765

References

• http://www.sophos.com/en-us/threat-center/security-threat-report.aspx?utm_source=Non-Campaign&utm_medium=AdWords&utm_campaign=NA-AW-GB-Security-Threat-Report&utm_content=Security-Threat-Report&utm_term=sophos%20security%20threat%20report

• http://www.sophos.com/en-us/security-news-trends/security-trends/network-security-top-trends.aspx

Page 32: Cosc  4765

QA&