48
Report Overview Renault Ross CISSP, MCSE, CHSS, CCSK, VCP5 United States Cyber Security & Privacy Architect Strategic Government Programs

Draft of Speaker Training for ISTR18 - Kentucky Cyber Security... · Old Motivation . Threat Landscape A fundamental shift… 3 Cyber Crime ... Silverlight, Skype…) Code (php, ActiveX

  • Upload
    vandien

  • View
    216

  • Download
    0

Embed Size (px)

Citation preview

Report Overview

Renault Ross CISSP, MCSE, CHSS, CCSK, VCP5

United States Cyber Security & Privacy Architect

Strategic Government Programs

Highlights of the Report

1 Targeted Attacks 2 Mobile 3 Vulnerabilities 4 Mac

Internet Security Threat Report 2013 :: Volume 18 2

Hacking Old Motivation

Threat Landscape A fundamental shift…

3

Cyber Crime Cyber Espionage

Cyber Warfare 3 Internet Security Threat Report 2013 :: Volume 18

Hackers for Hire Make Malware Big Business

4

10 Months Average length of time zero-day

attacks sit and silently collect data

$250,000

Top payout for hackers that successfully breach and remain

undetected -Forbes, 10/16/2012

Symantec Endpoint Protection 12 Internet Security Threat Report 2013 :: Volume 18

Internet Security Threat Report 2013 :: Volume 18

Targeted Attacks

up 42% in 2012

5

Targeted Attacks by Company Size

• Greatest growth in 2012 is at companies with <250 employees

Internet Security Threat Report 2013 :: Volume 18 6

50%

9%

2%

1,501 to 2,500

3% 5%

31%

1,001 to 1,500 501 to 1,000 251 to 500

1 to 250 18%

in 2011

Employees 2,501+

50% 2,501+ 50% 1 to 2,500

Weapon Plans

Sub Contractor 4

Sub Contractor 2

7

Target Primary Data

Government

Sub Contractor 1

Sub Contractor 3

Primary Contractor

Sub Contractor 3

Weapon Plans

Sub Contractor 4

Sub Contractor 2

8

Target Sub Data to Gain Access to Primary Data

Government

Sub Contractor 1

Primary Contractor

• Manufacturing moved to top position in 2012

• But all industries are targeted

Internet Security Threat Report 2013 :: Volume 18 9

1%

2%

2%

2%

8%

10%

12%

17%

19%

24%

0% 10% 20% 30%

Transportation, Communications, Electric, Gas

Aerospace

Retail

Wholesale

Services – Professional

Energy/Utilities

Government

Services – Non-Traditional

Finance, Insurance & Real Estate

Manufacturing Manufacturing

Finance, Insurance & Real Estate

Services – Non-Traditional

Government

Energy/Utilities

Services – Professional

Wholesale

Retail

Aerospace

Transportation, Communications, Electric, Gas

Targeted Attacks by Industry

R&D 27%

Senior 12%

C-Level 17%

Sales 24%

Shared Mailbox

13%

Recruitment 4%

Media 3% PA

1% 0%

5%

10%

15%

20%

25%

30%

• Attacks may start with the ultimate target but often look opportunistically for any entry into a company

Internet Security Threat Report 2013 :: Volume 18 10

Targeted Attacks by Job Function

2

Infection vectors

11

1 Watering Hole Attack in 2012

Infected 500 Companies

All Within 24

Hours

• Watering Hole attacks are targeted at specific groups • Can capture a large number of victims in a very short time

Internet Security Threat Report 2013 :: Volume 18 12

Effectiveness of Watering Hole Attacks

The vulnerability being exploited is the browser and plugins

Browser IPS

Host IPS

Plugins (flash, Acrobat, Silverlight, Skype…)

Code (php, ActiveX javascript, AS3)

Browser

Protocol (HTTP, HTTPS)

Network (IP)

Presenting SEP 12.1 RU2 13

Threat Landscape Attack scenario #1

• It can start with an attachment

• Buried inside may be an embedded ‘Flash’ object

• Which leverages a vulnerability to deliver malware

14

Agenda.pdf

Internet Security Threat Report 2013 :: Volume 18

Threat Landscape Attack scenario #2

• More likely it will be a link

• Seems innocuous, right?

• Well not so fast…

• Hover over the link to see

the real link buried underneath

• Clicking the link brings you to a malicious web site

15 Internet Security Threat Report 2013 :: Volume 18

Mobile Trends

Internet Security Threat Report 2013 :: Volume 18 16

Vulnerabilities & Mobile Malware

• Today there is no significant link between mobile OS vulnerabilities and exploitation by malware

• In the future that may change

Internet Security Threat Report 2013 :: Volume 18 17

Platform Vulnerabilities

Apple iOS 387

Android 13

Blackberry 13

Windows Mobile 2

Device Type # of Threats

Apple iOS Malware 1

Android Malware 103

Symbian Malware 3

Windows Malware 1

Vulnerability Patching

18

Service Providers

iOS

Google

OEMs

Malicious apps are the avenue

19

Trends Mobile Threats

• Can you tell which one is the right legitimate app?

• Most malware for mobiles are Trojans posing as legitimate apps

• Mobiles will be targeted more when used for financial transactions

20 Internet Security Threat Report 2013 :: Volume 18

21

Mobile Threats

“Have you heard, there’s an app for that…”

22 Internet Security Threat Report 2013 :: Volume 18

Mobile Threats

Unfortunately there’s also a ‘trojanized’ version too… – Found on 3rd party sites and torrents – Self signed

It does two things: 1. Sends info to a remote location 2. Sends an SMS to all your contacts

Android.Walkinwat

23 Internet Security Threat Report 2013 :: Volume 18

Vulnerabilities

Internet Security Threat Report 2013 :: Volume 18 24

12 new 0day vulnerabilities

Threat Landscape How often are we being attacked?

⁻ 14 new 0day vulnerabilities ⁻ 163 new mobile vulnerabilities

⁻ 6,253 new vulnerabilities

⁻ 286,000,000 new malware variants

14 new public SCADA vulnerabilities

321 browser plug-in vulnerabilities

4,501 new vulnerabilities

17,432 new bot C&C servers

30,000 domains hosting malware

59,526 phishing hosts

2,895,802 new AV signatures

6,798,338 bot infected computers

240,000,000 million new malware variants

3,050,000,000 attacks blocked by Symantec in 2010

In the time it takes to give this presentation,

we will block more than 365,000 attacks!

25 Internet Security Threat Report 2013 :: Volume 18

The Problem Malware authors have switched tactics

From: A mass distribution of a

relatively few threats e.g.

Storm made its way onto millions of machines across the globe

To:

A micro distribution model e.g. The average Vundo variant is

distributed to 18 Symantec users!

The average Harakit variant is distributed to 1.6 Symantec users!

26

240M+ distinct new threats discovered last year!

What are the odds a security vendor will discover all these threats?

Internet Security Threat Report 2013 :: Volume 18

Our Websites are Being Used Against Us

Internet Security Threat Report 2013 :: Volume 18 27

53% of legitimate websites have unpatched vulnerabilities

24% have critical vulnerabilities unpatched

61% of malicious web sites are legitimate sites

Ransomware

Internet Security Threat Report 2013 :: Volume 18 28

16 Number of criminal gangs involved in this cybercrime

$5 Million Estimated amount extorted from victims in 2012

500,000 Average number of attacks seen from one threat in 18 day period

29

Mac Malware

Internet Security Threat Report 2013 :: Volume 18 30

31

Mac Malware

Internet Security Threat Report 2013 :: Volume 18 32

Only 2.5% of threats found on

Macs are Mac malware

Internet Security Threat Report 2013 :: Volume 18 33

Flashback

But in 2012 1 Mac Threat infected 600,000

Machines.

Beyond the Main Report

Internet Security Threat Report 2013 :: Volume 18 34

•Video • Infographics • Podcast •More …

symantec.com/threatreport

Authenticate Identities Two-factor authentication, Managed Public Key Infrastructure solutions

Industry recommended strategy to protect information

Protect the Infrastructure Malicious Endpoint Protection, Web Gateway, Message Gateway, and

Critical Systems Protection solutions

Develop and Enforce IT Policies Policy & standards modules, risk

manager & vulnerability modules and solutions

Manage the Infrastructure

Desktop and server patch

management, software delivery, assets, ticket management and

mobile devices solutions

35

Protect the information Data Loss Prevention, Encryption, Backup and High availability solutions

Governance Tools to Develop and Enforce IT Policy Policies

1

3rd Party Data

37

Governance, Risk and Compliance

ESM Manager

CCS-Data Collection

Federated Data Processing and Analysis

Dashboards Audit Reports

Questionaires Entitlements Standards External Policies

A

Authenticate Identities 2

Endpoint Mobility

Application Government

Shared cloud-based two-factor authentication solution offering

multiple credential choices

VeriSign Identity Protection

RISK SCORE

Rules Eng. Behavior Eng.

Risk-Based authentication and software-based fraud detection

Fraud Detection Service

39

Strong Authentication and MPKI

Public Key Infrastructure

PKI service issues certificates for strong authentication,

encryption and digital signing

Protect the Information 3

41

Data Loss Prevention

Storage Data Loss Prevention

Network Discover

Data Loss Prevention Data Insight

Data Loss Prevention Network Protect

Endpoint

Data Loss Prevention

Endpoint Discover

Data Loss Prevention Endpoint Prevent

Network

Data Loss Prevention Network Monitor

Data Loss Prevention Network Prevent

42

Encryption of sensitive data

Whole Disk Help Desk

Removal Hard-drive

Manage the Infrastructure 4

44

Enterprise Systems Management

System Management Platform

Systems Management Platform

INFRASTRUCTURE OPERATIONS

BUSINESS CONTINUITY STORAGE INFORMATION RISK

& COMPLIANCE SECURITY

Backup Management

Patch and System Management

Mobile Security Management

Power Management

HelpDesk Management

Application Virtualization

Dell Management Console

Dell Client Manager

vProTM enabled computer

management

HP Client Manager

Third-Party Solutions

Protect the Infrastructure 5

Threat management solutions

\

What about a mobility strategy?

47

Corporate Persona

Personal Apps & Data

Unmanaged Persona

Enterprise Mobile

Strategy

Authentication

Mobile App Management Mobile Device Management

Mobile Threat Management

Internet Security Threat Report 2013 :: Volume 18

Quiz

• What is the #1 industry for targeted attacks? – Retail – Manufacturing – Government

• True or False: The CEO and Executive board are the #1 targeted

individuals of an organization? Why or Why not?

• To protect an organization a company must do what first? – Encrypt information – Authenticate users – Develop corporate policies

48 Internet Security Threat Report 2013 :: Volume 18