the cyber espionage blueprint by rsa security

Post on 08-Jun-2015

343 Views

Category:

Technology

7 Downloads

Preview:

Click to see full reader

DESCRIPTION

Read more via http://blogs.rsa.com/the-cyber-espionage-blueprint/?fb_source=pubv1

TRANSCRIPT

Finding

Finding

Finding

• 01• 02

03 •

04 •

• 05

The Current State of Cyber Threats

EMC2, EMC, RSA, the RSA logo, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States andother countries. All other trademarks used herein are the property of their respective owners. © Copyright 2013 EMC Corporation. All rights reserved.

Number of cyber espionagemalware samples analyzedfor the “Blueprint” report

Approx. # of Trojan familiesused in Cyber Espionage

campaigns

Percent of cyber espionagemalware samples with randomor nonsensical filenames

Percent of cyber espionagemalware samples usingstandard ports to communicate

Percent of cyber espionage malwaresamples installed in the user profile directory

2397

60

54%

68%

67%

Finding

Finding

Findings listed above come from the report, “The Cyber Espionage Blueprint”

top related