webinar: insights from cyren's 2015 cyber threats yearbook
TRANSCRIPT
1©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.
CYREN Security Yearbook 2015
Lior Kohavi, Avi Turiel
2©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
2014 – Looking Back
Protecting the Enterprise
• Mapping the Attack
• Predicting Malware in Advance
The return of the Macro-Virus
Phishing – Gateway to the Breach
Malware on the Move
Rapid Spam Attacks
Assessing Industrial IoT Threats in 2015 and Beyond
Agenda
3©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 3©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
About CYREN
THE BEST KEPT SECRET IN INFORMATION SECURITY FOR MORE THAN A DECADE
Founded in 1991, CYREN (NASDAQ and TASE: CYRN) is a long-time innovator in cybersecurity. With full-function Security as a Service (SecaaS) solutions and security technology components for embedded deployments, CYREN provides web, email, endpoint and mobile security solutions that the world’s largest IT companies trust for protection against today’s advanced threats. CYREN collects threat data and delivers cyber intelligence through a unique global network of over 500,000 points of presence that processes 17 billion daily transactions and protects 600 million users.
3©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
4©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
CYREN Powers the World’s Security
Our Cyber Intelligence is the security backbone of many of the world’s largest and most influential information technology and Internet security brands.
5©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
CYREN Cybersecurity by the Numbers
6©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Poll Question
7©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Breaches such as Home Depot made the news… but..
Enterprises are besieged by cybercrime at an alarming rate: During the four-year period 2010-2014, the:
• Number of successful cyberattacks on businesses of all sizes increased by 144%
• Cost of cybercrime per company increased by 95%
• Average time to resolve incidents increased by 221%
Business leaders must think about solutions that utilize cyber intelligence from industry experts
2014 – Looking Back
Cybercriminals can sell personally
identifiable information (PII), such as the type recently stolen from Blue Cross
Blue Shield Anthem, for 10
times more than credit card data
on the black market.
8©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
In this section, we use in-depth analysis of individual threats captured by CYREN in 2014, to illustrate:
• How cybercriminals engage in the business of crime
• How they target the enterprise
• What CYREN is doing to halt the advance of cybercrime
Protecting the Enterprise
9©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
40 to 50 million emails distributed in short bursts lasting only three-to five-minutes each
Map the Attack
10©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Using Botnet Data to Predict Malware Trends
CYREN Analysts are observing a direct relationship between zombies and malware, enabling future malware attack prediction.
11©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Sophisticated social engineering
Demonstrates extensive tools available to cybercriminals
• Using attack vectors that are ignored
Return of the Macro-virus
12©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Malware Year in Review
Malware Emails Malware URLs Zero-hourMalwaredetection
13©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Attacks aimed at businesses and consumers
Often a 1st step to corporate breach
Postbank.de attack
• Estimated 6.5 billion emails sent during the 1st day of the attack
• 19,000 different URLs in one 12-hour period
• Total of 78,000 unique URLs distributed over a few days
Phishing – Gateway to the Breach
14©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Phishing Year in Review
15©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
CYREN predicts continued growth in Mobile Malware
• Mobile Ransomware
• Near Field Communications Malware
• Pre-installed Mobile Malware
Malware on the Move
16©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Mobile Malware year in Review
17©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
40 to 50 million emails sent in short bursts lasting only three- to five-minutes each
Rapid Spam Attacks
18©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Spam Year in Review
19©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Poll Question
20©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Assessing Industrial IoT Threats in 2015 and Beyond
In the coming year, the enterprise – from its people, to its devices, to its physical infrastructure – will be more connected than ever
Includes industrial items like building management and physical security, connecting to ‘smart’ platforms
21©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
You can also find us here:
www.CYREN.com
twitter.com/cyreninc
linkedin.com/company/cyren
©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Thank You. Any Questions or Thoughts?