36
MT 41 Key Security Insights: Examining the past to predict future threats

Key Security Insights: Examining 2014 to predict emerging threats

Embed Size (px)

Citation preview

Page 1: Key Security Insights: Examining 2014 to predict emerging threats

MT 41 Key Security Insights: Examining the past to predict future threats

Page 2: Key Security Insights: Examining 2014 to predict emerging threats

Dell Security threat intelligence

Page 3: Key Security Insights: Examining 2014 to predict emerging threats

Global Response Intelligent Defense (GRID) Network

• Threat research team

• Active participant in leading research organizations

• World-wide monitoring

• Advanced tracking and detection (i.e. Honeypots and Sandboxing)

• Continuous real-time counter-threat intelligence

• Industry leading responsiveness

Page 4: Key Security Insights: Examining 2014 to predict emerging threats

4.7 billion | intrusions blocked daily by Dell firewalls

Page 5: Key Security Insights: Examining 2014 to predict emerging threats

58% | Increase in intrusion attempts in 2014

Page 6: Key Security Insights: Examining 2014 to predict emerging threats

4.2 billion | Malware attacks blocked by Dell firewalls in 2014

Page 7: Key Security Insights: Examining 2014 to predict emerging threats

2X | Growth in unique malware attacks in 2014

Page 8: Key Security Insights: Examining 2014 to predict emerging threats

Top Malware

Page 9: Key Security Insights: Examining 2014 to predict emerging threats

Spin-offs of Cryptolocker for both Windows and Android platforms1

Page 10: Key Security Insights: Examining 2014 to predict emerging threats

Wirelurker malware targeting iOS2

Page 11: Key Security Insights: Examining 2014 to predict emerging threats

Point-of-sale malware used for targeted attacks against big retail chains3

Page 12: Key Security Insights: Examining 2014 to predict emerging threats

Global Marketing

The top malware delivery methods are not surprising

Website download

Text message (SMS)

Phishing

Portable device (USB)

Page 13: Key Security Insights: Examining 2014 to predict emerging threats

14% | increase in web applications used in 2014

Page 14: Key Security Insights: Examining 2014 to predict emerging threats

What did we find last year?

Page 15: Key Security Insights: Examining 2014 to predict emerging threats

Q1 2014 Q2 2014 Q3 2014 Q4 2014 Q1 2015 Q2 2015 Q3 2015

TARGET

MICHAELS

NEIMANMARCUS

AARON BROTHERS

SALLY BEAUTY

PF CHANGS

ALBERTSONS

UPS

STAPLES

HOME DEPOT

GOODWILL

KMART

DAIRY QUEEN

SONY

ANTHEM

OFFICE OF PERSONNEL

MANAGEMENT

ASHLEY MADISON

BLUE CROSS

HARVARD UNIVERSITY

Page 16: Key Security Insights: Examining 2014 to predict emerging threats

3X more POS malware

countermeasures deployed

in 2014

Page 17: Key Security Insights: Examining 2014 to predict emerging threats

Punkey(April 2015)

NewPosThings.C(April 2015)

PoSeidon(March 2015)

POS.UCC: a new multi-component POS malware

(February 2015)

What does this new POS malware do?

•Searches system registry for VNC passwords

•Scraping the memory of current processes for credit card information periodically

•Transfer credit card data in Base64 format to the command and control (C&C) server

2015 has been busy

Page 18: Key Security Insights: Examining 2014 to predict emerging threats

Are you inspecting HTTPS traffic today?

Yes

No

Not sure

1

Page 19: Key Security Insights: Examining 2014 to predict emerging threats

Many of your users’ web sessions are encrypted with HTTPS

Page 20: Key Security Insights: Examining 2014 to predict emerging threats

Encrypted web traffic growth

315%

66%

470%

Source: http://bit.ly/1MHk70k

SSL comprises 1/3 of typical enterprise traffic

SSL traffic is growing 20% per year

50% of all attacks are predicted to use SSL by 2017

Page 21: Key Security Insights: Examining 2014 to predict emerging threats

Google represents over half of all encrypted web traffic

December 2014

Page 22: Key Security Insights: Examining 2014 to predict emerging threats

SSL web connections increased 109% in 2014

60%

40%

2

Page 23: Key Security Insights: Examining 2014 to predict emerging threats

By Jeremy Kirk, IDG News Service, Jul 27, 2015

You can’t protect what you can’t see — attacks unseen by most firewalls

“…redirection code planted in the malicious advertisements uses SSL/TLS (Secure Sockets Layer/Transport Layer,…”

Page 24: Key Security Insights: Examining 2014 to predict emerging threats

Global Marketing

Supervisory Control and Data Acquisition (SCADA) Systems

Page 25: Key Security Insights: Examining 2014 to predict emerging threats

Global Marketing

SCADA presents some significant security challenges

Large-scale

Easy to use

Open design

Insecure

Page 26: Key Security Insights: Examining 2014 to predict emerging threats

Attacks doubled on SCADA systems

SCADA Hits Monthly

3

Page 27: Key Security Insights: Examining 2014 to predict emerging threats

Top SCADA attack methods

Source: ICS-CERT and National Vulnerability Database

Page 28: Key Security Insights: Examining 2014 to predict emerging threats

More highly targeted smartphone malware emerges

ATTACKS

OF 2014

AndroidLockerSimpleLocker

AndroRATDendroid

WindseekerWirelurker

4

Page 29: Key Security Insights: Examining 2014 to predict emerging threats

0

Android Titanium malware hides all its malicious code in a library file

(April 2015)

http://bit.ly/1Phq4lg

Page 30: Key Security Insights: Examining 2014 to predict emerging threats

What the background services do?

Captures sensitive user information such as Phone number, OS and MAC address

Collects SMS related data on the device and sends it to the server

Collects call related information on the device and sends it to the server

Monitors and sends status of the device screen while its active or in standby

Page 31: Key Security Insights: Examining 2014 to predict emerging threats

Two Bitcoin exchanges forced to close due to losses from 2014 attacks:

1. Mt. Gox 2. Flexcoin

Poloniex was hacked

for 12.3% of its

reserve

Page 32: Key Security Insights: Examining 2014 to predict emerging threats

Digital currencies including Bitcoin will continue to be targets of mining attacks

By the end of 2015:

• Bitcoin wallets estimated to reach 12 million

• Number of vendors accepting Bitcoin is expected to be more than 140,000

5

Source: State of Bitcoin 2015: Ecosystem Grows Despite Price Decline,”

CoinDesk, January 7, 2015,

Page 33: Key Security Insights: Examining 2014 to predict emerging threats

Key Takeaways

• Choose a security framework to establish security baselines

• Conduct annual security training for everyone

• Establish multiple layers of network security including wireless

• Keep security services active and up-to-date

• Make your endpoints secured as they can be

Page 34: Key Security Insights: Examining 2014 to predict emerging threats

Protect Comply Enable

Better security for better business.

User – Identity and Access Management

Endpoint

(Datacenter – Edge)

Network

(Perimeter and beyond)

Data and Application

(On-premises – Cloud)

Managed Security Services Security Intelligence and Response

Strategically connect solutions to enable better outcomes

Page 35: Key Security Insights: Examining 2014 to predict emerging threats

Download the2015 Dell Security

Annual Threat Report

https://marketing.sonicwall.com/whitepaper/dell-network-security-threat-report-2014874708/

Page 36: Key Security Insights: Examining 2014 to predict emerging threats

Thank You!