three simple steps to prevent targeted attacks

36
Three Simple Steps to Prevent Targeted Attacks Kevin Haley Dr, PM, Symantec Security Technology & Response

Upload: argyle-executive-forum

Post on 18-Jul-2015

206 views

Category:

Internet


0 download

TRANSCRIPT

Page 1: Three Simple Steps to Prevent Targeted Attacks

Three Simple Steps to Prevent Targeted Attacks

Kevin Haley Dr, PM, Symantec Security Technology & Response

Page 2: Three Simple Steps to Prevent Targeted Attacks

2

+91% Increase in targeted attack campaigns

2012

2013

Page 3: Three Simple Steps to Prevent Targeted Attacks

3

Page 4: Three Simple Steps to Prevent Targeted Attacks

4

Page 5: Three Simple Steps to Prevent Targeted Attacks

5

Page 6: Three Simple Steps to Prevent Targeted Attacks

Zero-Day Vulnerabilities

13 15

9 12

14

8

14

23

0

5

10

15

20

25

30

2006 2007 2008 2009 2010 2011 2012 2013

Zero-Day Vulnerabilities, Annual Total, 2006 - 2013 Source: Symantec

23 zero-day vulnerabilities discovered in 2013 Increase from 14 in 2012

More zero-day vulnerabilities discovered in 2013 than in any year since we started tracking More zero-days in 2013 than in past two years combined

Page 7: Three Simple Steps to Prevent Targeted Attacks

7

Microsoft Windows OLE Package Manager Remote Code Execution Vulnerability (CVE-2014-4114)

Microsoft Windows OLE Remote Code Execution Vulnerability (CVE-2014-6352).

Page 9: Three Simple Steps to Prevent Targeted Attacks

Improving Security - Zero Days Disarm

9

Page 10: Three Simple Steps to Prevent Targeted Attacks

Targeted Attacks by Company Size

10

Page 11: Three Simple Steps to Prevent Targeted Attacks

Risk of Being Targeted by Industry Size

11

Ratio of Organization Targeted by Industry Size Sent by Spear-Phishing Email Source: Symantec

High

Medium

Risk

2,500+

1,501-2,500

1,001-1,500

501-1,000

251-500

1-250

2.3

2.9

2.9

3.8

4.3

5.2

1 in

Page 12: Three Simple Steps to Prevent Targeted Attacks

12

Page 13: Three Simple Steps to Prevent Targeted Attacks

13

Page 14: Three Simple Steps to Prevent Targeted Attacks

#1 Run More Than AV on Your Endpoints

14

Page 15: Three Simple Steps to Prevent Targeted Attacks

An Example - Dragonfly

• Ongoing cyberespionage campaign

• Targeting the energy sector in Europe and US

• Stealing information

• Capable of sabotage

15

Page 16: Three Simple Steps to Prevent Targeted Attacks

Dragonfly Attack Methods

Send an email to a person of interest

Spear Phishing

16

Page 17: Three Simple Steps to Prevent Targeted Attacks

Dragonfly Attack Methods

Send an email to a person of interest

Spear Phishing

Infect a website and lie in wait for them

Watering Hole Attack

17

Page 18: Three Simple Steps to Prevent Targeted Attacks

Watering Hole Attacks

Energy industry related sites Lightsout Exploit Kit

Backdoor.Oldrea or

Trojan.Karagany

18

Page 19: Three Simple Steps to Prevent Targeted Attacks

Website Vulnerabilities

19

Scanned Websites With Vulnerabilities

53% 78% +25%

pts 2012 2013

1 IN 8 sites had critical unpatched vulnerabilities

Page 20: Three Simple Steps to Prevent Targeted Attacks

Malicious Websites

With so many vulnerable websites, cybercriminals don’t need to set up own websites to host malware

New Unique Malicious Web Domains

56,158 74,001

55,000

-24% 2013

2012

2011

Page 21: Three Simple Steps to Prevent Targeted Attacks

21

Page 22: Three Simple Steps to Prevent Targeted Attacks

1.2 Billion Records Breached

7 month period 400,000 websites SQL Vulnerability

Page 23: Three Simple Steps to Prevent Targeted Attacks

Dragonfly Attack Methods

Send an email to a person of interest

Spear Phishing

Infect a website and lie in wait for them

Watering Hole Attack

Infect software update victim downloads

Trojanized Update

23

Page 24: Three Simple Steps to Prevent Targeted Attacks

24

Page 25: Three Simple Steps to Prevent Targeted Attacks

25

Page 26: Three Simple Steps to Prevent Targeted Attacks

#2 Protect Your Websites – Patch Vulnerabilities

26

Page 27: Three Simple Steps to Prevent Targeted Attacks

1014 4562 1916 5432 1734 5690 2554 2344 1014 4562 1916 5432

An Example - POS System Attacks

Page 28: Three Simple Steps to Prevent Targeted Attacks

Internet

POS Network

Payment Processor

1014 4562 1916 5432 1734 5690 2554 2344 1014 4562 1916 5432

Page 29: Three Simple Steps to Prevent Targeted Attacks

Internet

Corporate Network

POS Network

Payment Processor

1014 4562 1916 5432 1734 5690 2554 2344 1014 4562 1916 5432

Page 30: Three Simple Steps to Prevent Targeted Attacks

Internet

Corporate Network

POS Network

Payment Processor

1014 4562 1916 5432 1734 5690 2554 2344 1014 4562 1916 5432

Page 31: Three Simple Steps to Prevent Targeted Attacks

Internet

Corporate Network

POS Network

Payment Processor

1014 4562 1916 5432 1734 5690 2554 2344 1014 4562 1916 5432

Page 32: Three Simple Steps to Prevent Targeted Attacks

32

Page 33: Three Simple Steps to Prevent Targeted Attacks

Internet

Payment Processor

1014 4562 1916 5432 1734 5690 2554 2344 1014 4562 1916 5432

Page 34: Three Simple Steps to Prevent Targeted Attacks

#3 Demand That Your Partners Have Good Security

34

Page 35: Three Simple Steps to Prevent Targeted Attacks

Security Intelligence

35

Security is Only Intelligent if its Unified

Page 36: Three Simple Steps to Prevent Targeted Attacks

Q & A

36

Kevin Haley [email protected]

@kphaley

symantec.com/threatreport