Internet Security Threat Report Volume XII: Worms, Bots, and BotNets John McCumber Strategic Programs GTC- Southwest.

Slides:



Advertisements
Similar presentations
Jack Jedwab Association for Canadian Studies September 27 th, 2008 Canadian Post Olympic Survey.
Advertisements

Symantec 2010 Windows 7 Migration EMEA Results. Methodology Applied Research performed survey 1,360 enterprises worldwide SMBs and enterprises Cross-industry.
EXAMPLES OF TOPLINE TRENDS AND PROFILES
Symantec 2010 Windows 7 Migration Global Results.
AGVISE Laboratories %Zone or Grid Samples – Northwood laboratory
Symantec 2004 Pulse of IT Security in Canada Volume II Survey shows Increases in Concern and Spending for IT Security Andrew Bisson Director, Planning.
Copyright, The Malware Menagerie Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy at U.N.S.W., eCommerce.
Slide 1 FastFacts Feature Presentation November 11, 2008 We are using audio during this session, so please dial in to our conference line… Phone number:
David Burdett May 11, 2004 Package Binding for WS CDL.
Add Governors Discretionary (1G) Grants Chapter 6.
CALENDAR.
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Supported by ESRC Large Grant. What difference does a decade make? Satisfaction with the NHS in Northern Ireland in 1996 and 2006.
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
The 5S numbers game..
© Tally Solutions Pvt. Ltd. All Rights Reserved Shoper 9 License Management December 09.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
The basics for simulations
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
PP Test Review Sections 6-1 to 6-6
EU Market Situation for Eggs and Poultry Management Committee 21 June 2012.
MCQ Chapter 07.
TCCI Barometer March “Establishing a reliable tool for monitoring the financial, business and social activity in the Prefecture of Thessaloniki”
Dynamic Access Control the file server, reimagined Presented by Mark on twitter 1 contents copyright 2013 Mark Minasi.
TCCI Barometer March “Establishing a reliable tool for monitoring the financial, business and social activity in the Prefecture of Thessaloniki”
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
Name of presenter(s) or subtitle Canadian Netizens February 2004.
Adding Up In Chunks.
Facebook Pages 101: Your Organization’s Foothold on the Social Web A Volunteer Leader Webinar Sponsored by CACO December 1, 2010 Andrew Gossen, Senior.
TCCI Barometer September “Establishing a reliable tool for monitoring the financial, business and social activity in the Prefecture of Thessaloniki”
When you see… Find the zeros You think….
Before Between After.
Subtraction: Adding UP
One-Degree Imager (ODI), WIYN Observatory What’s REALLY New in SolidWorks 2010 Richard Doyle, User Community Manager inspiration.
Static Equilibrium; Elasticity and Fracture
Import Tracking and Landed Cost Processing An Enhancement For AS/400 DMAS from  Copyright I/O International, 2001, 2005, 2008, 2012 Skip Intro Version.
A Data Warehouse Mining Tool Stephen Turner Chris Frala
Introduction Embedded Universal Tools and Online Features 2.
Schutzvermerk nach DIN 34 beachten 05/04/15 Seite 1 Training EPAM and CANopen Basic Solution: Password * * Level 1 Level 2 * Level 3 Password2 IP-Adr.
7 Effective Habits when using the Internet Philip O’Kane 1.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Symantec Security Intelligence Internet Security Threat Report Volume XVI June, 2011 Tiffany Jones Director – Programs and Strategy Symantec Public.
CERN - IT Department CH-1211 Genève 23 Switzerland t Update on the underground economy and making profit on the black market Wojciech Lapka.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.
Internet Security Threat Report Volume 9. 2 Internet Security Threat Report Volume 9 – Spokesperson Training Internet Security Threat Report VI What the.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Copyright © 2015 Cyberlight Global Associates Cyberlight GEORGIAN CYBER SECURITY & ICT INNOVATION EVENT 2015 Tbilisi, Georgia19-20 November 2015 Hardware.
Understand Malware LESSON Security Fundamentals.
INTRODUCTION & QUESTIONS.
Cybersecurity Test Review Introduction to Digital Technology.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Learn how to protect yourself against common attacks
IT Security  .
Risk of the Internet At Home
HOW DO I KEEP MY COMPUTER SAFE?
Presentation transcript:

Internet Security Threat Report Volume XII: Worms, Bots, and BotNets John McCumber Strategic Programs GTC- Southwest

Symantec Internet Security Threat Report - Volume XII Symantec The Internet Security Threat Report - Sources Threat Landscape - Overview ISTR XII - Key Trends ISTR XII - Key Findings Attacks Vulnerabilities Malicious Code Phishing & Spam Future Watch Best Practices and Solutions Todays Discussion 6

Symantec Internet Security Threat Report - Volume XII Symantec Symantec Global Intelligence Network > 6,000 Managed Security Devices Million Systems Worldwide + 30% of Worlds Traffic + Advanced Honeypot Network Reading, England Alexandria, VA Sydney, Australia Mountain View, CA Santa Monica, CA Calgary, Canada San Francisco, CA Dublin, Ireland Pune, India Taipei, Taiwan Tokyo, Japan 3 Symantec SOCs 80 Symantec Monitored Countries 40,000+ Registered Sensors in 180+ Countries 8 Symantec Security Response Centers

Symantec Internet Security Threat Report - Volume XII Symantec Threat Evolution Timeline curiosity crime VirusDestructive VirusMacro Virus Vulnerabilities Openly Discussed Mass Mailing Worms Network Worms Spam Tracking Cookies Spam Explodes Bots & Botnets DDoS Attacks Bots Explode Paid Vulnerability Research AdwareSpyware Rootkits On the Rise Spyware & Adware Explode Phishing Crimeware Phishing Explodes Zero Day Exploits & Threats Brain, 1986 Morris Worm, 1998 Brain, 1986 Morris Worm, 1998 Michaelangelo infects the MBR & overwrites data, 1991 AOL users enticed to give up login credentials, mid-1990s First adware appears: Aureate/Radiate, 1995 Conducent TimeSink, 1999 First adware appears: Aureate/Radiate, 1995 Conducent TimeSink, 1999 Comet Curser, 2001 Online fraud fueled by criminal economies, 2004-present Online fraud fueled by criminal economies, 2004-present Rootkits increasingly used by malware, 2005 Sony DRM 2005 Elitebar 2006 Many threats Rootkits increasingly used by malware, 2005 Sony DRM 2005 Elitebar 2006 Many threats Both legitimate and black markets for buying new vulns, present Both legitimate and black markets for buying new vulns, present RD Bot, 2002 Spybot, 2003 Gaobot, 2004 Ongoing… RD Bot, 2002 Spybot, 2003 Gaobot, 2004 Ongoing… Attacks begin in earnest using Bots. CNN, Yahoo, eBay and Datek knocked offline for hours, 2000 Trinoo, 1997 Tribal Flood, 1998 Trinoo, 1997 Tribal Flood, 1998 Ads for the Green Card Lottery posted to 6000 newsgroups simultaneously, 1994 Double Click first to use tracking cookies, 1996 Likely due to increasing use of botnets to send spam, 2002 Concept Virus for MS Office, 1995 BugTraq provides forum for admins, security pros & attackers to share vuln & exploit info, 1993 Melissa, 1999 Love Letter, 2000 Melissa, 1999 Love Letter, 2000 Code Red, 2001 Nimda, 2001 Code Red, 2001 Nimda, 2001 Malware predominately used for stealing information or providing unauthorized access Widespread drive-by downloads & install via web browser exploits, Unknown vulns found actively exploited in the wild to install Adware, Spyware, Bots and Crimeware 2005 WMF 2006 MS Office Exploits & Trojans Unknown vulns found actively exploited in the wild to install Adware, Spyware, Bots and Crimeware 2005 WMF 2006 MS Office Exploits & Trojans Threat Evolution

Symantec Internet Security Threat Report - Volume XII Symantec Its a Market Economy… Professional crime requires professional tools Increasingly commercialized PFR, Development spec., QA, RTM GTM - Pricing, distribution, support

Symantec Internet Security Threat Report - Volume XII Symantec …and business is booming! In the first half of 2007, 212,101 new malicious code threats were reported to Symantec. This is a 185% increase over the second half of 2006.

Symantec Internet Security Threat Report - Volume XII Symantec Attacks in Stages Multi-staged attacks use a small and quiet initial compromise to establish a beachhead from which subsequent attacks are launched Later stages of an attack can be changed to suit the attackers needs 1. Spam containing link to compromised server Compromised ServerMPack Server 3. Redirection 4. Downloader installed through browser vulnerability 2. User visits legitimate site 5. Download and install additional threats Server hosting additional threats

Symantec Internet Security Threat Report - Volume XII Symantec Change in Tactics and Targets Why go to you when youll come to them? Fertile ground Difficult to police

Symantec Internet Security Threat Report - Volume XII Symantec Increasing Regional Focus Threats are being tailored to specific regions and countries Some malicious code types are more prevalent in certain regions than others

Internet Security Threat Report Volume XII Key Facts and Figures

Symantec Internet Security Threat Report - Volume XII Symantec Attack Trends Malicious Activity Between January 1st and June 30th the United States was the top country for malicious activity (raw numbers) with 30% of the overall proportion. China was ranked second with 10%. When accounting for Internet populations, Israel was the top country with 11% followed by Canada with 6%. Seven of the top ten countries in this metric were located in EMEA.

Symantec Internet Security Threat Report - Volume XII Symantec Attack Trends Underground Economy Servers Trading in credit cards, identities, online payment services, bank accounts, bots, fraud tools, etc. are ranked according to goods most frequently offered for sale on underground economy servers. Credit cards were the most frequently advertised item (22%) followed by bank accounts (21%). passwords sell for almost as much as a bank account.

Symantec Internet Security Threat Report - Volume XII Symantec Attack Trends Data Breaches Information on data breaches that could lead to identity theft. Data collected is not Symantec data. The Education sector accounted for the majority of data breaches with 30%, followed by Government (26%) and Healthcare (15%) - almost half of breaches (46%) were due to theft or loss with hacking only accounting for 16%. The retail sector was responsible for 85% of exposed identities followed by Government. Where identities were exposed, 73% were due to hacking.

Symantec Internet Security Threat Report - Volume XII Symantec Attack Trends Bot Networks During the current reporting period Symantec observed an average of 52,771 active bot network computers per day, a 17% decrease from the last half of The worldwide total of distinct bot-infected computers that Symantec identified dropped to 5,029,309 - a 17% decrease. Year over year, this still represents a 7% increase. Command and control servers decreased during this period to 4,622 - a 3% decrease. The United States continues to have the highest number of command and control servers worldwide with 43% - a 3% increase from its previous total. China has increased its global proportion of bot-infected computers to 29% while the United States continues to decline somewhat. Chinas bot growth has slowed since last year when it increased by 15%.

Symantec Internet Security Threat Report - Volume XII Symantec Vulnerability Trends Browser Vulnerabilities and W.O.E. Microsoft had the highest number of documented vulnerabilities with 39 followed by Mozilla with 34. Both these vendors also had the highest window of exposure at 5 days each. Safari and Opera were the only browsers to experience an increase in documented vulnerabilities this period. There were 25 vulnerabilities documented in Safari this period, a significant increase from the 4 documented in the last half of However, Safari had the shortest window of exposure at only 3 days.

Symantec Internet Security Threat Report - Volume XII Symantec Vulnerability Trends Browser plug-in vulnerabilities Vulnerabilities in Web browser plug-ins are frequently exploited to install malicious software. In the first half of 2007, 237 vulnerabilities affecting browser plug-ins were documented compared to 108 in all of % of browser plug-in vulnerabilities affected ActiveX components for Internet Explorer, an increase over the 58% in the previous period.

Symantec Internet Security Threat Report - Volume XII Symantec Vulnerability Trends Unpatched vulnerabilities by vendor 90 of the documented vulnerabilities in the period were unpatched compared to 94 in the previous period. Microsoft had the most unpatched vulnerabilities at 64. This is lower than the 75 unpatched vulnerabilities in the second half of Oracle had 13 unpatched vulnerabilities in the first half of 2007, an increase over the 7 documented in the previous period.

Symantec Internet Security Threat Report - Volume XII Symantec Vulnerability Trends Additional Metrics Symantec documented 2,461 vulnerabilities in the current reporting period, 3% fewer than the previous reporting period. Severity classification: High severity 9%, Medium severity 51% and Low severity 40%. Web applications constituted 61% of all documented vulnerabilities. 72% of vulnerabilities documented this period were easily exploitable compared to 79% in the previous period. The W.O.E. for enterprise vendors was 55 days, an increase over the 47 day average in the second half of vulnerabilities were documented in Oracle, more than any other database this period. This is lower than the 168 Oracle database vulnerabilities documented in the previous period. From January 1st - June 30th 2007, Symantec documented 6 zero-day vulnerabilities, a decrease from the previous reporting period.

Symantec Internet Security Threat Report - Volume XII Symantec Malicious Code Trends Multiple infections 35% of computers reporting potential malicious code infections reported more than once. Many of these may be the result of staged downloaders.

Symantec Internet Security Threat Report - Volume XII Symantec Malicious Code Trends Types Trojans continue to rise and may constitute a greater threat because they tend to exploit web browser and zero-day vulnerabilities. Trojans causing potential/attempted infections increased from 60% to 73% this period. Worms continue to drop this period, only accounting for 22% of potential infections. This is a decrease from the 37% in the last half of The percentage of viruses increased from 5% to 10% this period.

Symantec Internet Security Threat Report - Volume XII Symantec Malicious Code Trends Threats to Confidential Information During the current reporting period, threats to confidential information made up 65% of the volume of top 50 malicious code causing potential infections, up from 53% in the previous reporting period. While the volume of threats that allow remote access remained stable from the same reporting period last year, the volume of threats that log keystrokes and export user and system data have all increased - Keystroke loggers represent 88% of the report threats to confidential information.

Symantec Internet Security Threat Report - Volume XII Symantec Malicious Code Trend Propagation Vectors attachment propagation is the number one propagation mechanism at 46%. High percentages of various file-sharing mechanisms like CIFS and P2P show diversification to counter increasing attachment blocking.

Symantec Internet Security Threat Report - Volume XII Symantec Malicious Code Trends Malcode targeting online gaming Total annual wealth created within virtual worlds has been placed at approximately 10 billion USD. 5% of the top 50 malicious code this period targeted online gaming account information. The two most commonly targeted games were Lineage and World of Warcraft.

Symantec Internet Security Threat Report - Volume XII Symantec The Rapid Evolution of Fraud The old tactics wont go away –Non-stop stream of fresh meat coming online who may not be aware of basic scam techniques New brand techniques –Leverage new, trusted brands a user will not suspect –Keep an eye on the 2008 elections and fraud tactics that may leverage them More sophisticated tricks –Universal Phishing Kit makes attacks more convincing and easy than ever –Man-in-the-middle attack where phisher shows the real phished site but through an SSL proxy –No need for phisher to create spoofed website, only requires PHP script & proxy as well as enticement messages

Symantec Internet Security Threat Report - Volume XII Symantec Phishing By the numbers… The Symantec Probe network detected a total of 196,860 unique phishing messages, an 18 percent increase from the previous period. This translates into an average of 1,088 unique phishing messages per day. Symantec blocked over 2.3 billion phishing messages - an increase of 53% over the last half of An average of 12.5 million phishing messages per day. Financial services accounted for 79% of the unique brands that were phished while making up 72% of the total phishing websites. The ISP sector accounted for 11% of unique brands phished and 3% of the total number of phishing websites. During the first six months of 2007, Symantec classified 78 of the 359 brands being phished as core brands. Core brands are those that are spoofed at least once each month by a phishing attack.

Symantec Internet Security Threat Report - Volume XII Symantec Phishing Top Countries Hosting Phishing Sites 59% of known phishing sites were located in the United States followed by Germany with 6% and the United Kingdom with 3% The U.S. is number one because a large number of Web-hosting providersparticularly free Web hosts are located in the United States. The increase in phishing sites there this period may be in part due to the high number of Trojans in North America.

Symantec Internet Security Threat Report - Volume XII Symantec Phishing Automated phishing toolkits Three phishing toolkits were responsible for 42 percent of all phishing Web sites observed by Symantec in the first half of % of all phishing Web sites were hosted on only 30% of IP addresses known to be phishing Web servers. Phishing toolkits are often indicated by the ability to host a large number of phishing sites on the same compromised computer.

Symantec Internet Security Threat Report - Volume XII Symantec Spam By the numbers… Between July 1 and December 31, 2006, spam made up 61 percent of all traffic. 60% of all spam is in English. During the current reporting period, 0.43% of spam contained malicious code - one out of every 147 spam messages. Image spam made up 27% of all spam blocked by Symantec in the first half of 2007.

Symantec Internet Security Threat Report - Volume XII Symantec Spam Country of Origin 47% of all spam originated in the United States, an increase from 44% in the previous reporting period. Undetermined EU countries rank second with 7% followed by China with 4% Country of origin includes spam originating from spam zombies and legitimate servers. Spam zombies are the result of an infection by a bot, worm or Trojan and show a wider distribution of spam origins. Distribution of Spam Zombies - U.S. 10%, China 9%, Germany 9%. 5 of the top ten spam zombie countries are in EMEA.

Symantec Internet Security Threat Report - Volume XII Symantec Critical priorities and steps PriorityRecommendation 1 Data Inventory & Classification Figure out where the important date lives. Start there. 2 Encryption Pick what works best for your business, critical data first. 3 Awareness & Training For travelers/remote workers, critical data handlers & everyone else. 4 Process, Process, Process Helpdesk authentication, termination process, contractor lifecycle, etc. 5 Segmentation & Separation of Duties Networks & employees– dont let the fox (or the hens!) watch the henhouse 6 Know Thy Perimeter Wireless audits & overall vulnerability management prevent easy hacks 7 Develop Secure Applications Cheapest and best means of protecting applications is to develop them securely 8 New Technical Solutions Do the basics but also consider solutions such as data leakage & lojack

Symantec Internet Security Threat Report - Volume XII Symantec & ANSWERS QUESTIONS John McCumber