the endless wave of online threats - protecting our community

34
The Endless Wave of Online Threats – Protecting our Community Michael McKinnon – Security Advisor, AVG (AU/NZ) An Avalanche Technology Group company AVG.COM.AU AVG.CO.NZ

Upload: avg-technologies-au

Post on 24-May-2015

252 views

Category:

Technology


1 download

DESCRIPTION

Learn which members of the community are the most vulnerable to cybercrime and view examples of the the latest online threats - including Exploit Toolkits, Second Click Redirection, Fake AV, Ransomware and Printed Malware.

TRANSCRIPT

Page 1: The Endless Wave of Online Threats - Protecting our Community

The Endless Wave of Online Threats – Protecting our Community

Michael McKinnon – Security Advisor, AVG (AU/NZ)

An Avalanche Technology Group company

AVG.COM.AU

AVG.CO.NZ

Page 2: The Endless Wave of Online Threats - Protecting our Community

2

Presentation Overview

• Overview of the AVG Community Protection Network

• Details and examples of the latest online threats:

• Web threats

• PC threats

• Mobile threats

• Printed malware

• Trends & issues

Page 3: The Endless Wave of Online Threats - Protecting our Community

3

About AVG

• Best known globally for AVG Anti-Virus FREE

• Over 114 million active users, as of May 2012

• Windows based end-point security

• Consumer market

• SMB (typically up to 200)

• Mobile security product for the Android™ platform – AVG Mobilation

• Other research

• AVG Digital Diaries – www.avgdigitaldiaries.com/

Page 4: The Endless Wave of Online Threats - Protecting our Community

In our community, who are the most vulnerable internet users?

Page 5: The Endless Wave of Online Threats - Protecting our Community

5

Future Generations

Page 6: The Endless Wave of Online Threats - Protecting our Community

6

Mature Generations

Page 7: The Endless Wave of Online Threats - Protecting our Community

7

AVG Community Protection Network

Page 8: The Endless Wave of Online Threats - Protecting our Community

8

AVG Community Protection Network

• User is asked whether they would like to opt-in during the installation process of their AVG product

• Operating since the start of 2011

Page 9: The Endless Wave of Online Threats - Protecting our Community

9

Web Threats• Overview• Exploit Toolkits (Blackhole)• Second Click Redirect Mechanism

Page 10: The Endless Wave of Online Threats - Protecting our Community

10

Web Threats - Overview

Page 11: The Endless Wave of Online Threats - Protecting our Community

11

Blackhole Toolkit – What is it?

• Web based, distribution system for exploits and malware; runs on a private or compromised server

Page 12: The Endless Wave of Online Threats - Protecting our Community

12

Blackhole Toolkit – Targets many platforms

• Allows them to target many platforms, including Mac!

Page 13: The Endless Wave of Online Threats - Protecting our Community

13

Blackhole Toolkit – Features & Facts

• Interesting features:

• Geo-IP detection & distribution

• Built-in anti-virus scanning, re-obfuscation upon detection

• Facts:

• In Q4 2011, it accounted for 80.2% of all known toolkits being used

• Exploit toolkits account for 58% of threat activity on malicious websites

Page 14: The Endless Wave of Online Threats - Protecting our Community

14

Second Click Redirection – What is it?

• Scripting technique for distributing malware

• User visits a site, typically with thumbnail images (video content, photos etc.)

• Cookie is set on first click, link goes to intended site

• If visitor returns, on second click, redirected to a fake anti-virus scan page – user tricked into installing fake anti-virus software (know as Fake AV)

• Subsequent clicks, link goes back to intended site

• AVG Community Protection Network detected ~8 million pages doing this, mostly from ~1700 domains

Page 15: The Endless Wave of Online Threats - Protecting our Community

15

Second Click Redirection – Fake AV Webpage

Page 16: The Endless Wave of Online Threats - Protecting our Community

16

Second Click Redirection – Top 25 Domains

Page 17: The Endless Wave of Online Threats - Protecting our Community

17

Second Click Redirection – Site Owners

Page 18: The Endless Wave of Online Threats - Protecting our Community

18

PC Threats• Fake AV – Security Shield, System Fix etc.• Ransomware

Page 19: The Endless Wave of Online Threats - Protecting our Community

19

Fake AV – What is it?

• Our support team has been helping clean up the following Fake AVs for customers:

• Security Shield

• System Fix

• XP Antivirus 2012

• Internet Security 2012

• Let’s have a look at what they can do…

Page 20: The Endless Wave of Online Threats - Protecting our Community

20

Fake AV – Fake “Blue Screen of Death”

Page 21: The Endless Wave of Online Threats - Protecting our Community

21

Fake AV – Nag screens and pop-ups

Page 22: The Endless Wave of Online Threats - Protecting our Community

22

Ransomware – What is it?

• Has been observed being served up by blackhole toolkits

• Unlike Fake AV – this malicious code just locks up your computer and demands money!

• Usually pretends to befrom the Government ora law enforcement agency

Page 23: The Endless Wave of Online Threats - Protecting our Community

23

Ransomware – Your PC has been seized!

Page 24: The Endless Wave of Online Threats - Protecting our Community

24

Email Scams – Still prevalent, but declining

Page 25: The Endless Wave of Online Threats - Protecting our Community

25

Spammers are becoming Facebook scammers

• Global spam levels are decreasing

• Scammers are now using Facebook, which provides:

• Instant access to 900+ million users

• Built-in word of mouth provides viral spread

• Default “trust” with Facebook is still high

• Some people think that Facebook*is* the internet

• Gen-Y using messaging apps morethan email

Page 26: The Endless Wave of Online Threats - Protecting our Community

26

Mobile Threats• Stolen private encryption keys for developer certificates• Premium SMS scams making money in Europe

Page 27: The Endless Wave of Online Threats - Protecting our Community

27

Mobile Threats – Rogue Apps & Rootkits

• In Q4 2011, AVG reported the emergence of rogue “signed” applications available in the Android™ Marketplace

• Signed with stolen/leaked digital certificates

• Permission prompts on Android™ is weak – doesn’t make the user think at all

• Risks are mostly around spying and premium SMS

• Google has recently announced they are scanning apps in the Marketplace with “Bouncer”

Page 28: The Endless Wave of Online Threats - Protecting our Community

28

Printed Malware• QR Codes

Page 29: The Endless Wave of Online Threats - Protecting our Community

29

Printed Malware – QR Codes

Page 30: The Endless Wave of Online Threats - Protecting our Community

30

Printed Malware – QR Codes

• Just like URL shorteners (like bit.ly for example), QR codes don’t reveal anything themselves until you use them

• In Q4 2011, we observed a QR code being used in a Russian forum website that linked to a malicious mobile app

• These are something to keep our focus on, especially with large, well-known, trusted brands starting to use them for marketing

Page 31: The Endless Wave of Online Threats - Protecting our Community

31

Trends & Issues• Motives – data or money?• Could better reporting of cybercrime reduce it?

Page 32: The Endless Wave of Online Threats - Protecting our Community

32

Motives – Data or Money?

• Lots of talk about information theft – protecting corporate data

• Our data, at the consumer and SMB space indicates, there are much more basic motives at play

• Money making scams:

• Digital extortion (Fake AV)

• Other fraud (banking Trojans)

• Clearly, just as there are vendors operating in different markets, there are cybercriminals also specialising in different markets

Page 33: The Endless Wave of Online Threats - Protecting our Community

33

Can reporting cybercrime reduce it?

• Verizon DBIR 2011

• Shows large reduction of data breaches reported

• Enterprises becoming very good at reporting incidents when they occur

• Consumers and small businesses still left in the dark and MOST low-level crimes continue to go unreported

• High volume of small incidents – what do these add up to in terms of lost time/productivity?

Page 34: The Endless Wave of Online Threats - Protecting our Community

Thank You!

34

avg.com.au

avg.co.nz

facebook.com/avgaunz

twitter.com/avgaunz

Connect with us to stay up to date with the latest news and information about online threats and scams. We also provide simple and useful security tips, designed to keep our community safe.

Come and say hello!

Copyright © 2012 AVG (AU/NZ) Pty Ltd, an Avalanche Technology Group company. All rights reserved.