infographic: top most dangerous malware trends for 2014

1
sms sms sms sms sms ? ? ? ? ? 2014 2014 MOST DANGEROUS The release of the Carberp source code in June 2013 provides cybercriminals with yet another set of building blocks to create new malware variants. We saw the same development after the release of the Zeus 2.0.8.9 source code in May 2011 leading to Ice IX and Citadel malware. New malware variants contain new characteristics, signatures, evasive capabilities, and other modules never seen before. This makes it next to impossible for standard anti virus/anti-malware platforms to identify the malware. SOURCE CODE LEAKS WILL ACCELERATE MALWARE RELEASE CYCLES MOBILE SMS-FORWARDING MALWARE WILL BECOME UBIQUITOUS The capability to forward mobile SMS messages will be a standard feature in virtually all major malware families, with stand-alone SMS forwarding malware readily available. Mobile SMS verification is rendered all but useless as an out-of-band authentication method. Furthermore, enterprises must be wary of the real potential for SMS communication compromise with the increasing popularity of BYOD. MALWARE TRENDS OF As security products become available to detect new cybercrime techniques, malware authors revert back to more manual and time consuming approaches that can bypass many of these advanced detection and mitigation solutions. Anomaly detection and device ID solutions can now be easily circumvented by very basic cybercrime techniques. For example, we found several malware variants that prevent the user from interacting with the genuine site, thereby rendering some on-site fraud prevention approaches less effective. Instead of the fraudster using his own machine to perpetrate account takeover attacks, he accesses the account via the victim’s machine using various remote access technologies. This approach bypasses many device-fingerprinting technologies because the fraudster uses the (genuine) victim’s device. Device fingerprinting is used to ascertain whether the account access is taking place from the client’s known device or a different device. When access comes from the client’s device, it appears to device-fingerprinting solutions that the legitimate customer is accessing his account. Modern malware use a variety of techniques to avoid endpoint and network-based security software detection platforms. Now, however, we’re increasingly seeing malware that use a variety of techniques (including advanced encryption, and virtual machine and debug software evasion) to avoid analysis by malware researchers. Researcher evasion will become a standard component of most malware offerings. Security solutions are updated with counter measures based on malware research. If malware cannot be researched, counter measures cannot be developed. Taking the fight to an even earlier stage – malware authors are heavily investing in making sure researchers cannot scrutinize their software. WHY IT’S DANGEROUS WHY IT’S DANGEROUS OLD SCHOOL MALWARE TECHNIQUES WILL MAKE A COMEBACK WHY IT’S DANGEROUS ACCOUNT TAKEOVER WILL MOVE TO THE VICTIM’S DEVICE WHY IT’S DANGEROUS MALWARE RESEARCHER EVASION WILL BECOME MORE POPULAR WHY IT’S DANGEROUS 1 12 11 10 9 8 7 6 5 4 3 2 1 2 3 4 5

Upload: ibm-security-systems

Post on 08-Sep-2014

1.540 views

Category:

Internet


0 download

DESCRIPTION

A summary of the top 5 most dangerous malware trends of 2014.

TRANSCRIPT

Page 1: INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014

sms

sms

smssms

sms

?

?

?

?

?

20142014MOST DANGEROUS

The release of the Carberp source codein June 2013 provides cybercriminals with yet another set of building blocks to create new malware variants. We saw the same development after the release of the Zeus 2.0.8.9 source code in May 2011 leading to Ice IX and Citadel malware.

New malware variants contain new characteristics, signatures, evasive capabilities, and other modulesnever seen before. This makes itnext to impossible for standardanti virus/anti-malware platformsto identify the malware.

SOURCE CODE LEAKS WILL ACCELERATE MALWARE RELEASE CYCLES

MOBILE SMS-FORWARDING MALWARE WILL BECOME UBIQUITOUS

The capability to forward mobile SMS messages will be a standard feature in virtually all major malware families, with stand-alone SMS forwarding malware readily available.

Mobile SMS veri�cation is rendered all but useless as an out-of-band authentication method. Furthermore, enterprises must be wary of the real potential for SMS communication compromise with the increasing popularity of BYOD.

MALWARE TRENDS OF

As security products become available to detect new cybercrime techniques, malware authors revert back to more manual and time consuming approaches that can bypass many of these advanced detection and mitigation solutions.

Anomaly detection and device ID solutions can now be easily circumvented by very basic cybercrime techniques. For example, we found several malware variants that prevent the user from interacting with the genuine site, thereby rendering some on-site fraud prevention approaches less e�ective.

Instead of the fraudster using his own machine to perpetrate account takeover attacks, he accesses the account via the victim’s machine using various remote access technologies. This approach bypasses many device-�ngerprinting technologies because the fraudster uses the (genuine) victim’s device.

Device �ngerprinting is used to ascertain whether the account access is taking place from the client’s known device or a di�erent device. When access comes from the client’s device, it appears to device-�ngerprinting solutions that the legitimate customer is accessing his account.

Modern malware use a variety of techniques to avoid endpoint and network-based security software detection platforms. Now, however, we’re increasingly seeing malware that use a variety of techniques (including advanced encryption, and virtual machine and debug software evasion) to avoid analysis by malware researchers. Researcher evasion will become a standard component of most malware o�erings.

Security solutions are updated with counter measures based on malware research. If malware cannot be researched, counter measures cannot be developed. Taking the �ght to an even earlier stage – malware authors are heavily investing in making sure researchers cannot scrutinize their software.

WHY IT’S DANGEROUS

WHY IT’S DANGEROUS

OLD SCHOOL MALWARE TECHNIQUES WILL MAKE A COMEBACK WHY IT’S DANGEROUS

ACCOUNT TAKEOVER WILL MOVE TO THE VICTIM’S DEVICE WHY IT’S DANGEROUS

MALWARE RESEARCHER EVASION WILL BECOME MORE POPULAR WHY IT’S DANGEROUS

1

1211

10

9

8 7

6

54

32

1

2

3

4

5