Fiaaz Walji Sr. Director Websense Canada. Shift in attacks = shift in Defense 2 2012 began with a report from IDC stating Signature-based tools (anti-virus,

Slides:



Advertisements
Similar presentations
Numbers Treasure Hunt Following each question, click on the answer. If correct, the next page will load with a graphic first – these can be used to check.
Advertisements

1 Leveraging social networking in your business marketing Leveraging social networking in your business marketing.
AP STUDY SESSION 2.
1
Distributed Systems Architectures
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Processes and Operating Systems
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 3 CPUs.
Myra Shields Training Manager Introduction to OvidSP.
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
UNITED NATIONS Shipment Details Report – January 2006.
1 Hyades Command Routing Message flow and data translation.
David Burdett May 11, 2004 Package Binding for WS CDL.
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
Properties of Real Numbers CommutativeAssociativeDistributive Identity + × Inverse + ×
CALENDAR.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt BlendsDigraphsShort.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt RhymesMapsMathInsects.
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
Photo Slideshow Instructions (delete before presenting or this page will show when slideshow loops) 1.Set PowerPoint to work in Outline. View/Normal click.
Lost in Translation Measuring and Managing GOOD Web Intentions Marilyn Harmacek. 1.
Break Time Remaining 10:00.
Table 12.1: Cash Flows to a Cash and Carry Trading Strategy.
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
PP Test Review Sections 6-1 to 6-6
Employee & Manager Self Service Overview
Bright Futures Guidelines Priorities and Screening Tables
EIS Bridge Tool and Staging Tables September 1, 2009 Instructor: Way Poteat Slide: 1.
Bellwork Do the following problem on a ½ sheet of paper and turn in.
© Blue Coat Systems, Inc All Rights Reserved. APTs Are Not a New Type of Malware 1 Source: BC Labs Report: Advanced Persistent Threats.
1 The Royal Doulton Company The Royal Doulton Company is an English company producing tableware and collectables, dating to Operating originally.
Exarte Bezoek aan de Mediacampus Bachelor in de grafische en digitale media April 2014.
Sample Service Screenshots Enterprise Cloud Service 11.3.
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
1 RA III - Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Buenos Aires, Argentina, 25 – 27 October 2006 Status of observing programmes in RA.
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
© 2012 National Heart Foundation of Australia. Slide 2.
Adding Up In Chunks.
SLP – Endless Possibilities What can SLP do for your school? Everything you need to know about SLP – past, present and future.
MaK_Full ahead loaded 1 Alarm Page Directory (F11)
Facebook Pages 101: Your Organization’s Foothold on the Social Web A Volunteer Leader Webinar Sponsored by CACO December 1, 2010 Andrew Gossen, Senior.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Synthetic.
Before Between After.
Subtraction: Adding UP
Prof.ir. Klaas H.J. Robers, January 16, 2013 Supervising a graduating student 1.
1 hi at no doifpi me be go we of at be do go hi if me no of pi we Inorder Traversal Inorder traversal. n Visit the left subtree. n Visit the node. n Visit.
Analyzing Genes and Genomes
Prof.ir. Klaas H.J. Robers, 14 July Graduation: a process organised by YOU.
Speak Up for Safety Dr. Susan Strauss Harassment & Bullying Consultant November 9, 2012.
Essential Cell Biology
Converting a Fraction to %
ANSC644 Bioinformatics-Database Mining 1 ANSC644 Bioinformatics §Carl J. Schmidt §051 Townsend Hall §
Clock will move after 1 minute
PSSA Preparation.
Xiao Zhang and Wenliang Du Dept. of Electrical Engineering & Computer Science Syracuse University.
Essential Cell Biology
Immunobiology: The Immune System in Health & Disease Sixth Edition
Physics for Scientists & Engineers, 3rd Edition
Energy Generation in Mitochondria and Chlorplasts
Select a time to count down from the clock above
Murach’s OS/390 and z/OS JCLChapter 16, Slide 1 © 2002, Mike Murach & Associates, Inc.
South Dakota Library Network MetaLib User Interface South Dakota Library Network 1200 University, Unit 9672 Spearfish, SD © South Dakota.
User Security for e-Post Applications Dr Chandana Gamage University of Moratuwa.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
Presentation transcript:

Fiaaz Walji Sr. Director Websense Canada

Shift in attacks = shift in Defense began with a report from IDC stating Signature-based tools (anti-virus, firewalls and intrusion prevention) are only effective against 30% – 50% of current security threats Much of this can be attributed to how attacks have evolved to specifically counter those defenses Websense® Security Labs team produced report on the key threats and trends

Behind the 2013 Threat Report 3 Data Collection Threat Analysis Expert Interpretation

4 ThreatSeeker Network Largest Security Intelligence Network Up to 5 billion requests per day 900 million global end points Largest Security Intelligence Network Up to 5 billion requests per day 900 million global end points 400+ million sites per day 1 billion pieces of content per day 10+ million s per hour 2.5 billion URLs per day

# Viruses undetected by Top 5 AV Engines 5

Areas Covered in this Report 6

Victims are Everywhere 7

8

9

10 Social Media Mobile Attack Vectors Web Victims are funneled to the Web Redirects Malware Recon XSS Dropper Files CnCCnC Exploit Kits Phishing

© 2012 Websense, Inc. Proprietary and Confidential Lure Redirect Exploit Kit Dropper File Call Home Data Theft Victims are funneled to the Web Recon CYBER KILL CHAIN

Web Threats 12

13 Web traffic To FIs SOURCE: COMSCORE

Top 5 most popular types of sites compromised 14

Key Take Away 15 The web is both an attack vector AND support for other attack vectors.

16

Social Media Adoption in Canada 17 Source: Comscore

18 Social Media Threats Presidents Family s, Photos Apparently Hacked ow.ly/hxY2a of malicious links in social media used shortened web links 32% 8. CANADA

KEY TAKE AWAY 19 As social media use increased in the workplace, so did the exposure of sensitive information

20

Mobile Phone Penetration by country 21

22 Source: Comscore ; Dec 2011 British Columbia ranks #1 in Canada in smartphone/capita 43% of Canadian smartpho ne subscribe rs own a connecte d device

23 of Canadians with Smartphones would consider using them like credit cards. CIBC poll by Harris/Decima Jul %

24 More Canadians are accessing online banking through their smartphones SOURCE: COMSCORE

25 Method of Access SOURCE: COMSCORE

26 1 Billion Apps were downloaded in the last week of 2012 Source: Flurry

Social Media: #2 use of Smartphones Lost Device Malicious URLs Exploitable technologies App Stores 27 Mobile Threats

SMS abused by 82 percent of malicious apps –SEND_SMS –RECEIVE_SMS –READ_SMS –WRITE_SMS 1 in 8: RECEIVE_WAP_PUSH 1 in 10: INSTALL_PACKAGES 28 Mobile Apps Malicious "Top 20"Android Permission Type Legitimate "Top 20" 1INTERNET1 2READ_PHONE_STATE3 3SEND_SMSX 4WRITE_EXTERNAL_STORAGE4 5ACCESS_NETWORK_STATE2 6RECEIVE_SMSX 7READ_SMSX 8RECEIVE_BOOT_COMPLETED11 9CALL_PHONE17 10WAKE_LOCK9 11ACCESS_COARSE_LOCATION6 12VIBRATE8 13RECEIVE_WAP_PUSHX 14ACCESS_FINE_LOCATION7 15WRITE_SMSX 16ACCESS_WIFI_STATE5 17GET_TASKS10 18SET_WALLPAPER14 19READ_CONTACTS15 20INSTALL_PACKAGESX Malicious "Top 20"Android Permission Type Legitimate "Top 20" 1INTERNET1 2READ_PHONE_STATE3 3SEND_SMSX 4WRITE_EXTERNAL_STORAGE4 5ACCESS_NETWORK_STATE2 6RECEIVE_SMSX 7READ_SMSX 8RECEIVE_BOOT_COMPLETED11 9CALL_PHONE17 10WAKE_LOCK9 11ACCESS_COARSE_LOCATION6 12VIBRATE8 13RECEIVE_WAP_PUSHX 14ACCESS_FINE_LOCATION7 15WRITE_SMSX 16ACCESS_WIFI_STATE5 17GET_TASKS10 18SET_WALLPAPER14 19READ_CONTACTS15 20INSTALL_PACKAGESX

KEY TAKE AWAY 29 Data stored on and accessed through a mobile device are at risk minimal control of web, and social media traffic and access. Lost devices are also a risk.

30

Only 1 in 5 s were safe and legitimate 31 Threats Breakdown by Content & URLs Breakdown by Content Only

92% of Spam s contain URLs Spam distribution rate: 250,000 per hour 32 Spam Top 5 Malicious Web Links in Spam 1Potentially Damaging ContentSuspicious sites with little or no useful content. 2Web and Spam Sites used in unsolicited commercial . 3Malicious WebsitesSites containing malicious code. 4Phishing and Other FraudsSites that counterfeit legitimate sites to elicit information. 5Malicious Embedded iFrameSites infected with a malicious iframe.

Increasingly focused on Commercial & Govt 69% sent on Mondays & Fridays More Targeted –Regionalized –Spear phishing on the rise Phishing 33 Top 5 Countries Hosting Phishing

KEY TAKE AWAYS 34 -based threats evolved significantly to circumvent keyword, reputation and other traditional defenses. Increased spear-phishing. Cybercriminals added a time-delay to some targeted attacks, >50% of users accessed from outside the corporate network.

35

Top 10 Countries Hosting Malware 36 United States Russian Federation Germany China Moldova Czech Republic United Kingdom France Netherlands Canada Organizations can no longer dismiss malware threats as solely an English-language or American phenomenon.

More aggressive –15% connected in first 60 sec. –90% requested information –50% accessed dropper files 37 Malware

38 Top 10 Countries Hosting CnC Servers

KEY TAKE AWAY 39 Todays malware is more dynamic and agile, adapting to an infected system within minutes. Half of web-connected malware downloaded additional executables in the first 60s The remainder proceeded more cautiously often a calculated response to bypass short- term sandbox defenses

40

Data Theft 41 Planned data theft attacks through cyberspace grew last year, targeting high value intellectual property (IP) and using all available vectors PII value/target remained flat

KEY TAKE AWAY 42 Remove temptation ; mitigate accidental loss through security improvements address growing SSL/TLS usage, provide an integrated approach to monitoring and controlling both inbound and outbound content

© 2012 Websense, Inc. Proprietary and Confidential Lure Redirect Exploit Kit Dropper File Call Home Data Theft Real World Example: Boston Tragedy Recon Shocking news lures in & SEO leading to the web redirect. Video page of the drama with a hidden malicious iFrame Redkit exploit kit leverages CVE , an Oracle Java 7 known vulnerability. Two known bot infection files allowing remote control of infected system. Two known botnet families registers newly infected systems &opens to commands Cyber criminals now control infected systems and targeted data topical or event-based campaigns, attempts to propagate as widely as possible, rather than being directed at specific individuals or organizations.

Conclusion 44 Primary attack foundation was the Web –Threats increased across all vectors –Attacks grew more: Aggressive ; Dynamic ; Multi-staged ; Multi-vector Defenses must adapt : –Real-time point-of-click ; Inbound & outbound ; Content & Context inspection MDM capabilities must be augmented –defenses to control mobile access ; perform real-time analysis of potentially malicious content across all vectors. security requires real-time threat analysis –Must be coordinated with web, mobile and other defenses. Malware defenses need to monitor both inbound and outbound –HTTP and HTTPS traffic to prevent infection and detect CnC communications

45 Thank You