the changing threat landscape: 2010 and beyond

19
The changing threat landscape: 2010 and beyond Chester Wisniewski – Sophos Eamonn Medlar - WPP Moderator: Angela Moscaritolo

Upload: terah

Post on 22-Feb-2016

47 views

Category:

Documents


0 download

DESCRIPTION

The changing threat landscape: 2010 and beyond. Chester Wisniewski – Sophos Eamonn Medlar - WPP Moderator: Angela Moscaritolo. Threat landscape splitting in two. Opportunistic. Targeted. 2. What is an opportunistic attack?. Affiliate marketing Conficker Fake-AV Spam Phishing - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: The changing threat landscape: 2010 and beyond

The changing threat landscape: 2010 and beyond

Chester Wisniewski – Sophos Eamonn Medlar - WPP Moderator: Angela Moscaritolo

Page 2: The changing threat landscape: 2010 and beyond

Threat landscape splitting in two

2

Opportunistic Targeted

Page 3: The changing threat landscape: 2010 and beyond

What is an opportunistic attack?

Affiliate marketing Conficker Fake-AV Spam Phishing Social media SEO poisoning

Page 4: The changing threat landscape: 2010 and beyond

Fake anti-virus: Latest tricks

Page 5: The changing threat landscape: 2010 and beyond

ДОРВЕЙ (Doorway)

“A web page that is designed to attract traffic from a search engine and then redirect it to another site or page.”

Page 6: The changing threat landscape: 2010 and beyond

Black hat SEO

Page 7: The changing threat landscape: 2010 and beyond

Social network malware

Page 8: The changing threat landscape: 2010 and beyond

Koobface - Multilingual

Page 9: The changing threat landscape: 2010 and beyond

Koobface – What can it do?

Steal software keys Upload stored passwords Web server Search hijacking Captcha busting PPC fraud Fake AV Soc Net Spambot

Screenshot courtesy of abuse.ch

Page 10: The changing threat landscape: 2010 and beyond

Targeted attacks have diverged

Unknown exploit(s) Unknown malware Nearly silent Used for

espionage/cyberwarfare

How do we react to this new branch of attack?

MS Advisory for “Aurora” exploit

Page 11: The changing threat landscape: 2010 and beyond

MS10-046 Shortcut exploit

15 year old bug Stuxnet, Chymin, etc Multiple rootkits

Page 12: The changing threat landscape: 2010 and beyond

Signatures Tiny P2P Comms Exploits

(RCE and EoP) Small (without packers)

Silent, but deadly

Page 13: The changing threat landscape: 2010 and beyond

The new blended threat – Step 1

Page 14: The changing threat landscape: 2010 and beyond

The new blended threat – Step 2

Sample Zeus commands

Sethomepage [URL] resetgrab

getmff getcerts

Bc_add [service] [ip] [port] kos

Block_url shutdown

Rexec [url] [args] reboot

Lexec [file] [args] Upcfg [url]

Addsf [filemask] Block_fake

Page 15: The changing threat landscape: 2010 and beyond

Zeus takes the 3rd step

Law enforcement crackdown Widely decentralized

Image courtesy of krebsonsecurity,com

Page 16: The changing threat landscape: 2010 and beyond

“It’s mine” Portability Regulation Chain of trust Legacy increases

attacksurface

Challenges to the protector

Creative Commons image courtesy of thetechbuzz's Flickr photostream.

Page 17: The changing threat landscape: 2010 and beyond

Evolving with the threat

AV good for basic threat Behavior is key Collective intelligence Event correlation Defense in depth Data protection is key

Page 18: The changing threat landscape: 2010 and beyond

Discussion with Eamonn Medlar, WPP

Q&A

Page 19: The changing threat landscape: 2010 and beyond

19

Summary

Contact:

Proven:25+ years of experience

Integratedthreat detection

SophosLabs24/7/365

Anti-MalwareEmail Protection

Web FilteringEncryption

Email: [email protected] Twitter: @chetwisniewskiBlog: http://nakedsecurity.sophos.com

Device/App ControlNAC