Web Exploits and the Rise of Cybercriminals Roger Thompson AVG Chief Research Officer.

Slides:



Advertisements
Similar presentations
Updating from 7.5/8.0 to 8.5 Technical Review Presenter: Mark Danus, Sales Engineer/Training Manager Conference #: Pin#:
Advertisements

AVG Update Proxy Server Presenter: Khalid Sheffield, AVG Technical Trainer Host: Jeffrey Zinnert, Channel Sales Manager Conference #: Pin#:
(Distributed) Denial of Service Nick Feamster CS 4251 Spring 2008.
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
The Approach to Security in CLRC Gareth Smith With acknowledgements to all the members of the CLRC Computer Network and Security Group, especially Trevor.
June 2008 Surf Safely with a Clean Computer Roger Thornburn.
Slide 11 June 2014© IRM Plc 2001 Eaten by the Worms Eaten by the Worms The perils of network hostile code Dr Neil Barrett Technical Director - IRM Plc.
Outpost Office Firewall Product presentation. What is Outpost Office Firewall? Software firewall solution designed especially to meet small and medium.
Outpost Network Security Product presentation. What is Outpost Network Security? Combined manageable software firewall and anti-spyware solution designed.
Thank you to IT Training at Indiana University Computer Malware.
BlueRedGreenPurpleOrange.
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Zombie or not to be: Trough the meshes of Botnets - Guillaume Lovet AVAR 2005 Tianjin, China.
UT Wing Civil Air Patrol. Objective Identify network and cyber vulnerabilities and mitigations Social Media/Metadata/Exfil data MITM Attacks Malware Social.
AVG- Protecting those who are vulnerable.  Free Anti-Virus Software ◦ J.R. Smith President of AVG oversees a lineup of antivirus products used by 110.
AVG 8.5 Product Line Welcome to a safe world …. | Page 2 Contents  Components Overview  Product Line Overview  AVG 8.0 Boxes.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
INTERNET SAFETY FOR EVERYONE
Internet Security In the 21st Century Presented by Daniel Mills.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Botnets An Introduction Into the World of Botnets Tyler Hudak
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Part 2  Access Control 1 CAPTCHA Part 2  Access Control 2 Turing Test Proposed by Alan Turing in 1950 Human asks questions to another human and a computer,
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
Honeypot and Intrusion Detection System
 Internet Regulation  Some people think that Internet Regulations and Business exchange are the same. That is why many consider this a controversial.
The Internet By Amal Wali 10DD. Contents  What is the Internet? What is the Internet?  Who owns the Internet? Who owns the Internet?  How do you connect.
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Jessica Lavoie CSC 101 November 27, Societal Topics Weeks 7 and 8 Internet Regulation Internet regulation is restricting or controlling access to.
Botnet behavior and detection October RONOG Silviu Sofronie – a Head of Forensics.
Attack Vectors and Mitigations. Attack Vectors ? Network Security2T. A. Yang
Interception and Analysis Framework for Win32 Scripts (not for public release) Tim Hollebeek, Ph.D.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Internet Security and Your Computer Welcome to Boot Camp.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Open Malicious Source Symantec Security Response Kaoru Hayashi.
Name: Peter Thomson Form: 10A.  You must make sure that you include the following in your presentation:  Transitions between slides.  Speaker notes.
Firewalls Fighting Spyware, Viruses, and Malware Ch 5.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
A Quick and Easy Crash Course Internet Safety for Everyone.
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Running Windows Securely and Efficiently By Gary Esworthy.
Microsoft Virtual Academy Talbott Crowell | Chief Architect, ThirdM.com Rob Latino | Program Manager in Office 365 Support, Microsoft.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
INTERNET SAFETY FOR EVERYONE
EN Lecture Notes Spring 2016
Risk of the Internet At Home
Internet Safety for Everyone
Information Security Session October 24, 2005
Internet Worm propagation
Staying safe on the internet
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Presentation transcript:

Web Exploits and the Rise of Cybercriminals Roger Thompson AVG Chief Research Officer

WWW stands for World War Web

Topics How we got here Best solution Future

Ages of Malicious Code Age – 1995 – Dos viruses Age – 2000 – Macro viruses Age – 2002 – Mass mailing worms Age – 2004 – Bots and worms Age ? - Web based attacks

Extinction Level Events Age 1 – Windows 95 released Age 2 – Office 2000 released Age 3 – gateway scanning Age 4 – XP service pack 2 Age 5 – nothing yet

Why web? New name for HTTP is GFBP (Generic Firewall Bypass Protocol) When you start a browser, you start from a trusted place … inside the firewall Instant tunnel

Why? For goodness sake Age 1 – fun Age 2 – fun Age 3 – fun and profit (spam and botnets) Age 4 – fun and profit (spam, botnets, adware, spyware) Age 5 – profit only (they want your money)

Who? For goodness sake Russia China Brazil

How? For goodness sake 40 to 50,000 unique executable samples every day All delivered by about 500 total exploits and social engineering tricks over the web This is whats known as an aptitude test

Exploit? Social engineering? An exploit is code that takes advantage of a vulnerability in some program to force some other code to run. Social engineering is code that takes advantage of a vulnerability in peoples common sense to trick them into running some code. (Well always have Paris)

Attack styles

Damage done

So whats the solution? Option 1 is focus on 50k every day –Make your scanner work really hard –Get your researchers working really hard pulling sigs –Continue to automate your sig pulling –Find generic solutions / HIPS

So whats the solution? Option 2 is focus on 500 total http tricks Multiple layers, oriented at http activity. –Block some ip addresses –Block some URLs –The real solution is … block the 500 http tricks

Life is full of 80/20 rules

So why isnt everyone doing it? Automated community intelligence Internet Neighborhood Watch And, of course, LinkScanner Its not that easy, but theyre all going to try

The future For the next few years, it is the web If there is an ELE, the Bad Guys will find a new way, and our job is to be ready The 10 most important words in the English language are Never, never, never, never, never, never, never, never give up!

Sales & Support Contacts Web Exploits: Sales – M-F 8:30-5:30 ET –Phone: (Option 2) –Fax: – Support – 24x7 –Phone: (Option 1) – –Resellers receive priority technical support!