SlideShare une entreprise Scribd logo
1  sur  38
2014 Mid-Year
Threat Review
The good, the bad and the ugly
Presenter
Aryeh Goretsky, MVP, ZCSE
Distinguished Researcher
ESET North America
✉ askeset@eset.com
@eset (global)
@esetna (US + Canada)
About ESET
• Leading security solution provider for companies of all
sizes, home and phones
• Pioneered and continues to lead the industry in
proactive threat detection
• Presence in more than 180 countries worldwide
• Protecting over 100 million users
• Ten years of consecutive VB100 awards†
• 5th Largest Endpoint Security Vendor‡
†Source: Virus Bulletin Magazine
‡Source: IDC, Worldwide Endpoint Security 2013-2017 Forecast and 2012 Vendor
Shares
What’s on the agenda?
• A brief look into ESET’s threat database
• Android malware
• Banking bots & Bitcoin thieves
• Heartbleed SSL vulnerability
• Internet of Things (IoT)
• Mac & iPhone
• Nation-state malware
• Windigo/Ebury malware campaign
• Windows XP reaches its end of life
What this presentation is not about
• BYOD & mobile device threats
• Data breaches (eBay, Target, …)
• Edward Snowden, NSA, et al
• Multifactor authentication
• Passwords and PINs
• Phishing, scams & social media
• Windows 8.1 Update
Threat Database Updates
Threat Database Updates
[CHART REDACTED]
To view this slide, please see the presentation at:
https://www.brighttalk.com/webcast/1718/110971
Android is becoming Windows
Android Malware
• Amount of malware continues to grow
• Can be deployed by Windows malware (q.v.)
• Reports of smartphones & tablets shipping with
pre-installed malware
• Everything old is new again:
– first worm discovered, Android/Samsapo
– first ransomware discovered, Android/Simplocker
• On the plus side
– Google plans to periodically re-scan installed apps
– Most malware originates outside of Google Play,
device or carrier stores
Android Malware
Have you seen any malware, potentially unwanted
applications or junk apps on your Android devices?
Yes
no
Banking bots & Bitcoin thieves
• Arrival of *coin mining and stealing on multiple
platforms, technologies (Android, BAT, MSIL, Win32,
VBS)
• Win32/Corkow banking Trojan targets Bitcoin
wallets, Android developers and Russian
business bank accounts
• Win32/Qadars banking bot now drops Android
iBanking component Android/Spy.Agent.AF via
Facebook webinject
Heartbleed SSL Vulnerability
• 2 year old flaw in OpenSSL allows eavesdropping
into communications
• About two-thirds of web sites were affected
• Also affected networking gear from Cisco,
Juniper and others; in VPN software, etc.
• Windows 8 inbox VPN clients, too
• May have been exploited for those 2 years before
being discovered
Internet of Things
• Smart TVs – “Red Button” bot in your living room?
– Script injection, credential theft, malware?
– all via broadcast (EU standard, soon in US)
• Smart TVs – the spy in your living room?
– Some have microphones and webcams
• Not apparent when they’re on; or how to turn off (or if)
• Can be remotely taken over (Samsung)
– Sent viewing habits, URLs, filenames of private videos (LG)
– Replace images/videos on screen (Philips)
• Tesla’s iPhone app, used to lock/unlock vehicle,
vulnerable to brute-forcing
IOiT: Routers and DVRs, etc.
• Residential gateway broadband routers under attack
from worms like Win32/RBrute
– DNS changing
• Browser injection
– Ad injection substitution, spying, etc.
• Credential theft
– bank fraud, shopping, social media, webmail …
• Search engine redirection
– Bing, Google, Yahoo redirect to sponsored & PPC searches
– coin mining (DVR, NAS...)
• Nowhere near as effective as PCs, but remember:
“Quantity has a quality all its own.” – Joseph Stalin
IOiT: Routers and DVRs, etc.
[LIST OF AFFECTED
VENDORS REDACTED]
To view this slide, please see the presentation at:
https://www.brighttalk.com/webcast/1718/110971
IOiT: Routers and DVRs, etc.
Reminder:
1. Disable access to admin settings on LAN and
wireless interfaces
2. Update firmware to latest version (manual check
may be required-do not rely on autoupdate)
3. Use a str0ng password
IOiT: Fighting router-based threats
Internet of Things
Do you use any of these Internet connected
devices?
 Home Automation (thermostat, fire/CO2
alarms, X10, Zigbee, etc.)
 Network Attached Storage (NAS)
 Next-gen gaming console
 Router / Wi-FI Access Point
 Smart TV and/or Digital Video Recorder (DVR)
Mac, iPad & iPhone
an Apple a day…
No major campaigns targeting OS X & iOS, but…
• GotoFail, a critical SSL vulnerability is patched
• Targeted attacks continue, such as against
Chinese and Tibetan advocacy groups
• Weird ransomware attacks target Australian and
New Zealand iPhones, iPads & Macs
Nation-state malware update
• OSX/Appetite trojan used against Falun Gong
and Tibetan activists
• MiniDuke (aka Win32/SandaEva) continues to be
used
– Targets include European governments, institutions
and NGOs
• Use of Win32/Agent.VXU against Ministry of
Natural Resources and the Environment in
Vietnam (US equivalent: EPA)
The Windigo Campaign
…anything but Windows
• Started with investigation into Linux/Ebury
– OpenSSH backdoor + credential stealer
– Malicious library and patch to OpenSSH binaries
– Took several steps to avoid detection
• Includes Linux/Cdorked, Perl/Calfbot and
Win32/Glupteba.M families
• Over 25,000 servers infected over past 2 years
• Affected Linux, FreeBSD, OpenBSD, Mac OS X
– Plus some Windows servers running Perl + Cygwin
Windows XP reaches EOL status
• On April 8th, support ended for Windows XP
– An update, MS14-021, released on 5/1/14 due to
extraordinary circumstances
– One-time event, don’t expect it again
• Globally, 30% of PCs still running XP
– Regionally, ranging from 11% to 61% usage
• If you’re still running XP:
– Patch systems to final set of updates
– Isolate
– Figure out migration strategy now
Resources: Android
ESET’s We Live Security (blog)
• Android malware worm catches unwary users
• Android malware? Google will be watching your every move
• Android phones and tablets ship “pre-infected” with malware
• ESET Analyzes First Android File-Encrypting, TOR-Enabled
Ransomware
ESET’s Virus Radar (threat encyclopedia)
• Android/Samsapo
• Android/Simplocker
Resources: Banking Bots & Trojans
ESET’s We Live Security (blog)
• Facebook Webinject Leads to iBanking Mobile Bot
• Corkow: Analysis of a business-oriented banking Trojan
• Corkow – the lesser-known Bitcoin-curious cousin of the Russian
banking Trojan family
• Surveillance cameras hijacked to mine Bitcoin while watching you
ESET’s Virus Radar (threat encyclopedia)
• Win32/Corkow
• Win32/Qadars
• Android/Spy.Agent.AF
Resources: Heartbleed
ESET’s We Live Security (blog)
• All eyes on Heartbleed bug: Worse than feared and could affect
“billions”
• Heartbleed claims British moms and Canadian tax payers as
victims
• Heartbleed encryption flaw leaves millions of sites at risk
• “I am responsible”: Heartbleed developer breaks silence
Resources: Internet of Things (1/4)
ESET’s We Live Security (blog)
• Attack on Samsung’s Boxee TV service leaks 158,000 passwords
and emails
• Channel Cybercrime: Bug allows hackers to hijack screen of
Philips TVs
• Fridge raiders: Will 2014 really be the year your smart home gets
hacked?
• Hacker amasses $620,000 in cryptocurrency using infected
computers
• LG admits that its Smart TVs have been watching users and
transmitting data without consent
Resources: Internet of Things (2/4)
ESET’s We Live Security (blog)
• ‘Major’ Smart TV vulnerability could allow mass wireless attacks
• More than 300,000 wireless routers hijacked by criminals in global
attack
• Mysterious ‘Moon’ worm spreads into many Linksys routers – and
hunts new victims
• Simplocker Ransomware: New variants spread by Android
downloader apps
• Smart TVs can be infected with spyware – just like smartphones
Resources: Internet of Things (3/4)
ESET’s We Live Security (blog)
• Stop TVs spying on us. U.S. Senator calls for safer Smart devices
• Surveillance cameras hijacked to mine Bitcoin while watching you
• Tesla shocker as researcher picks electric supercar’s lock
• The Internet of Things isn’t a malware-laced game of cyber-
Cluedo… yet
• Win32/Sality newest component: a router’s primary DNS changer
named Win32/Rbrute
Resources: Internet of Things (4/4)
ESET’s Virus Radar (threat encyclopedia)
• Win32/Sality
• Win32/Rbrute
Resources: Mac Malware
ESET’s We Live Security (blog)
• 10 years of Mac OS X malware
• Five tips to help control your privacy on Mac OS X
• iPhone and Apple ransom incidents? Don’t delay locking down
your i-stuff
• Master of Mavericks: How to secure your Mac using Apple’s latest
update
• Urgent iPhone and iPad security update, Mac OS X as well
ESET’s Virus Radar (threat encyclopedia)
• OSX/Appetite
Resources: Nation-State Update
ESET’s We Live Security (blog)
• 10 years of Mac OS X malware
• Miniduke still duking it out
ESET’s Virus Radar (threat encyclopedia)
• OSX/Appetite
• Win32/Agent.VXU
• Win32/SandyEva (MiniDuke)
Resources: Windigo Campaign
ESET’s We Live Security (blog)
• An in-depth Analysis of Linux/Ebury
• Interview: Windigo victim speaks out on the ‘stealth’ malware that
attacked his global company
• Operation Windigo – the vivisection of a large Linux server-side
credential-stealing malware campaign
• Over 500,000 PCs attacked every day after 25,000 UNIX servers
hijacked by Operation Windigo
• Windigo not Windigone: Linux/Ebury updated
ESET research papers
• Operation Windigo (PDF)
Resources: Windows XP EOL
ESET’s We Live Security (blog)
• 5 Tips for protecting Windows XP machines after April 8, 2014
• Goodbye, Windows XP!
• With just days to go, just how many PCs are still running Windows
XP?
• Windows exploitation in 2013
• XP-diency: beyond the end of the line
Special Thanks
Kudos to
Bruce P. Burrell
David Harley
Amelia Hew
Emilio Plumey
Javier Segura
Aaron Sheinbein
Marek Zeman
for their assistance with the ESET 2014 Mid Year Threat
Report!
I would like to request one of the following
Contact from ESET Sales
Business Edition Trial
PassMark® Competitive Analysis Report
Monthly Global Threat Report
Polling question:
Q&A Discussion
2014: Mid-Year Threat Review

Contenu connexe

Tendances

Mengenal ZEUS Botnet Lebih Dekat
Mengenal ZEUS Botnet Lebih DekatMengenal ZEUS Botnet Lebih Dekat
Mengenal ZEUS Botnet Lebih DekatCharles Lim
 
Introduction to Malware - Part 1
Introduction to Malware - Part 1 Introduction to Malware - Part 1
Introduction to Malware - Part 1 Lastline, Inc.
 
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...CODE BLUE
 
Malware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade DetectionMalware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade DetectionLastline, Inc.
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoJohn Bambenek
 
Mickey pacsec2016_final
Mickey pacsec2016_finalMickey pacsec2016_final
Mickey pacsec2016_finalPacSecJP
 
Most Ransomware Isn’t As Complex As You Might Think – Black Hat 2015
Most Ransomware Isn’t As Complex As You Might Think – Black Hat 2015 Most Ransomware Isn’t As Complex As You Might Think – Black Hat 2015
Most Ransomware Isn’t As Complex As You Might Think – Black Hat 2015 Lastline, Inc.
 
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in FirmwareUsing Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in FirmwareLastline, Inc.
 
Corporate Espionage without the Hassle of Committing Felonies
Corporate Espionage without the Hassle of Committing FeloniesCorporate Espionage without the Hassle of Committing Felonies
Corporate Espionage without the Hassle of Committing FeloniesJohn Bambenek
 
Now you see me, now you don't: chasing evasive malware - Giovanni Vigna
Now you see me, now you don't: chasing evasive malware - Giovanni Vigna Now you see me, now you don't: chasing evasive malware - Giovanni Vigna
Now you see me, now you don't: chasing evasive malware - Giovanni Vigna Lastline, Inc.
 
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse TeamsUsing GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse TeamsAndrew Morris
 
Weekend Malware Research 2012
Weekend Malware Research 2012Weekend Malware Research 2012
Weekend Malware Research 2012Andrew Morris
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021Adam Shostack
 
Cracking Into Embedded Devices - Hack in The Box Dubai 2008
Cracking Into Embedded Devices - Hack in The Box Dubai 2008Cracking Into Embedded Devices - Hack in The Box Dubai 2008
Cracking Into Embedded Devices - Hack in The Box Dubai 2008guest642391
 
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
Threat Dissection - Alberto Soliño Testa Research Director, Core SecurityThreat Dissection - Alberto Soliño Testa Research Director, Core Security
Threat Dissection - Alberto Soliño Testa Research Director, Core SecurityCore Security
 
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...Andrew Morris
 
Python-Assisted Red-Teaming Operation
Python-Assisted Red-Teaming OperationPython-Assisted Red-Teaming Operation
Python-Assisted Red-Teaming OperationSatria Ady Pradana
 
Threat Modeling Lessons from Star Wars
Threat Modeling Lessons from Star WarsThreat Modeling Lessons from Star Wars
Threat Modeling Lessons from Star WarsAdam Shostack
 

Tendances (20)

Mengenal ZEUS Botnet Lebih Dekat
Mengenal ZEUS Botnet Lebih DekatMengenal ZEUS Botnet Lebih Dekat
Mengenal ZEUS Botnet Lebih Dekat
 
Introduction to Malware - Part 1
Introduction to Malware - Part 1 Introduction to Malware - Part 1
Introduction to Malware - Part 1
 
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
 
Malware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade DetectionMalware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade Detection
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using Crypto
 
Mickey pacsec2016_final
Mickey pacsec2016_finalMickey pacsec2016_final
Mickey pacsec2016_final
 
Lastline Case Study
Lastline Case StudyLastline Case Study
Lastline Case Study
 
Most Ransomware Isn’t As Complex As You Might Think – Black Hat 2015
Most Ransomware Isn’t As Complex As You Might Think – Black Hat 2015 Most Ransomware Isn’t As Complex As You Might Think – Black Hat 2015
Most Ransomware Isn’t As Complex As You Might Think – Black Hat 2015
 
Another Side of Hacking
Another Side of HackingAnother Side of Hacking
Another Side of Hacking
 
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in FirmwareUsing Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
 
Corporate Espionage without the Hassle of Committing Felonies
Corporate Espionage without the Hassle of Committing FeloniesCorporate Espionage without the Hassle of Committing Felonies
Corporate Espionage without the Hassle of Committing Felonies
 
Now you see me, now you don't: chasing evasive malware - Giovanni Vigna
Now you see me, now you don't: chasing evasive malware - Giovanni Vigna Now you see me, now you don't: chasing evasive malware - Giovanni Vigna
Now you see me, now you don't: chasing evasive malware - Giovanni Vigna
 
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse TeamsUsing GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams
 
Weekend Malware Research 2012
Weekend Malware Research 2012Weekend Malware Research 2012
Weekend Malware Research 2012
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021
 
Cracking Into Embedded Devices - Hack in The Box Dubai 2008
Cracking Into Embedded Devices - Hack in The Box Dubai 2008Cracking Into Embedded Devices - Hack in The Box Dubai 2008
Cracking Into Embedded Devices - Hack in The Box Dubai 2008
 
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
Threat Dissection - Alberto Soliño Testa Research Director, Core SecurityThreat Dissection - Alberto Soliño Testa Research Director, Core Security
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
 
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...
 
Python-Assisted Red-Teaming Operation
Python-Assisted Red-Teaming OperationPython-Assisted Red-Teaming Operation
Python-Assisted Red-Teaming Operation
 
Threat Modeling Lessons from Star Wars
Threat Modeling Lessons from Star WarsThreat Modeling Lessons from Star Wars
Threat Modeling Lessons from Star Wars
 

En vedette

Corporate Logo Design
Corporate Logo DesignCorporate Logo Design
Corporate Logo DesignMary Dave
 
Uk and Ireland with tierra
Uk and Ireland with tierraUk and Ireland with tierra
Uk and Ireland with tierraTierra Travels
 
Some Cake Design
Some Cake DesignSome Cake Design
Some Cake DesignMary Dave
 
Tierra and Corporates 2013
Tierra and Corporates 2013Tierra and Corporates 2013
Tierra and Corporates 2013Tierra Travels
 
Emotive Media - Visualization and Analysis of Human Bio-Feedback Data
Emotive Media - Visualization and Analysis of Human Bio-Feedback DataEmotive Media - Visualization and Analysis of Human Bio-Feedback Data
Emotive Media - Visualization and Analysis of Human Bio-Feedback DataArtur Lugmayr
 
Banking Online
Banking OnlineBanking Online
Banking OnlineESET
 
Graphic Design and Services
Graphic Design and ServicesGraphic Design and Services
Graphic Design and ServicesMary Dave
 
Art & Graphic Work
Art & Graphic WorkArt & Graphic Work
Art & Graphic WorkMary Dave
 
The great migration with Tierra July 2013
The great migration with Tierra July 2013The great migration with Tierra July 2013
The great migration with Tierra July 2013Tierra Travels
 
Unpack your troubles*: .NET packer tricks and countermeasures
Unpack your troubles*: .NET packer tricks and countermeasuresUnpack your troubles*: .NET packer tricks and countermeasures
Unpack your troubles*: .NET packer tricks and countermeasuresESET
 
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...ESET
 

En vedette (13)

Corporate Logo Design
Corporate Logo DesignCorporate Logo Design
Corporate Logo Design
 
Logodesign1
Logodesign1Logodesign1
Logodesign1
 
Uk and Ireland with tierra
Uk and Ireland with tierraUk and Ireland with tierra
Uk and Ireland with tierra
 
Some Cake Design
Some Cake DesignSome Cake Design
Some Cake Design
 
Tierra and Corporates 2013
Tierra and Corporates 2013Tierra and Corporates 2013
Tierra and Corporates 2013
 
Design
DesignDesign
Design
 
Emotive Media - Visualization and Analysis of Human Bio-Feedback Data
Emotive Media - Visualization and Analysis of Human Bio-Feedback DataEmotive Media - Visualization and Analysis of Human Bio-Feedback Data
Emotive Media - Visualization and Analysis of Human Bio-Feedback Data
 
Banking Online
Banking OnlineBanking Online
Banking Online
 
Graphic Design and Services
Graphic Design and ServicesGraphic Design and Services
Graphic Design and Services
 
Art & Graphic Work
Art & Graphic WorkArt & Graphic Work
Art & Graphic Work
 
The great migration with Tierra July 2013
The great migration with Tierra July 2013The great migration with Tierra July 2013
The great migration with Tierra July 2013
 
Unpack your troubles*: .NET packer tricks and countermeasures
Unpack your troubles*: .NET packer tricks and countermeasuresUnpack your troubles*: .NET packer tricks and countermeasures
Unpack your troubles*: .NET packer tricks and countermeasures
 
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
 

Similaire à 2014: Mid-Year Threat Review

NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)Vince Verbeke
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to InfrastructureJorge Orchilles
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013Petr Dvorak
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Andris Soroka
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Virusesmkgspsu
 
Mobile security
Mobile securityMobile security
Mobile securityStefaan
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...Eoin Keary
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksMichael Davis
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalFrank Siepmann
 
Kaseya Connect 2012 – A Kaspersky Researcher Perspective
Kaseya Connect 2012 – A Kaspersky Researcher PerspectiveKaseya Connect 2012 – A Kaspersky Researcher Perspective
Kaseya Connect 2012 – A Kaspersky Researcher PerspectiveKaseya
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII studentsAkiumi Hasegawa
 
Ransomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion MenaceRansomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion MenaceZubair Baig
 
Cyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptxCyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptxDrMajidMumtaz
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing BotBellaj Badr
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationTom Eston
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Securitysudip pudasaini
 

Similaire à 2014: Mid-Year Threat Review (20)

NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to Infrastructure
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
 
WhatsApp Forensic
WhatsApp ForensicWhatsApp Forensic
WhatsApp Forensic
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Mobile security
Mobile securityMobile security
Mobile security
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
Kaseya Connect 2012 – A Kaspersky Researcher Perspective
Kaseya Connect 2012 – A Kaspersky Researcher PerspectiveKaseya Connect 2012 – A Kaspersky Researcher Perspective
Kaseya Connect 2012 – A Kaspersky Researcher Perspective
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
Ransomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion MenaceRansomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion Menace
 
Cyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptxCyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptx
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing Bot
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 

Plus de ESET

ESET Cybersecurity students
ESET Cybersecurity studentsESET Cybersecurity students
ESET Cybersecurity studentsESET
 
ESET Cybersecurity training
ESET Cybersecurity trainingESET Cybersecurity training
ESET Cybersecurity trainingESET
 
How to implement a robust information security management system?
How to implement a robust information security management system?How to implement a robust information security management system?
How to implement a robust information security management system?ESET
 
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...ESET
 
Visiting the Bear Den
Visiting the Bear DenVisiting the Bear Den
Visiting the Bear DenESET
 
ESET Quick Guide to the EU General Data Protection Regulation
ESET Quick Guide to the EU General Data Protection RegulationESET Quick Guide to the EU General Data Protection Regulation
ESET Quick Guide to the EU General Data Protection RegulationESET
 
Bootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus BulletinBootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus BulletinESET
 
Shopping Online
Shopping OnlineShopping Online
Shopping OnlineESET
 
Is Linux/Moose endangered or extinct?
Is Linux/Moose endangered or extinct? Is Linux/Moose endangered or extinct?
Is Linux/Moose endangered or extinct? ESET
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET
 
ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET
 
ESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET
 
#DoMore with ESET
#DoMore with ESET#DoMore with ESET
#DoMore with ESETESET
 
Learn more about ESET and our soulutions for mobile platforms
Learn more about ESET and our soulutions for mobile platformsLearn more about ESET and our soulutions for mobile platforms
Learn more about ESET and our soulutions for mobile platformsESET
 
Trends for 2014: The Challenge of Internet Privacy
Trends for 2014: The Challenge of Internet PrivacyTrends for 2014: The Challenge of Internet Privacy
Trends for 2014: The Challenge of Internet PrivacyESET
 
ESET Technology From
ESET Technology FromESET Technology From
ESET Technology FromESET
 
Why do THEY want your digital devices?
Why do THEY want your digital devices?Why do THEY want your digital devices?
Why do THEY want your digital devices?ESET
 
ESET is introducing its brand new product ESET Secure Authentication
ESET is introducing its brand new product ESET Secure AuthenticationESET is introducing its brand new product ESET Secure Authentication
ESET is introducing its brand new product ESET Secure AuthenticationESET
 

Plus de ESET (18)

ESET Cybersecurity students
ESET Cybersecurity studentsESET Cybersecurity students
ESET Cybersecurity students
 
ESET Cybersecurity training
ESET Cybersecurity trainingESET Cybersecurity training
ESET Cybersecurity training
 
How to implement a robust information security management system?
How to implement a robust information security management system?How to implement a robust information security management system?
How to implement a robust information security management system?
 
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
 
Visiting the Bear Den
Visiting the Bear DenVisiting the Bear Den
Visiting the Bear Den
 
ESET Quick Guide to the EU General Data Protection Regulation
ESET Quick Guide to the EU General Data Protection RegulationESET Quick Guide to the EU General Data Protection Regulation
ESET Quick Guide to the EU General Data Protection Regulation
 
Bootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus BulletinBootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus Bulletin
 
Shopping Online
Shopping OnlineShopping Online
Shopping Online
 
Is Linux/Moose endangered or extinct?
Is Linux/Moose endangered or extinct? Is Linux/Moose endangered or extinct?
Is Linux/Moose endangered or extinct?
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business Products
 
ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to Enterprises
 
ESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large Businesses
 
#DoMore with ESET
#DoMore with ESET#DoMore with ESET
#DoMore with ESET
 
Learn more about ESET and our soulutions for mobile platforms
Learn more about ESET and our soulutions for mobile platformsLearn more about ESET and our soulutions for mobile platforms
Learn more about ESET and our soulutions for mobile platforms
 
Trends for 2014: The Challenge of Internet Privacy
Trends for 2014: The Challenge of Internet PrivacyTrends for 2014: The Challenge of Internet Privacy
Trends for 2014: The Challenge of Internet Privacy
 
ESET Technology From
ESET Technology FromESET Technology From
ESET Technology From
 
Why do THEY want your digital devices?
Why do THEY want your digital devices?Why do THEY want your digital devices?
Why do THEY want your digital devices?
 
ESET is introducing its brand new product ESET Secure Authentication
ESET is introducing its brand new product ESET Secure AuthenticationESET is introducing its brand new product ESET Secure Authentication
ESET is introducing its brand new product ESET Secure Authentication
 

Dernier

Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxRTS corp
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...Akihiro Suda
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfYashikaSharma391629
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxAndreas Kunz
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 

Dernier (20)

Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 

2014: Mid-Year Threat Review

  • 1. 2014 Mid-Year Threat Review The good, the bad and the ugly
  • 2. Presenter Aryeh Goretsky, MVP, ZCSE Distinguished Researcher ESET North America ✉ askeset@eset.com @eset (global) @esetna (US + Canada)
  • 3. About ESET • Leading security solution provider for companies of all sizes, home and phones • Pioneered and continues to lead the industry in proactive threat detection • Presence in more than 180 countries worldwide • Protecting over 100 million users • Ten years of consecutive VB100 awards† • 5th Largest Endpoint Security Vendor‡ †Source: Virus Bulletin Magazine ‡Source: IDC, Worldwide Endpoint Security 2013-2017 Forecast and 2012 Vendor Shares
  • 4. What’s on the agenda? • A brief look into ESET’s threat database • Android malware • Banking bots & Bitcoin thieves • Heartbleed SSL vulnerability • Internet of Things (IoT) • Mac & iPhone • Nation-state malware • Windigo/Ebury malware campaign • Windows XP reaches its end of life
  • 5. What this presentation is not about • BYOD & mobile device threats • Data breaches (eBay, Target, …) • Edward Snowden, NSA, et al • Multifactor authentication • Passwords and PINs • Phishing, scams & social media • Windows 8.1 Update
  • 7. Threat Database Updates [CHART REDACTED] To view this slide, please see the presentation at: https://www.brighttalk.com/webcast/1718/110971
  • 9. Android Malware • Amount of malware continues to grow • Can be deployed by Windows malware (q.v.) • Reports of smartphones & tablets shipping with pre-installed malware • Everything old is new again: – first worm discovered, Android/Samsapo – first ransomware discovered, Android/Simplocker • On the plus side – Google plans to periodically re-scan installed apps – Most malware originates outside of Google Play, device or carrier stores
  • 10.
  • 11. Android Malware Have you seen any malware, potentially unwanted applications or junk apps on your Android devices? Yes no
  • 12. Banking bots & Bitcoin thieves • Arrival of *coin mining and stealing on multiple platforms, technologies (Android, BAT, MSIL, Win32, VBS) • Win32/Corkow banking Trojan targets Bitcoin wallets, Android developers and Russian business bank accounts • Win32/Qadars banking bot now drops Android iBanking component Android/Spy.Agent.AF via Facebook webinject
  • 13. Heartbleed SSL Vulnerability • 2 year old flaw in OpenSSL allows eavesdropping into communications • About two-thirds of web sites were affected • Also affected networking gear from Cisco, Juniper and others; in VPN software, etc. • Windows 8 inbox VPN clients, too • May have been exploited for those 2 years before being discovered
  • 14. Internet of Things • Smart TVs – “Red Button” bot in your living room? – Script injection, credential theft, malware? – all via broadcast (EU standard, soon in US) • Smart TVs – the spy in your living room? – Some have microphones and webcams • Not apparent when they’re on; or how to turn off (or if) • Can be remotely taken over (Samsung) – Sent viewing habits, URLs, filenames of private videos (LG) – Replace images/videos on screen (Philips) • Tesla’s iPhone app, used to lock/unlock vehicle, vulnerable to brute-forcing
  • 15. IOiT: Routers and DVRs, etc. • Residential gateway broadband routers under attack from worms like Win32/RBrute – DNS changing • Browser injection – Ad injection substitution, spying, etc. • Credential theft – bank fraud, shopping, social media, webmail … • Search engine redirection – Bing, Google, Yahoo redirect to sponsored & PPC searches – coin mining (DVR, NAS...) • Nowhere near as effective as PCs, but remember: “Quantity has a quality all its own.” – Joseph Stalin
  • 16. IOiT: Routers and DVRs, etc. [LIST OF AFFECTED VENDORS REDACTED] To view this slide, please see the presentation at: https://www.brighttalk.com/webcast/1718/110971
  • 17. IOiT: Routers and DVRs, etc. Reminder: 1. Disable access to admin settings on LAN and wireless interfaces 2. Update firmware to latest version (manual check may be required-do not rely on autoupdate) 3. Use a str0ng password
  • 19. Internet of Things Do you use any of these Internet connected devices?  Home Automation (thermostat, fire/CO2 alarms, X10, Zigbee, etc.)  Network Attached Storage (NAS)  Next-gen gaming console  Router / Wi-FI Access Point  Smart TV and/or Digital Video Recorder (DVR)
  • 20. Mac, iPad & iPhone an Apple a day… No major campaigns targeting OS X & iOS, but… • GotoFail, a critical SSL vulnerability is patched • Targeted attacks continue, such as against Chinese and Tibetan advocacy groups • Weird ransomware attacks target Australian and New Zealand iPhones, iPads & Macs
  • 21. Nation-state malware update • OSX/Appetite trojan used against Falun Gong and Tibetan activists • MiniDuke (aka Win32/SandaEva) continues to be used – Targets include European governments, institutions and NGOs • Use of Win32/Agent.VXU against Ministry of Natural Resources and the Environment in Vietnam (US equivalent: EPA)
  • 22. The Windigo Campaign …anything but Windows • Started with investigation into Linux/Ebury – OpenSSH backdoor + credential stealer – Malicious library and patch to OpenSSH binaries – Took several steps to avoid detection • Includes Linux/Cdorked, Perl/Calfbot and Win32/Glupteba.M families • Over 25,000 servers infected over past 2 years • Affected Linux, FreeBSD, OpenBSD, Mac OS X – Plus some Windows servers running Perl + Cygwin
  • 23. Windows XP reaches EOL status • On April 8th, support ended for Windows XP – An update, MS14-021, released on 5/1/14 due to extraordinary circumstances – One-time event, don’t expect it again • Globally, 30% of PCs still running XP – Regionally, ranging from 11% to 61% usage • If you’re still running XP: – Patch systems to final set of updates – Isolate – Figure out migration strategy now
  • 24. Resources: Android ESET’s We Live Security (blog) • Android malware worm catches unwary users • Android malware? Google will be watching your every move • Android phones and tablets ship “pre-infected” with malware • ESET Analyzes First Android File-Encrypting, TOR-Enabled Ransomware ESET’s Virus Radar (threat encyclopedia) • Android/Samsapo • Android/Simplocker
  • 25. Resources: Banking Bots & Trojans ESET’s We Live Security (blog) • Facebook Webinject Leads to iBanking Mobile Bot • Corkow: Analysis of a business-oriented banking Trojan • Corkow – the lesser-known Bitcoin-curious cousin of the Russian banking Trojan family • Surveillance cameras hijacked to mine Bitcoin while watching you ESET’s Virus Radar (threat encyclopedia) • Win32/Corkow • Win32/Qadars • Android/Spy.Agent.AF
  • 26. Resources: Heartbleed ESET’s We Live Security (blog) • All eyes on Heartbleed bug: Worse than feared and could affect “billions” • Heartbleed claims British moms and Canadian tax payers as victims • Heartbleed encryption flaw leaves millions of sites at risk • “I am responsible”: Heartbleed developer breaks silence
  • 27. Resources: Internet of Things (1/4) ESET’s We Live Security (blog) • Attack on Samsung’s Boxee TV service leaks 158,000 passwords and emails • Channel Cybercrime: Bug allows hackers to hijack screen of Philips TVs • Fridge raiders: Will 2014 really be the year your smart home gets hacked? • Hacker amasses $620,000 in cryptocurrency using infected computers • LG admits that its Smart TVs have been watching users and transmitting data without consent
  • 28. Resources: Internet of Things (2/4) ESET’s We Live Security (blog) • ‘Major’ Smart TV vulnerability could allow mass wireless attacks • More than 300,000 wireless routers hijacked by criminals in global attack • Mysterious ‘Moon’ worm spreads into many Linksys routers – and hunts new victims • Simplocker Ransomware: New variants spread by Android downloader apps • Smart TVs can be infected with spyware – just like smartphones
  • 29. Resources: Internet of Things (3/4) ESET’s We Live Security (blog) • Stop TVs spying on us. U.S. Senator calls for safer Smart devices • Surveillance cameras hijacked to mine Bitcoin while watching you • Tesla shocker as researcher picks electric supercar’s lock • The Internet of Things isn’t a malware-laced game of cyber- Cluedo… yet • Win32/Sality newest component: a router’s primary DNS changer named Win32/Rbrute
  • 30. Resources: Internet of Things (4/4) ESET’s Virus Radar (threat encyclopedia) • Win32/Sality • Win32/Rbrute
  • 31. Resources: Mac Malware ESET’s We Live Security (blog) • 10 years of Mac OS X malware • Five tips to help control your privacy on Mac OS X • iPhone and Apple ransom incidents? Don’t delay locking down your i-stuff • Master of Mavericks: How to secure your Mac using Apple’s latest update • Urgent iPhone and iPad security update, Mac OS X as well ESET’s Virus Radar (threat encyclopedia) • OSX/Appetite
  • 32. Resources: Nation-State Update ESET’s We Live Security (blog) • 10 years of Mac OS X malware • Miniduke still duking it out ESET’s Virus Radar (threat encyclopedia) • OSX/Appetite • Win32/Agent.VXU • Win32/SandyEva (MiniDuke)
  • 33. Resources: Windigo Campaign ESET’s We Live Security (blog) • An in-depth Analysis of Linux/Ebury • Interview: Windigo victim speaks out on the ‘stealth’ malware that attacked his global company • Operation Windigo – the vivisection of a large Linux server-side credential-stealing malware campaign • Over 500,000 PCs attacked every day after 25,000 UNIX servers hijacked by Operation Windigo • Windigo not Windigone: Linux/Ebury updated ESET research papers • Operation Windigo (PDF)
  • 34. Resources: Windows XP EOL ESET’s We Live Security (blog) • 5 Tips for protecting Windows XP machines after April 8, 2014 • Goodbye, Windows XP! • With just days to go, just how many PCs are still running Windows XP? • Windows exploitation in 2013 • XP-diency: beyond the end of the line
  • 35. Special Thanks Kudos to Bruce P. Burrell David Harley Amelia Hew Emilio Plumey Javier Segura Aaron Sheinbein Marek Zeman for their assistance with the ESET 2014 Mid Year Threat Report!
  • 36. I would like to request one of the following Contact from ESET Sales Business Edition Trial PassMark® Competitive Analysis Report Monthly Global Threat Report Polling question:

Notes de l'éditeur

  1. The data in the following chart can be extremely misleading due to difficulties to interpretation. It is not accurate at all, because: there’s no direct correlation between # of signatures & threats they protect against doesn’t take into account non-signature-based technologies like heuristics, generic, genetic algorithms, neural net stuff, etc. Keep in mind: one signature may detect entire multiple families of malware (some of which can generate 4.2B+ variants) 2-3 dozen may be required to detect a single family of malware It is most useful to think of it at as a measure of workload relative activity of malware in the threatscape amount of effort expended to combat it So, why show it to you? I thought it would be interesting to look at. May highlight some interesting behaviors… So, with this cautionary messaging in mind, let’s see how busy ESET’s threat research lab was in the first half of 2014…
  2. NB: This slide will be redacted from the published version of the deck The threat research lab is receiving about 200K samples a day. Sometimes more The valleys that you see, by the way, are a development that has become more prevalent over the past few years. As malware creation and distribution has evolved into an industry…. they’ve become businesses in themselves. And they don’t like to work weekends. This data is specifically for malware only. If, for example, we were to look at data on phishing, we would see huge spikes on Fridays. Phishers like to target you on Fridays so they have the weekend to clean out your account before you think of contacting your bank on Monday. The two spikes that you see mid-April are from base signature updates—the first one goes off to around 9,000, and the second to 2,000.
  3. In 2012, number of unique Android malware detections increased 17× (yes, that’s 1,700%) Mobile malware (Android) is growing rapidly: 2010 3 families 2011 51 families 2012 63 families 2013* 79 families Between 2012 and 2013, detections of Android malware by ESET increased by 63%* Sources: Trends for 2013, Astounding Growth of Mobile Malware [pdf], Trends for 2014:The Challenge of Internet Privacy [pdf] *data for 2013 is from first 10 months of year See the Mobile Device Threats and BYOD Webinar that I gave on BrightTalk for more details.
  4. Cartoon courtesy of David Harley.
  5. On the financial targeting malware side, The success of Bitcoin and related computer mediated, decentralized cryptocurrencies such as dogecoin and litecoin, initially as darkweb currencies, and later into other areas, has spawned a whole new class of entrepreneurs, except that instead of generating or trading in coins, they are interested in either stealing the wallets, or botting machines and using it to mine for them. The two operations, by the way, are not always mutually exclusive. Corkow is interesting because banking bots have traditionally been very focused on banks, usually clustered on regional boundaries (US banks, UK banks, RU banks, etc.). While the regional specialization continues, Corkow is interesting because it’s been fine-tuned a little, at least in that it’s mostly targeting banks used primarily by businesses, as opposed to individuals. Also brokerages, as well. Mobile banking has not been adopted as widely in the US yet as it has in EU and APAC, but that’s likely to change, especially as Chip & PIN systems are phased in over the next few years.
  6. Heartbleed allowed private keys to be viewed, which means that information normally protected by cryptography could be stolen by an attacker. SANS ranked it as a top threat. Number of affected sites now estimated to be down to 15%, but still a lot of patching going on. Will be a problem on software and devices which are no longer supported, manufactured for years to come, I’m afraid.
  7. Hybrid Broadcast Broadband TV or “HbbTV” – hbbtv.org In 2012, some 80M Smart TVs were sold. These are devices which run an embedded operating system in firmware, often like Android, but can be something else like WindRiver, QNX, etc. These are manufactured by consumer electronics companies, for whom security is not something they typically think of first, last, and during the process. They may not even have developed the firmware, but licensed it from someone else. As such, they have no SDL, and perhaps no plans to update it, ever. When Samsung was notified of their Smart TV’s webcams being hacked in 2012, their initial response was to tell people to cover the lens - http://www.nbcnews.com/tech/security/tv-watching-you-senator-calls-smarter-smart-tv-security-f6C10869252
  8. We’re not standing by idly. This is a screenshot showing a technology we’re rolling out to help inform users when their router may have been compromised.
  9. Gotofail was the name given to an SSL vulnerability in devices running iOS and OS X, not unlike the Heartbleed vulnerability. An attacker could perform a MitM attack, bypassing SSL/TLS verification during the initial connection, and masquerade as a trusted server. Named after accidental inclusion of a command “gotofail;” which caused this error to occur. Nice write up at http://grahamcluley.com/2014/02/critical-security-hole-ios-mac/
  10. Credential theft Cpanel targeting Spam runs Web site takeovers for malware injection/deployment 10,000+ still infected as of March, 2014
  11. ESET is a team, and I would not have been able to give this report without assistance from my coworkers.