14

Click here to load reader

Threat predictions 2011

Embed Size (px)

Citation preview

Page 1: Threat predictions 2011

Copyright 2009 Trend Micro Inc.

Trend Micro Threat Predictions for 2011

Classification 05/03/2023 1

Page 2: Threat predictions 2011

Copyright 2009 Trend Micro Inc.

Threats Today

Classification 05/03/2023 2

FACT #1:More than 80% of Today’s Top Malware Arrives via Web1

1 – source TrendLabs data Apr – Sept 20102 – source Trend Micro Smart Protection Network

FACT #2:3.5 new threats every second are released by cybercriminals2

Page 3: Threat predictions 2011

Copyright 2009 Trend Micro Inc.

The Power of Trend Micro Smart Protection Network• 60 billion queries every 24 hours

• Blocks 5.5 billion threats daily

• Processes 3.2 terabytes of data daily

• An average 102 million users connected to the network each day

Classification 05/03/2023 3

Page 4: Threat predictions 2011

Copyright 2009 Trend Micro Inc.

Prediction #1 – Cloud-related issues• Security Demands on cloud service providers

will increase

– Proof of concept attacks against cloud infrastructure

and virtualized systems will emerge in 2011

– Diversity of Operating Systems at the endpoints

forces the bad guys to focus more on critical cloud

services and server infrastructures

Classification 05/03/2023 4

Page 5: Threat predictions 2011

Copyright 2009 Trend Micro Inc.

Prediction #2 – Targeted Attacks and Cyber-Espionage• Mid-sized companies will be targeted in cyber-

espionage  

– Easy-to-use underground toolkits enable targeted

attacks on particular types of organization

• ZeuS primarily targeted small businesses in 2010

– Growth of targeted and localized attacks will

continue both against big name brands and/or

critical infrastructure

Classification 05/03/2023 5

Page 6: Threat predictions 2011

Copyright 2009 Trend Micro Inc.

Prediction #3 – The Cybercrime Underground Evolution• Further consolidation in the cybercrime

underground

– Groups merge and/or join forces as global, public

attention for cyber attacks grows

• Example: ZeuS / SpyEye

Classification 05/03/2023 6

Page 7: Threat predictions 2011

Copyright 2009 Trend Micro Inc.

Prediction #4 – Clever Malware Campaigning• It’s all about social engineering.  • Fewer infiltrated websites, more cleverly

crafted and localized HTML e-mails with URL’s pointing to the infection source– Malware campaigning will ensure fast and reliable

spreading of the downloader – The downloader then downloads randomly

generated binaries to avoid detection

Classification 05/03/2023 7

Page 8: Threat predictions 2011

Copyright 2009 Trend Micro Inc.

Prediction #5 – Malware Attacks• Increasing use of stolen or legitimate digital

certificates in malware attacks, to avoid detection

• Huge growth in use of complex domain generation algorithms (as used by Conficker & LICAT) in Advanced Persistent Threats, and increase in Java-based attacks

Classification 05/03/2023 8

Page 9: Threat predictions 2011

Copyright 2009 Trend Micro Inc.

Prediction #6 – Focus for Vulnerabilities and Exploits• Growth in exploits for alternative operating

systems, programs and web browsers, combined with tremendous growth in the use of application vulnerabilities (Flash, etc)

Classification 05/03/2023 9

Page 10: Threat predictions 2011

Copyright 2009 Trend Micro Inc.

Prediction #7 – Security Vendors Become Targets• Security vendors’ brands will increasingly be

targeted by criminalsResult: Confusion and insecurity among users

Classification 05/03/2023 10

Page 11: Threat predictions 2011

Copyright 2009 Trend Micro Inc.

Prediction #8 – Mobile Risks• More proof of concept, and some successful

attacks on mobile devices, but not yet mainstream

• Cybercriminals will explore profitability of mobile device attacks, but monoculture is required before such attacks become mainstream

Classification 05/03/2023 11

Page 12: Threat predictions 2011

Copyright 2009 Trend Micro Inc.

Prediction #9 – Old Malware Reinfections• Some security vendors will run into trouble

with local signatures not being able to store all the threat information

– They will retire old signatures which will lead to

infections with old/outdated malware

Classification 05/03/2023 12

Page 13: Threat predictions 2011

Copyright 2009 Trend Micro Inc.

Prediction #10 – Vulnerable Legacy Systems• Targeted attacks on “unpatchable” (but widely

used) legacy systems

– Windows 2000/Windows XP SP2

– Embedded systems like Telecom switchboards etc.  

Classification 05/03/2023 13

Page 14: Threat predictions 2011

Copyright 2009 Trend Micro Inc.

THANK YOU!

Classification 05/03/2023 14