the cyber espionage blueprint by rsa security
DESCRIPTION
Read more via http://blogs.rsa.com/the-cyber-espionage-blueprint/?fb_source=pubv1TRANSCRIPT
Finding
Finding
Finding
• 01• 02
03 •
04 •
• 05
The Current State of Cyber Threats
EMC2, EMC, RSA, the RSA logo, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States andother countries. All other trademarks used herein are the property of their respective owners. © Copyright 2013 EMC Corporation. All rights reserved.
Number of cyber espionagemalware samples analyzedfor the “Blueprint” report
Approx. # of Trojan familiesused in Cyber Espionage
campaigns
Percent of cyber espionagemalware samples with randomor nonsensical filenames
Percent of cyber espionagemalware samples usingstandard ports to communicate
Percent of cyber espionage malwaresamples installed in the user profile directory
2397
60
54%
68%
67%
Finding
Finding
Findings listed above come from the report, “The Cyber Espionage Blueprint”