SlideShare une entreprise Scribd logo
1  sur  24
Télécharger pour lire hors ligne
McAfee Labs Threats Report | Fourth Quarter 2013 1
McAfee Labs
Threats Report
Report
Fourth Quarter 2013
McAfee Labs Threats Report | Fourth Quarter 2013 2
About McAfee Labs
McAfee Labs is the world’s leading source for threat research, threat intelligence,
and cybersecurity thought leadership. With data from millions of sensors across key
threats vectors—file, web, message, and network—McAfee Labs delivers real-time
threat intelligence, critical analysis, and expert thinking to improve protection and
reduce risks.
www.mcafee.com/us/mcafee-labs.aspx
Introduction
Welcome to the McAfee Labs Threats Report: Fourth Quarter 2013. As we kick off
the New Year, we take a fresh approach to our Threats Reports. Beginning with this
edition, we present a shorter publication, with “Key Topics” covering top threats or
security issues from the quarter. We also focus (on a rotating basis) on threat concerns
surrounding the four IT megatrends: mobile, social, cloud, and big data. The report is
now visually richer and easier to navigate.
Not lost in this evolutionary approach is the rich set of threats data that we collect
through our McAfee Global Threat Intelligence network. By continuing to publish
that data—most of which is in time series—our readers can gain a better understanding
of the changing threats landscape.
This quarter, we illustrate how the malware industry aided and abetted the point-
of-sale attacks on Target and other retailers, examine how malicious signed binaries
undermine the stamp of approval that Certificate Authorities provide, describe the
impact of McAfee Labs discovering a zero-day vulnerability in Microsoft Office, and
look at the excessive data collection of mobile apps and their relationship to malware.
Vincent Weafer, Senior Vice President, McAfee Labs
We are working
to make our threats
reports more vivid
and relevant. We hope
you like the changes.
Follow McAfee Labs
Contents
Executive Summary	 4
Key Topics of the quarter
The cybercrime industry and its role in POS attacks 	 6
Malicious signed binaries:
Can we trust the Certificate Authority model? 	 9
Microsoft Office zero-day exploit:
Discovered by McAfee Labs 	 11
Mobile malware: the march continues	 12
Threats Statistics
Malware 	 15
Web threats 	 19
Messaging threats	 21
Network threats 	 22
McAfee Labs Threats Report
Fourth Quarter 2013
This report was prepared
and written by:
Benjamin Cruz
Paula Greve
Barbara Kay
Haifei Li
Doug McLean
François Paget
Craig Schmugar
Rick Simon
Dan Sommer
Bing Sun
James Walter
Adam Wosotowsky
Chong Xu
McAfee Labs Threats Report | Fourth Quarter 2013 4
Executive Summary
The cybercrime industry and its role in POS attacks
Our lead story focuses on the headline-grabbing credit card data breaches that
occurred this quarter and how the cybercrime ecosystem supported the attackers’
efforts. The breaches were unprecedented in numbers of records stolen, but what
is even more notable is how well the malware industry served its customers. The
attackers purchased off-the-shelf point-of-sale malware, they made straightforward
modifications so they could target their attacks, and it’s likely that they both tested
their targets’ defenses and evaded those defenses using purchased software.
They even had a ready and efficient black market for selling the stolen credit card
information, including an anonymous, virtual-currency-based point-of-sale payment
system. Raw materials, manufacturing, marketplace, transaction support—it’s all
there for thieves to use.
Malicious signed binaries: Can we trust the Certificate Authority model?
The rapid escalation of malicious signed binaries quarter-over-quarter and year-over-
year bring into question the viability of the Certificate Authority model. After all, the
model is predicated on an assumption of trust, yet we’ve tallied eight million binaries
as suspicious. Many of these may be potentially unwanted programs and not truly
malicious; nonetheless, the misuse of legitimate code-signing certificates erodes user
trust. Granted, most malicious signed binaries are the work of a few bad apples.
However, it’s unreasonable to expect people to distinguish good certificates from
malicious certificates. It’s our view that the security industry should lead users out of this
morass. Which certificates can be trusted? What level of trust can we assign to them?
Microsoft Office zero-day exploit: Discovered by McAfee Labs
In November, McAfee Labs discovered a zero-day exploit1
that attacks a vulnerability
in Microsoft Office. We identified targeted attacks on entities in the Middle East and
Asia that attempted to steal sensitive data. McAfee Labs worked around the clock
with Microsoft to understand the exploit and build defenses against it. In this Key
Topic we dig deeply into the exploit and illustrate just how difficult it is to detect and
contain some zero-day attacks.
Mobile malware: The march continues
This quarter, our IT megatrend Key Topic concerns mobile malware. We reported
on that topic at length in our McAfee Labs Threats Report: First Quarter 20132
and
McAfee Labs Threats Report: Third Quarter 2013,3
including some specific and very
dangerous mobile malware families and the havoc they wreak. This quarter we
explore the prevalence of mobile apps that collect both user data and mobile device
telemetry, the relationship between “overcollecting” apps and malware, and the
common malicious activities performed by mobile malware.
Rapid growth in the number
of malicious signed binaries
is eroding user trust in the
Certificate Authority model.
The cybercrime industry played
a key role in enabling and
monetizing the results of these
point-of-sale attacks.
This is the first known zero-day
exploit of the .docx format.
Attacks based on this exploit
are ongoing.
McAfee Labs records 200 new threats every
minute—more than three every second.
Executive Summary
There appears to be a relationship
between apps that overcollect
mobile device telemetry and
apps that contain or enable
malware. Geolocation tracking
is a key concern.
Follow McAfee Labs
McAfee Labs Threats Report | Fourth Quarter 2013 5
key topics
of the quarter
McAfee Labs Threats Report | Fourth Quarter 2013 6
In December, we began to hear of a series of point-of-sale
(POS) attacks on multiple retail chains across the United States.
The first story to break was specific to Target; this attack
has been ranked among the largest data-loss incidents of all
time.4
Soon we learned of more retail chains affected by POS
attacks. Neiman Marcus, White Lodging, Harbor Freight Tools,
Easton-Bell Sports, Michaels Stores, and ‘wichcraft all suffered
similar POS breaches in 2013. Although there has been no
public acknowledgment that the attacks are related or carried
out by the same actor, many of them leveraged off-the-shelf
malware to execute the attacks.
Although this quarter’s events are unprecedented, POS
malware is not new. During the last few years we have seen
a notable rise in the malware families POSCardStealer, Dexter,
Alina, vSkimmer, ProjectHook, and others, many of which
are available for purchase online.
WHITE LODGING
HARBOR FREIGHT
‘WICHCRAFT
NEIMAN MARCUS
MICHAELS STORES
TARGET
EASTON-BELL SPORTS
April 2013 May
White Lodging: March 30, 2013 – December 16, 2013
Harbor Freight Tools: May 6, 2013 – June 30, 2013
Neiman Marcus: July 16, 2013 – October 30, 2013
‘wichcraft: August 11, 2013 – October 2, 2013
Target: November 27, 2013 – December 15, 2013
Easton-Bell Sports: December 1, 2013 – December 15, 2013
TIMELINE OF NOTABLE POINT-OF-SALE ATTACKS
June July August September October November December January 2014
Source: McAfee Labs, 2014.
key topics
The cybercrime industry and its role in POS attacks
Follow McAfee Labs
McAfee Labs Threats Report | Fourth Quarter 2013 7
Target has confirmed the presence of malware on its POS
systems. In cooperation with various agencies, McAfee Labs
has gained an understanding of the exact malware used in
this attack. To date, Target is the only retailer for which we
can make that assertion with confidence. We also know
that Target employs a custom-built POS application.5
That’s
a crucial detail because it means that the attackers were
not able to learn the system “offline,” via readily available
leaks of commercial POS applications. We know that
although the Target malware was based on BlackPOS, several
customizations allowed specific behavior within Target’s
environment. Details regarding Active Directory domain
names, user accounts, and IP addresses of SMB shares were
hardcoded into scripts that were dropped by some of the
malware components.
The following script was responsible for sending the logged
credit card track data to a remote server. The script was called
by the commands in the preceding image.
key topics
Sellers offer BlackPOS (“Dump, CC Memory Grabber”) for purchase online.
This script sent credit card data to the Target attackers.
The Target malware included hardcoded scripts to steal domain
names, user accounts, and other data.
Note that this script was in plain text. Further, none of the
transmitted card data was encrypted. It was sent via FTP in
clear text all the way to its destination, unencrypted during
the whole journey.
All of these attacks were heavily covered in the news and
we may not fully understand their impact for some time.
Nonetheless, we must recognize that this class of attack is
far from “advanced.” The BlackPOS malware family is an
“off-the-shelf” exploit kit for sale that can easily be modified
and redistributed with little programming skill or knowledge
of malware functionality. BlackPOS source code has also been
leaked multiple times. Just as we have seen with Zeus/Citadel,
Gh0st, Poison Ivy, or many other leaked kits, anyone can
employ, modify, and use them for their purposes.
Follow McAfee Labs
McAfee Labs Threats Report | Fourth Quarter 2013 8
Furthermore, evading well-known antimalware applications
and controls is standard practice. Testing for and ensuring
that popular security apps fail to detect Trojans generated by
these kits is trivial, and the adversaries absolutely embrace
this discipline. Every day, we encounter new cryptors, packers,
and other obfuscations methods that aim to evade detection.
Software to test their targets’ defenses and exploit kits to
evade those defenses are readily available online.
What happened to the millions of credit card numbers stolen
from Target? We have tracked these and continue to see them
appear in large lots (dumps) in key “carding” marketplaces.
Typically the thieves will drop data in batches of 1 million to
4 million numbers.
One popular credit card black market is the Lampeduza
Republic. Its well-organized hierarchy and documented
constitution make for a disciplined and functional marketplace.
Lampeduza’s network of sales websites is very active and
contains many lots specific to these recent retail attacks. Thieves
can pay for the stolen credits cards using one of the many
anonymous virtual currency mechanisms, such as Bitcoin.
We believe these breaches will have long-lasting
repercussions. We expect to see changes to security
approaches and compliance mandates and, of course,
lawsuits. But the big lesson is that we face a healthy
and growing cybercrime industry which played a key role
in enabling and monetizing the results of these attacks.
key topics
Online marketplaces for stolen credit card numbers are thriving.
Follow McAfee Labs
McAfee Labs Threats Report | Fourth Quarter 2013 9
Malicious signed binaries
Secure access to information over the Internet is made possible by a scheme that
enlists trusted third parties—known as certificate authorities (CAs)—to provide
digital certificates to the service providers that deliver the information. In this trust
model, an application—or binary—must be “signed,” which means it has obtained
a certificate from a CA or its proxy verifying the service provider owns the application.
If an attacker can obtain a certificate for a malicious application (a malicious signed
binary), then it’s easier to execute an attack because users rely on certificates to
establish trust with the service provider.
But what if thousands or millions of malicious applications obtain certificates? At
some point, users will no longer be able to trust that applications are safe, bringing
into question the viability of the certificate authority model.
McAfee Labs has tracked the growth of digitally signed malware for several years.
This threat is not only expanding ever more rapidly, but it is also becoming more
complex. During this quarter we discovered more than 2.3 million new and unique
malicious signed binaries. That’s a 52% increase over the prior quarter. On an
annual basis the number discovered in 2013 (almost 5.7 million) more than tripled
that of 2012.
NEW MALICIOUS SIGNED BINARIES
500,000
Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4
0
1,000,000
1,500,000
2,000,000
2,500,000
2011 2012 2013
Source: McAfee Labs, 2014.
Attackers sign malware in
an attempt to trick users and
administrators into trusting
the file, and also in an effort
to evade detection by security
software and circumvent system
policies. Much of this malware is
signed with purchased or stolen
certificates, while other binaries
are self-signed or “test signed.”
Test signing is sometimes used
as part of a social engineering
or targeted attack.
Users can no longer
simply rely on a
certificate. They must
rely on the reputation
of the vendor who
signed the binary,
and its ability
to secure its data.
The number of malicious signed
binaries in our library tripled
in 2013 to more than 8 million.
key topics
Follow McAfee Labs
McAfee Labs Threats Report | Fourth Quarter 2013 10
Where does all this signed malware come from? Although
the total is composed of stolen, purchased, or abused
certificates, the vast majority of growth is due to dubious
content distribution networks (CDNs). These are websites and
companies that allow developers to upload their programs,
or a URL that links to an external application, and wraps it
in a signed installer. Not only does this provide nefarious
developers a distribution channel, it also provides a cloak
of legitimacy.
The following chart shows the top certificate subjects,
or signers, associated with malicious signed binaries.
Digging further, we find that different certificate subjects
on malicious signed binaries trace back to the same suspect
CDNs. For example, binaries signed by Firseria SL and others
signed by PortalProgramas pull content from downloadmr.com.
Similarly, programs signed by Tuguu SL, Payments Interactive
SL, and Lunacom Interactive Ltd. reference secdls.com,
tuguu.com, or domaiq.com, which are all owned by the
same entity. These entities promote bundling, pay-per-install,
analytics, advertising, and other services.
When adjusting for these findings, the top two offenders
for the quarter, Tuguu SL and DownloadMR, represent one-
third of all new malicious signed malware. This is by no means
an exhaustive list because there are many other certificates
associated with these CDNs. However, recognizing this
practice by malware developers provides an explanation
for the rapid growth of signed malware.
TOTAL MALICIOUS SIGNED BINARIES
1,000,000
2,000,000
0
3,000,000
4,000,000
5,000,000
6,000,000
7,000,000
8,000,000
Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4
2011 2012 2013
Source: McAfee Labs, 2014.
CERTIFICATE SUBJECTS ON MALICIOUS SIGNED BINARIES
Firseria SL
AND LLC
PortalProgramas
ITNT SRL
Tuguu SL Lunacom Interactive Ltd.
Payments Interactive SL Artur Kozak
Corleon Group Ltd. Others
50%
4%
14%
8%
6%
6%
3%
3%
3%
3%
Source: McAfee Labs, 2014.
key topics
Follow McAfee Labs
McAfee Labs Threats Report | Fourth Quarter 2013 11
Microsoft Office zero-day exploit
In early November 2013, McAfee Labs detected a zero-day exploit6
that targeted
Microsoft Office.7
We observed early examples targeting high-profile organizations
in the Middle East and Asia (including some in the Pakistani military). These targeted
attacks attempted to steal sensitive data by locating and exfiltrating specific file types
(such as .pdf, .txt, .ppt, .doc, and .xls) in the victim’s environment. This vulnerability,
CVE-2013-3906,8
was fixed in Microsoft’s December patch as MS13-096. McAfee
security products have also been updated to block attacks using this exploit.9
This
zero-day attack exploits the Word Open XML format (docx)10
and apparently an
ActiveX control to “spray” heap memory.11
Heap spraying in Office via ActiveX
objects is a new exploitation trick. Previously, attackers usually chose Flash Player
to spray heap memory in Office. This is further proof that attacking techniques
always evolve.
Since McAfee Labs first identified this threat, we have worked with other researchers
and have identified more than 60 unique variants, indicating this vulnerability is
heavily leveraged by multiple attackers. We even observed variants of the Citadel
Trojan12
distributed via this exploit. About 500 unique examples of malware based
on this exploit now sit in our collection. The oldest sample we found dates to
mid-July 2013.
The CVE-2013-3906 vulnerability is the first in-the-wild exploit to take advantage
of Open XML. In the past, many people believed that .docx was quite safe compared
with the “broken” Office Binary File Format.13
They don’t believe that now.
This element of surprise could be the major reason no one had detected the threat:
Because .docx files were not considered vulnerable, they were not executed in a
sandbox environment.
The exploit also employed a novel technique to spray the heap without any scripting,
as scripting actions are more easily recognized and blocked by security improvements
in Office 2007 and later versions. More important (and more worrisome), this flaw
is fully documented, and live and proof-of-concept exploitation exists, making it
dramatically simpler for other actors to incorporate the exploit into new attacks,
exploit kits, and the like. During our analysis, we also learned that data execution
prevention (DEP) is not enabled by default in Office 2007.14
This causes us further
worries. Without DEP, even a heap spray attack less complex than this one can
successfully exploit a target.
key topics
McAfee Labs Threats Report | Fourth Quarter 2013 12
400,000
200,000
800,000
600,000
1,000,000
NEW MOBILE MALWARE
0
Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4
2011 2012 2013
Source: McAfee Labs, 2014.
TOTAL MOBILE MALWARE
1,000,000
500,000
0
2,000,000
1,500,000
3,500,000
3,000,000
2,500,000
4,000,000
Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4
2011 2012 2013
Source: McAfee Labs, 2014.
2.4 million new mobile malware
samples were added in 2013, up
197% from 2012.
key topics
Malicious malware
leverages user
acquiescence about
mobile app data
sharing to track
location information
and gather
personal data.
Mobile malware: the march continues
We collected 2.47 million new mobile malware samples in 2013, with 744,000 in
this quarter alone. Our mobile malware “zoo” totaled 3.73 million samples at the end
of the year, up an astounding 197% from the end of 2012.
Malware can arrive on a mobile device through just about every attack vector
commonly associated with other endpoint devices—usually as a downloaded app,
but also from visits to malicious websites, spam, malicious SMS messages, and
malware-bearing ads. It’s interesting to explore the prevalence of mobile apps
that collect both user data and mobile device telemetry, the relationship between
“overcollecting” apps and malware, and the common malicious activities performed
by mobile malware.
Beginning with the McAfee
Labs Threats Report: Third
Quarter 2013,15
we switched our
reporting of mobile malware
from a count of malware
families to unique samples (a
hash count). We did this for
two reasons: First, we wanted
the method we use for mobile
malware to be consistent with
the way we report all malware.
Second, by reporting the total
number of variants instead of the
total number of mobile malware
families, we present a better
overall picture of how mobile
malware affects users.
Follow McAfee Labs
McAfee Labs Threats Report | Fourth Quarter 2013 13
As we noted in the recently published McAfee Mobile Security
Report,16
we found that an astounding 82% of mobile apps
track when you use Wi-Fi and data networks, when you turn
on your device, or your current and last location; 80% of apps
collect location information; and 57% track when the phone
is used. Of course, most of the tracking is benign. We give up
our privacy and identifiable data in exchange for convenience,
access, and personalization. But what about the outlier—an
app whose data collection behavior is inconsistent with other
apps in its category?
McAfee Labs maintains a reputation database for mobile
apps. When an app behaves significantly differently than
others in its category, we may increase the riskiness reflected
in its privacy “sharing” score. The higher the score, the more
private data it shares relative to its peers. A low score, within
each category and for each app, means the app collects very
little information or behaves the way a user would expect
it to based on the description of the app.
We also discovered that there appears to be a relationship
between apps that overcollect mobile device telemetry (as
measured by our privacy sharing scores) and apps that contain
or enable malware. The more data an app collects relative to
its category peers, the more you should be concerned about
data loss and possible theft. In fact, when we looked at the
10 apps in our mobile app reputation database that had the
highest privacy-sharing scores, we found that six of them
contained malware. All 10 of these apps read the device’s ID
and track the device’s last known location.
Digging into mobile malware behavior, we see a couple of
interesting things. First, the most common behavior—shown
by more than one-third of the malware—is to collect and send
device telemetry. The malware sends data that can be used to
build a profile of the mobile device owner’s behavior. There’s
also a high prevalence of acts commonly associated with device
hijacking, such as making the mobile device into a bot and
installing other, even more malicious malware. Second, from
a trend standpoint, mobile malware appears to be evolving
from exploiting vulnerabilities toward more profile building and
device-hijacking behavior. There appears to be an increasing
value placed on the movements of the device owner.
Sharing tracking information with a mobile app may seem
benign or at most, a privacy issue, but it raises profound
business security implications in the “bring your own
device” world. A clever piece of malware installed on the
CEO’s phone directly or indirectly by a less-than-reputable
mobile app and doing nothing more than tracking location
information could actually tip off competitors, suppliers,
financial analysts, blackmailers, or even those who wish
to do someone physical harm.
NEW MOBILE MALWARE SHOWING DEVICE-HACKING BEHAVIOR
15%
10%
5%
0%
25%
20%
40%
35%
30%
45%
Send
Handset
Intro
Spyware
Adware
Send
Premium
SMS
Fraud
Exploit
Rooting
Malware
Backdoor/Botnet
Hacktool
Downloader/Installer
Destructive
SMS
Spam
Dec 2012
Dec 2013
Source: McAfee Labs, 2014.
key topics
Follow McAfee Labs
McAfee Labs Threats Report | Fourth Quarter 2013 14
Threats Statistics
McAfee Labs Threats Report | Fourth Quarter 2013 15
Malware
The McAfee Labs “zoo” grew by
15% during the quarter. It now
contains more than 196 million
unique malware samples.
NEW MALWARE
10,000,000
5,000,000
0
15,000,000
25,000,000
20,000,000
30,000,000
Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4
2011 2012 2013
Source: McAfee Labs, 2014.
TOTAL MALWARE
50,000,000
0
100,000,000
150,000,000
200,000,000
250,000,000
Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4
2011 2012 2013
Source: McAfee Labs, 2014.
THREATS STATISTICS
Follow McAfee Labs
McAfee Labs Threats Report | Fourth Quarter 2013 16
The volume of new ransomware
samples doubled from Q4 2012
to Q4 2013. McAfee Labs added
1 million new samples in 2013.
NEW RANSOMWARE
100,000
50,000
0
200,000
150,000
350,000
300,000
250,000
400,000
Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4
2011 2012 2013
Source: McAfee Labs, 2014.
TOTAL RANSOMWARE
600,000
400,000
200,000
0
1,000,000
800,000
1,600,000
1,400,000
1,200,000
1,800,000
Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4
2011 2012 2013
Source: McAfee Labs, 2014.
THREATS STATISTICS
Follow McAfee Labs
McAfee Labs Threats Report | Fourth Quarter 2013 17
NEW ROOTKITS MALWARE
50,000
0
100,000
150,000
200,000
250,000
Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4
2011 2012 2013
Source: McAfee Labs, 2014.
TOTAL ROOTKITS MALWARE
600,000
400,000
200,000
0
1,000,000
800,000
1,600,000
1,400,000
1,200,000
1,800,000
Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4
2011 2012 2013
Source: McAfee Labs, 2014.
THREATS STATISTICS
New rootkits dropped by
73% this quarter, continuing
a decline that began 2011.
Follow McAfee Labs
McAfee Labs Threats Report | Fourth Quarter 2013 18
NEW MASTER BOOT RECORD–RELATED THREATS
200,000
100,000
0
400,000
300,000
700,000
600,000
500,000
800,000
Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4
Identified MBR Components
Variants of Families With Known MBR Payloads
2011 2012 2013
Source: McAfee Labs, 2014.
TOTAL MASTER BOOT RECORD–RELATED THREATS
2,000,000
1,000,000
0
3,000,000
5,000,000
4,000,000
6,000,000
Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4
Identified MBR Components
Variants of Families With Known MBR Payloads
2011 2012 2013
Source: McAfee Labs, 2014.
McAfee Labs added 2.2 million
new MBR attack-related samples
in 2013.
THREATS STATISTICS
Follow McAfee Labs
McAfee Labs Threats Report | Fourth Quarter 2013 19
Web threats
NEW SUSPECT URLs
4,000,000
2,000,000
0
8,000,000
6,000,000
14,000,000
12,000,000
10,000,000
16,000,000
Q2 Q3 Q4 Q1 Q2 Q3 Q4
URLs Associated Domains
2012 2013
Source: McAfee Labs, 2014.
We recorded a 40% increase
in the number of suspect URLs
in 2013.
LOCATION OF SERVERS HOSTING SUSPECT CONTENT
North America
Africa
Asia-Pacific
Australia
Europe-Middle East
Latin America
55.9%
31.9%
3.2%
.1%
.4%
8.4%
Source: McAfee Labs, 2014.
THREATS STATISTICS
Follow McAfee Labs
McAfee Labs Threats Report | Fourth Quarter 2013 20
NEW PHISHING URLs
150,000
100,000
50,000
0
250,000
200,000
400,000
350,000
300,000
450,000
URLs
Associated Domains
Q2 Q3 Q4 Q1 Q2 Q3 Q4
2012 2013
Source: McAfee Labs, 2014.
TOP COUNTRIES HOSTING PHISHING URLs
Czech Republic
Germany
France
Canada
Brazil
United States
47%
6%
5%
5%
4%
27%
3%
3%
TOP COUNTRIES HOSTING SPAM URLs
Netherlands
Russia
Japan
47%
12%
5%
5%
4%
24%
3%
United Kingdom
Others
Source: McAfee Labs, 2014.
THREATS STATISTICS
Follow McAfee Labs
McAfee Labs Threats Report | Fourth Quarter 2013 21
Messaging threats
GLOBAL EMAIL VOLUME
2
1
0
4
3
7
6
5
10
9
8
Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4
Spam Legitimate Email
Trillions of messages
2011 2012 2013
Source: McAfee Labs, 2014.
GLOBAL MESSAGING BOTNET INFECTIONS
4,000,000
2,000,000
0
8,000,000
6,000,000
14,000,000
12,000,000
10,000,000
20,000,000
18,000,000
16,000,000
Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4
2011 2012 2013
Source: McAfee Labs, 2014.
THREATS STATISTICS
Follow McAfee Labs
McAfee Labs Threats Report | Fourth Quarter 2013 22
Network threats
TOP NETWORK ATTACKS
Browser
Remote Procedure Call
Cross-Site Scripting
SQL Injection
Others
45%
9%
8%
12%
26%
Source: McAfee Labs, 2014.
WORLDWIDE SPAM BOTNET PREVALENCE
Cutwall
Kelihos
Slenfbot
Festi
Darkmailer
Others
35%
15%
12%
31%
4%
3%
Source: McAfee Labs, 2014.
THREATS STATISTICS
Browser attacks, primarily
exploiting vulnerabilities in
Internet Explorer and Firefox,
have been the leading network
threat for the past six quarters.
Follow McAfee Labs
McAfee Labs Threats Report | Fourth Quarter 2013 23
NETWORK THREATS
4,000,000
2,000,000
0
8,000,000
6,000,000
14,000,000
12,000,000
10,000,000
16,000,000
Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4
Browser Attacks
Cross-Site Scripting
Remote Procedure Call
SQL Injection
Others
Source: McAfee Labs, 2014.
2012 2013
TOTAL NETWORK THREATS
10,000,000
5,000,000
0
20,000,000
15,000,000
35,000,000
30,000,000
25,000,000
40,000,000 Browser Attacks
Cross-Site Scripting
Remote Procedure Call
SQL Injection
Others
Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4
Source: McAfee Labs, 2014.
2012 2013
THREATS STATISTICS
Follow McAfee Labs
McAfee Labs Threats Report | Fourth Quarter 2013 24
About McAfee
McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ: INTC), empowers
businesses, the public sector, and home users to safely experience the benefits of the
Internet. The company delivers proactive and proven security solutions and services
for systems, networks, and mobile devices around the world. With its visionary
Security Connected strategy, innovative approach to hardware-enhanced security,
and unique global threat intelligence network, McAfee is relentlessly focused on
keeping its customers safe.
http://www.mcafee.com
	 1	http://blogs.mcafee.com/mcafee-labs/mcafee-labs-detects-zero-day-exploit-targeting-		
		microsoft-office-2
	2	http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q1-2013.pdf
	3	http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q3-2013.pdf
	 4	 Current estimates range up to 110 million transaction records.
	5	http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000009407
	6	http://blogs.mcafee.com/mcafee-labs/mcafee-labs-detects-zero-day-exploit-targeting-		
		 microsoft-office-2
	7	http://blogs.mcafee.com/mcafee-labs/mcafee-labs-detects-zero-day-exploit-targeting-		
		 microsoft-office-2
	8	http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3906
	9	http://blogs.mcafee.com/business/updates-and-mitigation-to-cve-2013-3906-zero-day-threat
10	http://msdn.microsoft.com/en-us/library/aa338205%28v=office.12%29.aspx
11	Heap spraying: A method of malware payload delivery that injects a piece of code into a 		
		 predictable and relocatable memory address. Malicious code may attempt this in the address 		
		 space of another process to gain control of a system.
12	http://www.mcafee.com/us/resources/white-papers/wp-citadel-trojan-summary.pdf
13	http://msdn.microsoft.com/en-us/library/cc313105%28office.12%29.aspx
14	https://blogs.mcafee.com/mcafee-labs/solving-the-mystery-of-the-office-zero-day-exploit-
		and-dep
15	http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q3-2013.pdf
16	http://www.mcafee.com/us/resources/reports/rp-mobile-security-consumer-trends.pdf
The information in this document is provided only for educational purposes and for the
convenience of McAfee customers. The information contained herein is subject to change without
notice, and is provided “as is,” without guarantee or warranty as to the accuracy or applicability
of the information to any specific situation or circumstance.
McAfee and the McAfee logo are registered trademarks or trademarks of McAfee or its
subsidiaries in the United States and other countries. Other marks and brands may be claimed
as the property of others. McAfee provides the specifications and descriptions herein only for
information, subject to change without notice, and without warranty of any kind, expressed or
implied. Copyright © 2014 McAfee, Inc.
60989rpt_qtr-q4_0314_fnl_PAIR

Contenu connexe

Tendances

Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Symantec
 
Enabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSEnabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSPaul Walsh
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec
 
Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Waqas Amir
 
INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37Felipe Prado
 
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017SurfWatch Labs
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18Symantec
 
Symantec Cyber Security Intelligence Report
Symantec Cyber Security Intelligence ReportSymantec Cyber Security Intelligence Report
Symantec Cyber Security Intelligence ReportSymantec
 
Can you predict who will win the US election?
Can you predict who will win the US election?Can you predict who will win the US election?
Can you predict who will win the US election?Samvel Gevorgyan
 
Symantec Intelligence Report September 2014
Symantec Intelligence Report September 2014Symantec Intelligence Report September 2014
Symantec Intelligence Report September 2014Symantec
 
Deepfake anyone, the ai synthetic media industry enters a dangerous phase
Deepfake anyone, the ai synthetic media industry enters a dangerous phaseDeepfake anyone, the ai synthetic media industry enters a dangerous phase
Deepfake anyone, the ai synthetic media industry enters a dangerous phaseaditi agarwal
 
Symantec Intelligence Report - June 2014
Symantec Intelligence Report - June 2014Symantec Intelligence Report - June 2014
Symantec Intelligence Report - June 2014Symantec
 
WatchGuard Internet Security Report
WatchGuard Internet Security ReportWatchGuard Internet Security Report
WatchGuard Internet Security ReportBAKOTECH
 
Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4Imperva
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingCigniti Technologies Ltd
 
Istr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecIstr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecSoluciona Facil
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Security
 

Tendances (20)

Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
 
Enabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSEnabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMS
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015
 
Istr19 en
Istr19 enIstr19 en
Istr19 en
 
INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37
 
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18
 
Symantec Cyber Security Intelligence Report
Symantec Cyber Security Intelligence ReportSymantec Cyber Security Intelligence Report
Symantec Cyber Security Intelligence Report
 
2016 Trends in Security
2016 Trends in Security 2016 Trends in Security
2016 Trends in Security
 
Can you predict who will win the US election?
Can you predict who will win the US election?Can you predict who will win the US election?
Can you predict who will win the US election?
 
Secureview 3
Secureview 3Secureview 3
Secureview 3
 
Symantec Intelligence Report September 2014
Symantec Intelligence Report September 2014Symantec Intelligence Report September 2014
Symantec Intelligence Report September 2014
 
Deepfake anyone, the ai synthetic media industry enters a dangerous phase
Deepfake anyone, the ai synthetic media industry enters a dangerous phaseDeepfake anyone, the ai synthetic media industry enters a dangerous phase
Deepfake anyone, the ai synthetic media industry enters a dangerous phase
 
Symantec Intelligence Report - June 2014
Symantec Intelligence Report - June 2014Symantec Intelligence Report - June 2014
Symantec Intelligence Report - June 2014
 
WatchGuard Internet Security Report
WatchGuard Internet Security ReportWatchGuard Internet Security Report
WatchGuard Internet Security Report
 
Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testing
 
Istr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecIstr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantec
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
 

En vedette

Fourth Annual Benchmark Study on Patient Privacy & Data Security
Fourth Annual Benchmark Study on Patient Privacy & Data SecurityFourth Annual Benchmark Study on Patient Privacy & Data Security
Fourth Annual Benchmark Study on Patient Privacy & Data Security- Mark - Fullbright
 
Business Marketing Your Mobile app
Business Marketing Your Mobile appBusiness Marketing Your Mobile app
Business Marketing Your Mobile app- Mark - Fullbright
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz- Mark - Fullbright
 
The Fleecing of Foster Children
The Fleecing of Foster Children The Fleecing of Foster Children
The Fleecing of Foster Children - Mark - Fullbright
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 - Mark - Fullbright
 
Parents Guide to Facebook Updated 2012
Parents Guide to Facebook Updated 2012Parents Guide to Facebook Updated 2012
Parents Guide to Facebook Updated 2012- Mark - Fullbright
 

En vedette (6)

Fourth Annual Benchmark Study on Patient Privacy & Data Security
Fourth Annual Benchmark Study on Patient Privacy & Data SecurityFourth Annual Benchmark Study on Patient Privacy & Data Security
Fourth Annual Benchmark Study on Patient Privacy & Data Security
 
Business Marketing Your Mobile app
Business Marketing Your Mobile appBusiness Marketing Your Mobile app
Business Marketing Your Mobile app
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
 
The Fleecing of Foster Children
The Fleecing of Foster Children The Fleecing of Foster Children
The Fleecing of Foster Children
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013
 
Parents Guide to Facebook Updated 2012
Parents Guide to Facebook Updated 2012Parents Guide to Facebook Updated 2012
Parents Guide to Facebook Updated 2012
 

Similaire à McAFEE LABS THREATS REPORT - Fourth Quarter 2013

Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-naAndreas Hiller
 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015Andreanne Clarke
 
Check point 2015-securityreport
Check point 2015-securityreportCheck point 2015-securityreport
Check point 2015-securityreportEIINSTITUT
 
Failed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated RansomwareFailed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated RansomwareIBM Security
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMatthew Rosenquist
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat ReportKim Jensen
 
180814 cloudsec2018 charles mok1
180814 cloudsec2018 charles mok1180814 cloudsec2018 charles mok1
180814 cloudsec2018 charles mok1Charles Mok
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014- Mark - Fullbright
 
Trendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enTrendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enAndrey Apuhtin
 
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of CompromiseInsight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise21CT Inc.
 
Secureview 2q 2011
Secureview 2q 2011Secureview 2q 2011
Secureview 2q 2011Felipe Prado
 
2014 information technology threat predictions
2014 information technology threat predictions2014 information technology threat predictions
2014 information technology threat predictionsPrayukth K V
 
Alert logic cloud security report
Alert logic cloud security reportAlert logic cloud security report
Alert logic cloud security reportGabe Akisanmi
 

Similaire à McAFEE LABS THREATS REPORT - Fourth Quarter 2013 (20)

Rapport X force 2014
Rapport X force 2014Rapport X force 2014
Rapport X force 2014
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015
 
Rp threat-predictions-2013
Rp threat-predictions-2013Rp threat-predictions-2013
Rp threat-predictions-2013
 
Check point 2015-securityreport
Check point 2015-securityreportCheck point 2015-securityreport
Check point 2015-securityreport
 
Failed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated RansomwareFailed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated Ransomware
 
2013 Threat Report
2013 Threat Report2013 Threat Report
2013 Threat Report
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats Predictions
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
180814 cloudsec2018 charles mok1
180814 cloudsec2018 charles mok1180814 cloudsec2018 charles mok1
180814 cloudsec2018 charles mok1
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014
 
Trendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enTrendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-en
 
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of CompromiseInsight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
Secureview 2q 2011
Secureview 2q 2011Secureview 2q 2011
Secureview 2q 2011
 
2014 information technology threat predictions
2014 information technology threat predictions2014 information technology threat predictions
2014 information technology threat predictions
 
Alert logic cloud security report
Alert logic cloud security reportAlert logic cloud security report
Alert logic cloud security report
 

Plus de - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Plus de - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Dernier

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 

Dernier (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 

McAFEE LABS THREATS REPORT - Fourth Quarter 2013

  • 1. McAfee Labs Threats Report | Fourth Quarter 2013 1 McAfee Labs Threats Report Report Fourth Quarter 2013
  • 2. McAfee Labs Threats Report | Fourth Quarter 2013 2 About McAfee Labs McAfee Labs is the world’s leading source for threat research, threat intelligence, and cybersecurity thought leadership. With data from millions of sensors across key threats vectors—file, web, message, and network—McAfee Labs delivers real-time threat intelligence, critical analysis, and expert thinking to improve protection and reduce risks. www.mcafee.com/us/mcafee-labs.aspx Introduction Welcome to the McAfee Labs Threats Report: Fourth Quarter 2013. As we kick off the New Year, we take a fresh approach to our Threats Reports. Beginning with this edition, we present a shorter publication, with “Key Topics” covering top threats or security issues from the quarter. We also focus (on a rotating basis) on threat concerns surrounding the four IT megatrends: mobile, social, cloud, and big data. The report is now visually richer and easier to navigate. Not lost in this evolutionary approach is the rich set of threats data that we collect through our McAfee Global Threat Intelligence network. By continuing to publish that data—most of which is in time series—our readers can gain a better understanding of the changing threats landscape. This quarter, we illustrate how the malware industry aided and abetted the point- of-sale attacks on Target and other retailers, examine how malicious signed binaries undermine the stamp of approval that Certificate Authorities provide, describe the impact of McAfee Labs discovering a zero-day vulnerability in Microsoft Office, and look at the excessive data collection of mobile apps and their relationship to malware. Vincent Weafer, Senior Vice President, McAfee Labs We are working to make our threats reports more vivid and relevant. We hope you like the changes. Follow McAfee Labs
  • 3. Contents Executive Summary 4 Key Topics of the quarter The cybercrime industry and its role in POS attacks 6 Malicious signed binaries: Can we trust the Certificate Authority model? 9 Microsoft Office zero-day exploit: Discovered by McAfee Labs 11 Mobile malware: the march continues 12 Threats Statistics Malware 15 Web threats 19 Messaging threats 21 Network threats 22 McAfee Labs Threats Report Fourth Quarter 2013 This report was prepared and written by: Benjamin Cruz Paula Greve Barbara Kay Haifei Li Doug McLean François Paget Craig Schmugar Rick Simon Dan Sommer Bing Sun James Walter Adam Wosotowsky Chong Xu
  • 4. McAfee Labs Threats Report | Fourth Quarter 2013 4 Executive Summary The cybercrime industry and its role in POS attacks Our lead story focuses on the headline-grabbing credit card data breaches that occurred this quarter and how the cybercrime ecosystem supported the attackers’ efforts. The breaches were unprecedented in numbers of records stolen, but what is even more notable is how well the malware industry served its customers. The attackers purchased off-the-shelf point-of-sale malware, they made straightforward modifications so they could target their attacks, and it’s likely that they both tested their targets’ defenses and evaded those defenses using purchased software. They even had a ready and efficient black market for selling the stolen credit card information, including an anonymous, virtual-currency-based point-of-sale payment system. Raw materials, manufacturing, marketplace, transaction support—it’s all there for thieves to use. Malicious signed binaries: Can we trust the Certificate Authority model? The rapid escalation of malicious signed binaries quarter-over-quarter and year-over- year bring into question the viability of the Certificate Authority model. After all, the model is predicated on an assumption of trust, yet we’ve tallied eight million binaries as suspicious. Many of these may be potentially unwanted programs and not truly malicious; nonetheless, the misuse of legitimate code-signing certificates erodes user trust. Granted, most malicious signed binaries are the work of a few bad apples. However, it’s unreasonable to expect people to distinguish good certificates from malicious certificates. It’s our view that the security industry should lead users out of this morass. Which certificates can be trusted? What level of trust can we assign to them? Microsoft Office zero-day exploit: Discovered by McAfee Labs In November, McAfee Labs discovered a zero-day exploit1 that attacks a vulnerability in Microsoft Office. We identified targeted attacks on entities in the Middle East and Asia that attempted to steal sensitive data. McAfee Labs worked around the clock with Microsoft to understand the exploit and build defenses against it. In this Key Topic we dig deeply into the exploit and illustrate just how difficult it is to detect and contain some zero-day attacks. Mobile malware: The march continues This quarter, our IT megatrend Key Topic concerns mobile malware. We reported on that topic at length in our McAfee Labs Threats Report: First Quarter 20132 and McAfee Labs Threats Report: Third Quarter 2013,3 including some specific and very dangerous mobile malware families and the havoc they wreak. This quarter we explore the prevalence of mobile apps that collect both user data and mobile device telemetry, the relationship between “overcollecting” apps and malware, and the common malicious activities performed by mobile malware. Rapid growth in the number of malicious signed binaries is eroding user trust in the Certificate Authority model. The cybercrime industry played a key role in enabling and monetizing the results of these point-of-sale attacks. This is the first known zero-day exploit of the .docx format. Attacks based on this exploit are ongoing. McAfee Labs records 200 new threats every minute—more than three every second. Executive Summary There appears to be a relationship between apps that overcollect mobile device telemetry and apps that contain or enable malware. Geolocation tracking is a key concern. Follow McAfee Labs
  • 5. McAfee Labs Threats Report | Fourth Quarter 2013 5 key topics of the quarter
  • 6. McAfee Labs Threats Report | Fourth Quarter 2013 6 In December, we began to hear of a series of point-of-sale (POS) attacks on multiple retail chains across the United States. The first story to break was specific to Target; this attack has been ranked among the largest data-loss incidents of all time.4 Soon we learned of more retail chains affected by POS attacks. Neiman Marcus, White Lodging, Harbor Freight Tools, Easton-Bell Sports, Michaels Stores, and ‘wichcraft all suffered similar POS breaches in 2013. Although there has been no public acknowledgment that the attacks are related or carried out by the same actor, many of them leveraged off-the-shelf malware to execute the attacks. Although this quarter’s events are unprecedented, POS malware is not new. During the last few years we have seen a notable rise in the malware families POSCardStealer, Dexter, Alina, vSkimmer, ProjectHook, and others, many of which are available for purchase online. WHITE LODGING HARBOR FREIGHT ‘WICHCRAFT NEIMAN MARCUS MICHAELS STORES TARGET EASTON-BELL SPORTS April 2013 May White Lodging: March 30, 2013 – December 16, 2013 Harbor Freight Tools: May 6, 2013 – June 30, 2013 Neiman Marcus: July 16, 2013 – October 30, 2013 ‘wichcraft: August 11, 2013 – October 2, 2013 Target: November 27, 2013 – December 15, 2013 Easton-Bell Sports: December 1, 2013 – December 15, 2013 TIMELINE OF NOTABLE POINT-OF-SALE ATTACKS June July August September October November December January 2014 Source: McAfee Labs, 2014. key topics The cybercrime industry and its role in POS attacks Follow McAfee Labs
  • 7. McAfee Labs Threats Report | Fourth Quarter 2013 7 Target has confirmed the presence of malware on its POS systems. In cooperation with various agencies, McAfee Labs has gained an understanding of the exact malware used in this attack. To date, Target is the only retailer for which we can make that assertion with confidence. We also know that Target employs a custom-built POS application.5 That’s a crucial detail because it means that the attackers were not able to learn the system “offline,” via readily available leaks of commercial POS applications. We know that although the Target malware was based on BlackPOS, several customizations allowed specific behavior within Target’s environment. Details regarding Active Directory domain names, user accounts, and IP addresses of SMB shares were hardcoded into scripts that were dropped by some of the malware components. The following script was responsible for sending the logged credit card track data to a remote server. The script was called by the commands in the preceding image. key topics Sellers offer BlackPOS (“Dump, CC Memory Grabber”) for purchase online. This script sent credit card data to the Target attackers. The Target malware included hardcoded scripts to steal domain names, user accounts, and other data. Note that this script was in plain text. Further, none of the transmitted card data was encrypted. It was sent via FTP in clear text all the way to its destination, unencrypted during the whole journey. All of these attacks were heavily covered in the news and we may not fully understand their impact for some time. Nonetheless, we must recognize that this class of attack is far from “advanced.” The BlackPOS malware family is an “off-the-shelf” exploit kit for sale that can easily be modified and redistributed with little programming skill or knowledge of malware functionality. BlackPOS source code has also been leaked multiple times. Just as we have seen with Zeus/Citadel, Gh0st, Poison Ivy, or many other leaked kits, anyone can employ, modify, and use them for their purposes. Follow McAfee Labs
  • 8. McAfee Labs Threats Report | Fourth Quarter 2013 8 Furthermore, evading well-known antimalware applications and controls is standard practice. Testing for and ensuring that popular security apps fail to detect Trojans generated by these kits is trivial, and the adversaries absolutely embrace this discipline. Every day, we encounter new cryptors, packers, and other obfuscations methods that aim to evade detection. Software to test their targets’ defenses and exploit kits to evade those defenses are readily available online. What happened to the millions of credit card numbers stolen from Target? We have tracked these and continue to see them appear in large lots (dumps) in key “carding” marketplaces. Typically the thieves will drop data in batches of 1 million to 4 million numbers. One popular credit card black market is the Lampeduza Republic. Its well-organized hierarchy and documented constitution make for a disciplined and functional marketplace. Lampeduza’s network of sales websites is very active and contains many lots specific to these recent retail attacks. Thieves can pay for the stolen credits cards using one of the many anonymous virtual currency mechanisms, such as Bitcoin. We believe these breaches will have long-lasting repercussions. We expect to see changes to security approaches and compliance mandates and, of course, lawsuits. But the big lesson is that we face a healthy and growing cybercrime industry which played a key role in enabling and monetizing the results of these attacks. key topics Online marketplaces for stolen credit card numbers are thriving. Follow McAfee Labs
  • 9. McAfee Labs Threats Report | Fourth Quarter 2013 9 Malicious signed binaries Secure access to information over the Internet is made possible by a scheme that enlists trusted third parties—known as certificate authorities (CAs)—to provide digital certificates to the service providers that deliver the information. In this trust model, an application—or binary—must be “signed,” which means it has obtained a certificate from a CA or its proxy verifying the service provider owns the application. If an attacker can obtain a certificate for a malicious application (a malicious signed binary), then it’s easier to execute an attack because users rely on certificates to establish trust with the service provider. But what if thousands or millions of malicious applications obtain certificates? At some point, users will no longer be able to trust that applications are safe, bringing into question the viability of the certificate authority model. McAfee Labs has tracked the growth of digitally signed malware for several years. This threat is not only expanding ever more rapidly, but it is also becoming more complex. During this quarter we discovered more than 2.3 million new and unique malicious signed binaries. That’s a 52% increase over the prior quarter. On an annual basis the number discovered in 2013 (almost 5.7 million) more than tripled that of 2012. NEW MALICIOUS SIGNED BINARIES 500,000 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 0 1,000,000 1,500,000 2,000,000 2,500,000 2011 2012 2013 Source: McAfee Labs, 2014. Attackers sign malware in an attempt to trick users and administrators into trusting the file, and also in an effort to evade detection by security software and circumvent system policies. Much of this malware is signed with purchased or stolen certificates, while other binaries are self-signed or “test signed.” Test signing is sometimes used as part of a social engineering or targeted attack. Users can no longer simply rely on a certificate. They must rely on the reputation of the vendor who signed the binary, and its ability to secure its data. The number of malicious signed binaries in our library tripled in 2013 to more than 8 million. key topics Follow McAfee Labs
  • 10. McAfee Labs Threats Report | Fourth Quarter 2013 10 Where does all this signed malware come from? Although the total is composed of stolen, purchased, or abused certificates, the vast majority of growth is due to dubious content distribution networks (CDNs). These are websites and companies that allow developers to upload their programs, or a URL that links to an external application, and wraps it in a signed installer. Not only does this provide nefarious developers a distribution channel, it also provides a cloak of legitimacy. The following chart shows the top certificate subjects, or signers, associated with malicious signed binaries. Digging further, we find that different certificate subjects on malicious signed binaries trace back to the same suspect CDNs. For example, binaries signed by Firseria SL and others signed by PortalProgramas pull content from downloadmr.com. Similarly, programs signed by Tuguu SL, Payments Interactive SL, and Lunacom Interactive Ltd. reference secdls.com, tuguu.com, or domaiq.com, which are all owned by the same entity. These entities promote bundling, pay-per-install, analytics, advertising, and other services. When adjusting for these findings, the top two offenders for the quarter, Tuguu SL and DownloadMR, represent one- third of all new malicious signed malware. This is by no means an exhaustive list because there are many other certificates associated with these CDNs. However, recognizing this practice by malware developers provides an explanation for the rapid growth of signed malware. TOTAL MALICIOUS SIGNED BINARIES 1,000,000 2,000,000 0 3,000,000 4,000,000 5,000,000 6,000,000 7,000,000 8,000,000 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 2011 2012 2013 Source: McAfee Labs, 2014. CERTIFICATE SUBJECTS ON MALICIOUS SIGNED BINARIES Firseria SL AND LLC PortalProgramas ITNT SRL Tuguu SL Lunacom Interactive Ltd. Payments Interactive SL Artur Kozak Corleon Group Ltd. Others 50% 4% 14% 8% 6% 6% 3% 3% 3% 3% Source: McAfee Labs, 2014. key topics Follow McAfee Labs
  • 11. McAfee Labs Threats Report | Fourth Quarter 2013 11 Microsoft Office zero-day exploit In early November 2013, McAfee Labs detected a zero-day exploit6 that targeted Microsoft Office.7 We observed early examples targeting high-profile organizations in the Middle East and Asia (including some in the Pakistani military). These targeted attacks attempted to steal sensitive data by locating and exfiltrating specific file types (such as .pdf, .txt, .ppt, .doc, and .xls) in the victim’s environment. This vulnerability, CVE-2013-3906,8 was fixed in Microsoft’s December patch as MS13-096. McAfee security products have also been updated to block attacks using this exploit.9 This zero-day attack exploits the Word Open XML format (docx)10 and apparently an ActiveX control to “spray” heap memory.11 Heap spraying in Office via ActiveX objects is a new exploitation trick. Previously, attackers usually chose Flash Player to spray heap memory in Office. This is further proof that attacking techniques always evolve. Since McAfee Labs first identified this threat, we have worked with other researchers and have identified more than 60 unique variants, indicating this vulnerability is heavily leveraged by multiple attackers. We even observed variants of the Citadel Trojan12 distributed via this exploit. About 500 unique examples of malware based on this exploit now sit in our collection. The oldest sample we found dates to mid-July 2013. The CVE-2013-3906 vulnerability is the first in-the-wild exploit to take advantage of Open XML. In the past, many people believed that .docx was quite safe compared with the “broken” Office Binary File Format.13 They don’t believe that now. This element of surprise could be the major reason no one had detected the threat: Because .docx files were not considered vulnerable, they were not executed in a sandbox environment. The exploit also employed a novel technique to spray the heap without any scripting, as scripting actions are more easily recognized and blocked by security improvements in Office 2007 and later versions. More important (and more worrisome), this flaw is fully documented, and live and proof-of-concept exploitation exists, making it dramatically simpler for other actors to incorporate the exploit into new attacks, exploit kits, and the like. During our analysis, we also learned that data execution prevention (DEP) is not enabled by default in Office 2007.14 This causes us further worries. Without DEP, even a heap spray attack less complex than this one can successfully exploit a target. key topics
  • 12. McAfee Labs Threats Report | Fourth Quarter 2013 12 400,000 200,000 800,000 600,000 1,000,000 NEW MOBILE MALWARE 0 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 2011 2012 2013 Source: McAfee Labs, 2014. TOTAL MOBILE MALWARE 1,000,000 500,000 0 2,000,000 1,500,000 3,500,000 3,000,000 2,500,000 4,000,000 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 2011 2012 2013 Source: McAfee Labs, 2014. 2.4 million new mobile malware samples were added in 2013, up 197% from 2012. key topics Malicious malware leverages user acquiescence about mobile app data sharing to track location information and gather personal data. Mobile malware: the march continues We collected 2.47 million new mobile malware samples in 2013, with 744,000 in this quarter alone. Our mobile malware “zoo” totaled 3.73 million samples at the end of the year, up an astounding 197% from the end of 2012. Malware can arrive on a mobile device through just about every attack vector commonly associated with other endpoint devices—usually as a downloaded app, but also from visits to malicious websites, spam, malicious SMS messages, and malware-bearing ads. It’s interesting to explore the prevalence of mobile apps that collect both user data and mobile device telemetry, the relationship between “overcollecting” apps and malware, and the common malicious activities performed by mobile malware. Beginning with the McAfee Labs Threats Report: Third Quarter 2013,15 we switched our reporting of mobile malware from a count of malware families to unique samples (a hash count). We did this for two reasons: First, we wanted the method we use for mobile malware to be consistent with the way we report all malware. Second, by reporting the total number of variants instead of the total number of mobile malware families, we present a better overall picture of how mobile malware affects users. Follow McAfee Labs
  • 13. McAfee Labs Threats Report | Fourth Quarter 2013 13 As we noted in the recently published McAfee Mobile Security Report,16 we found that an astounding 82% of mobile apps track when you use Wi-Fi and data networks, when you turn on your device, or your current and last location; 80% of apps collect location information; and 57% track when the phone is used. Of course, most of the tracking is benign. We give up our privacy and identifiable data in exchange for convenience, access, and personalization. But what about the outlier—an app whose data collection behavior is inconsistent with other apps in its category? McAfee Labs maintains a reputation database for mobile apps. When an app behaves significantly differently than others in its category, we may increase the riskiness reflected in its privacy “sharing” score. The higher the score, the more private data it shares relative to its peers. A low score, within each category and for each app, means the app collects very little information or behaves the way a user would expect it to based on the description of the app. We also discovered that there appears to be a relationship between apps that overcollect mobile device telemetry (as measured by our privacy sharing scores) and apps that contain or enable malware. The more data an app collects relative to its category peers, the more you should be concerned about data loss and possible theft. In fact, when we looked at the 10 apps in our mobile app reputation database that had the highest privacy-sharing scores, we found that six of them contained malware. All 10 of these apps read the device’s ID and track the device’s last known location. Digging into mobile malware behavior, we see a couple of interesting things. First, the most common behavior—shown by more than one-third of the malware—is to collect and send device telemetry. The malware sends data that can be used to build a profile of the mobile device owner’s behavior. There’s also a high prevalence of acts commonly associated with device hijacking, such as making the mobile device into a bot and installing other, even more malicious malware. Second, from a trend standpoint, mobile malware appears to be evolving from exploiting vulnerabilities toward more profile building and device-hijacking behavior. There appears to be an increasing value placed on the movements of the device owner. Sharing tracking information with a mobile app may seem benign or at most, a privacy issue, but it raises profound business security implications in the “bring your own device” world. A clever piece of malware installed on the CEO’s phone directly or indirectly by a less-than-reputable mobile app and doing nothing more than tracking location information could actually tip off competitors, suppliers, financial analysts, blackmailers, or even those who wish to do someone physical harm. NEW MOBILE MALWARE SHOWING DEVICE-HACKING BEHAVIOR 15% 10% 5% 0% 25% 20% 40% 35% 30% 45% Send Handset Intro Spyware Adware Send Premium SMS Fraud Exploit Rooting Malware Backdoor/Botnet Hacktool Downloader/Installer Destructive SMS Spam Dec 2012 Dec 2013 Source: McAfee Labs, 2014. key topics Follow McAfee Labs
  • 14. McAfee Labs Threats Report | Fourth Quarter 2013 14 Threats Statistics
  • 15. McAfee Labs Threats Report | Fourth Quarter 2013 15 Malware The McAfee Labs “zoo” grew by 15% during the quarter. It now contains more than 196 million unique malware samples. NEW MALWARE 10,000,000 5,000,000 0 15,000,000 25,000,000 20,000,000 30,000,000 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 2011 2012 2013 Source: McAfee Labs, 2014. TOTAL MALWARE 50,000,000 0 100,000,000 150,000,000 200,000,000 250,000,000 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 2011 2012 2013 Source: McAfee Labs, 2014. THREATS STATISTICS Follow McAfee Labs
  • 16. McAfee Labs Threats Report | Fourth Quarter 2013 16 The volume of new ransomware samples doubled from Q4 2012 to Q4 2013. McAfee Labs added 1 million new samples in 2013. NEW RANSOMWARE 100,000 50,000 0 200,000 150,000 350,000 300,000 250,000 400,000 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 2011 2012 2013 Source: McAfee Labs, 2014. TOTAL RANSOMWARE 600,000 400,000 200,000 0 1,000,000 800,000 1,600,000 1,400,000 1,200,000 1,800,000 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 2011 2012 2013 Source: McAfee Labs, 2014. THREATS STATISTICS Follow McAfee Labs
  • 17. McAfee Labs Threats Report | Fourth Quarter 2013 17 NEW ROOTKITS MALWARE 50,000 0 100,000 150,000 200,000 250,000 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 2011 2012 2013 Source: McAfee Labs, 2014. TOTAL ROOTKITS MALWARE 600,000 400,000 200,000 0 1,000,000 800,000 1,600,000 1,400,000 1,200,000 1,800,000 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 2011 2012 2013 Source: McAfee Labs, 2014. THREATS STATISTICS New rootkits dropped by 73% this quarter, continuing a decline that began 2011. Follow McAfee Labs
  • 18. McAfee Labs Threats Report | Fourth Quarter 2013 18 NEW MASTER BOOT RECORD–RELATED THREATS 200,000 100,000 0 400,000 300,000 700,000 600,000 500,000 800,000 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Identified MBR Components Variants of Families With Known MBR Payloads 2011 2012 2013 Source: McAfee Labs, 2014. TOTAL MASTER BOOT RECORD–RELATED THREATS 2,000,000 1,000,000 0 3,000,000 5,000,000 4,000,000 6,000,000 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Identified MBR Components Variants of Families With Known MBR Payloads 2011 2012 2013 Source: McAfee Labs, 2014. McAfee Labs added 2.2 million new MBR attack-related samples in 2013. THREATS STATISTICS Follow McAfee Labs
  • 19. McAfee Labs Threats Report | Fourth Quarter 2013 19 Web threats NEW SUSPECT URLs 4,000,000 2,000,000 0 8,000,000 6,000,000 14,000,000 12,000,000 10,000,000 16,000,000 Q2 Q3 Q4 Q1 Q2 Q3 Q4 URLs Associated Domains 2012 2013 Source: McAfee Labs, 2014. We recorded a 40% increase in the number of suspect URLs in 2013. LOCATION OF SERVERS HOSTING SUSPECT CONTENT North America Africa Asia-Pacific Australia Europe-Middle East Latin America 55.9% 31.9% 3.2% .1% .4% 8.4% Source: McAfee Labs, 2014. THREATS STATISTICS Follow McAfee Labs
  • 20. McAfee Labs Threats Report | Fourth Quarter 2013 20 NEW PHISHING URLs 150,000 100,000 50,000 0 250,000 200,000 400,000 350,000 300,000 450,000 URLs Associated Domains Q2 Q3 Q4 Q1 Q2 Q3 Q4 2012 2013 Source: McAfee Labs, 2014. TOP COUNTRIES HOSTING PHISHING URLs Czech Republic Germany France Canada Brazil United States 47% 6% 5% 5% 4% 27% 3% 3% TOP COUNTRIES HOSTING SPAM URLs Netherlands Russia Japan 47% 12% 5% 5% 4% 24% 3% United Kingdom Others Source: McAfee Labs, 2014. THREATS STATISTICS Follow McAfee Labs
  • 21. McAfee Labs Threats Report | Fourth Quarter 2013 21 Messaging threats GLOBAL EMAIL VOLUME 2 1 0 4 3 7 6 5 10 9 8 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Spam Legitimate Email Trillions of messages 2011 2012 2013 Source: McAfee Labs, 2014. GLOBAL MESSAGING BOTNET INFECTIONS 4,000,000 2,000,000 0 8,000,000 6,000,000 14,000,000 12,000,000 10,000,000 20,000,000 18,000,000 16,000,000 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 2011 2012 2013 Source: McAfee Labs, 2014. THREATS STATISTICS Follow McAfee Labs
  • 22. McAfee Labs Threats Report | Fourth Quarter 2013 22 Network threats TOP NETWORK ATTACKS Browser Remote Procedure Call Cross-Site Scripting SQL Injection Others 45% 9% 8% 12% 26% Source: McAfee Labs, 2014. WORLDWIDE SPAM BOTNET PREVALENCE Cutwall Kelihos Slenfbot Festi Darkmailer Others 35% 15% 12% 31% 4% 3% Source: McAfee Labs, 2014. THREATS STATISTICS Browser attacks, primarily exploiting vulnerabilities in Internet Explorer and Firefox, have been the leading network threat for the past six quarters. Follow McAfee Labs
  • 23. McAfee Labs Threats Report | Fourth Quarter 2013 23 NETWORK THREATS 4,000,000 2,000,000 0 8,000,000 6,000,000 14,000,000 12,000,000 10,000,000 16,000,000 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Browser Attacks Cross-Site Scripting Remote Procedure Call SQL Injection Others Source: McAfee Labs, 2014. 2012 2013 TOTAL NETWORK THREATS 10,000,000 5,000,000 0 20,000,000 15,000,000 35,000,000 30,000,000 25,000,000 40,000,000 Browser Attacks Cross-Site Scripting Remote Procedure Call SQL Injection Others Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Source: McAfee Labs, 2014. 2012 2013 THREATS STATISTICS Follow McAfee Labs
  • 24. McAfee Labs Threats Report | Fourth Quarter 2013 24 About McAfee McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ: INTC), empowers businesses, the public sector, and home users to safely experience the benefits of the Internet. The company delivers proactive and proven security solutions and services for systems, networks, and mobile devices around the world. With its visionary Security Connected strategy, innovative approach to hardware-enhanced security, and unique global threat intelligence network, McAfee is relentlessly focused on keeping its customers safe. http://www.mcafee.com 1 http://blogs.mcafee.com/mcafee-labs/mcafee-labs-detects-zero-day-exploit-targeting- microsoft-office-2 2 http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q1-2013.pdf 3 http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q3-2013.pdf 4 Current estimates range up to 110 million transaction records. 5 http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000009407 6 http://blogs.mcafee.com/mcafee-labs/mcafee-labs-detects-zero-day-exploit-targeting- microsoft-office-2 7 http://blogs.mcafee.com/mcafee-labs/mcafee-labs-detects-zero-day-exploit-targeting- microsoft-office-2 8 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3906 9 http://blogs.mcafee.com/business/updates-and-mitigation-to-cve-2013-3906-zero-day-threat 10 http://msdn.microsoft.com/en-us/library/aa338205%28v=office.12%29.aspx 11 Heap spraying: A method of malware payload delivery that injects a piece of code into a predictable and relocatable memory address. Malicious code may attempt this in the address space of another process to gain control of a system. 12 http://www.mcafee.com/us/resources/white-papers/wp-citadel-trojan-summary.pdf 13 http://msdn.microsoft.com/en-us/library/cc313105%28office.12%29.aspx 14 https://blogs.mcafee.com/mcafee-labs/solving-the-mystery-of-the-office-zero-day-exploit- and-dep 15 http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q3-2013.pdf 16 http://www.mcafee.com/us/resources/reports/rp-mobile-security-consumer-trends.pdf The information in this document is provided only for educational purposes and for the convenience of McAfee customers. The information contained herein is subject to change without notice, and is provided “as is,” without guarantee or warranty as to the accuracy or applicability of the information to any specific situation or circumstance. McAfee and the McAfee logo are registered trademarks or trademarks of McAfee or its subsidiaries in the United States and other countries. Other marks and brands may be claimed as the property of others. McAfee provides the specifications and descriptions herein only for information, subject to change without notice, and without warranty of any kind, expressed or implied. Copyright © 2014 McAfee, Inc. 60989rpt_qtr-q4_0314_fnl_PAIR