SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Symantec Website Security Threat Report
12 June 2013
Alistair Johnson, Mike Smart, Andrew Horbury
1
Welcome
The WSTR is a subset of
the annual Symantec ISTR
– To complement this
webinar we have put
together:
• Video
• Infographics
• Podcasts
• And much more…
www.symantec.com/threatreport
2
Agenda
Introduction to report1
Targeted attacks2
Vulnerabilities3
Watering hole attacks4
Malware and the emergence of Ransomware5
3
• 69 million sensors
• 157 countries
• 51,644 recorded vulnerabilities
(spanning two decades)
• 3 billion emails processed each
day
• 1.5 Million websites scanned
Information sources
4
Targeted Attacks
5
Targeted attacks up 42% in 2012
6
Targeted attacks by company size
7
Top 10 Industries attacked in 2012
• Manufacturing
moved to top
position in 2012
• But all industries
are targeted
8
Targeted attack by job function
R&D
27%
Senior
12%
C-Level
17%
Sales
24%
Shared
Mailbox
13%
Recruitment
4%
Media
3% PA
1%
0%
5%
10%
15%
20%
25%
30%
• Attacks may start with the ultimate target but often look for any entry into a
company
9
Spear phishing Watering hole attack
Send target a relevant
email message
Infect the website and then
lie in wait for the target
• Targeted attacks predominately start with as spear phishing attacks
• In 2012 we saw the emergence of Watering hole attacks
http://bit.ly/Elderwood
10
How effective is a watering hole attack?
1 Watering Hole
Attack in 2012
infected
500 companies
All within
24 hours
• Watering Hole attacks target specific groups and sites
• They can capture a large number of victims in a short space of
time
11
Watering Hole attacked targeting iOS Developers
• An example of a Watering Hole
• The attackers were looking for iOS developers
12
Recent Examples of Water Hole Attack
• In 2013 we
predict this type
of attack will
become more
widely used
• In February this
year several
high profile
companies fell
victim to this
type of attack
13
Malware and Vulnerabilities
14
Zero-Day Vulnerabilities
13
15
9
12
14
8
14
0
2
4
6
8
10
12
14
16
2006 2007 2008 2009 2010 2011 2012
Total Volume
15
Zero-Day Vulnerabilities
4
2
3 4
13
15
9
12
14
8
14
0
5
10
15
20
25
2006 2007 2008 2009 2010 2011 2012
Total Volume
Elderwood
Stuxnet
• One group can significantly affect yearly numbers
• The Elderwood gang drove the rise in zero day vulnerabilities
16
All vulnerabilities
4842 4644
5562
4814
6253
4989
5291
0
1000
2000
3000
4000
5000
6000
7000
2006 2007 2008 2009 2010 2011 2012
• No significant rise or fall in discovery of new vulnerabilities in last six years
17
74,000
55,000
43,000
0
10,000
20,000
30,000
40,000
50,000
60,000
70,000
80,000
2010 2011 2012
New unique malicious web domains
Decrease
In new malicious domains
18
Our websites are being used against us
•53% of legitimate websites have unpatched vulnerabilities
•24% have critical vulnerabilities unpatched
•61% of malicious websites are legitimate
19
Our own websites are being used against us
• In 2012 one threat (LizaMoon) infected more than 1 million
websites
• Operating on legitimate webpages it sends users to a fake
antivirus alert site, warning them that their computer may be
infected.
20
21
• 16 Number of criminal gangs involved in this cybercrime
• 5M USD estimated amount extorted from victims in 2012
• 500,000 average number of attacks seen from one threat in 18
day period
22
How Symantec can help (Print Screen)
Symantec technology What it does How it can help
Symantec Extended Validation
SSL Certificates
Encrypts confidential information, such as credit card data,
between the browser and your servers. Also confirms the
identity of the website in the browser address bar.
• Powerful encryption
• Visible security
• Authenticates the website
• Greater customer trust
• Increased conversions.
Web Site Malware Scanning Scans websites for malware infections. Reduces the risk of warnings and blocking by
search engines and the risk of reputation
damage when a site infects its visitors.
Symantec Managed PKI for SSL Lets website managers keep track of all their SSL
certificates from a web-hosted management console.
Reduce the risk of accidental certificate
expiry and credibility-damaging certificate
warnings.
Always-on SSL with Symantec
Secure Site Pro SSL Certificates
Always-on SSL is used by sites such as Google, Facebook
and LinkedIn to protect all the user’s interactions with the
site.
Build trust and encourage user interaction by
making sure that it is all encrypted and
secure.
The Norton™ Secured Seal Shows customers that you value their trust and that your
site is secure because it has been scanned weekly for
malware and vulnerabilities.
The Norton™ Secured Seal is the most
recognised trust mark on the Internet
Symantec Seal-in-Search™ Displays the widely-recognised Norton Secured Seal trust
mark in web search results.
Increase search traffic
Increase customer trust and confidence.
AdVantage Real-time detection, notification, and analysis of
malvertisement incidents through the cloud from
Symantec.
Comprehensive static & dynamic
malvertisement detection technologies
Instant notification of malvertisement activity
23
Stay informed
• Follow us on twitter @nortonsecured @threatintel
• www.symantec.com/threatreport
• go.symantec.com/ssl
• Blogs www.symantec.com/connect/blogs/website-
security-solutions
24
Email: andy_horbury@symantec.com
25
Thank you!
Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or
implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Andrew Horbury Email: andy_horbury@symantec.com
Mike Smart
Alistair Johnson
26

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
IBM Security
 

Was ist angesagt? (20)

Microsoft Security Intelligence Report vol. 21
Microsoft Security Intelligence Report vol. 21Microsoft Security Intelligence Report vol. 21
Microsoft Security Intelligence Report vol. 21
 
Mobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumMobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by Zimperium
 
Proofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat ReportProofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat Report
 
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - ZimperiumDeutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
 
How to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat IntelligenceHow to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat Intelligence
 
A New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionA New Year’s Ransomware Resolution
A New Year’s Ransomware Resolution
 
Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersProtect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and Hackers
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
 
INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013
INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013
INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013
 
David Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer MalwareDavid Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer Malware
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
Zimperium Global Threat Intelligence - Q2 2017
Zimperium Global Threat Intelligence - Q2 2017Zimperium Global Threat Intelligence - Q2 2017
Zimperium Global Threat Intelligence - Q2 2017
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
 
Istr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecIstr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantec
 
Reporte de Seguridad de Cisco 2016
Reporte de Seguridad de Cisco 2016Reporte de Seguridad de Cisco 2016
Reporte de Seguridad de Cisco 2016
 
Risq mark bullen - juniper (11-16-16)
Risq   mark bullen - juniper (11-16-16)Risq   mark bullen - juniper (11-16-16)
Risq mark bullen - juniper (11-16-16)
 
Cyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorCyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial Sector
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 

Ähnlich wie Symantec Website Security Threat Report - Insights

Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report
Mandar Kharkar
 
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_230 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
Gaurav Srivastav
 
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptxWhy-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
dhananjay80
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
Symantec
 

Ähnlich wie Symantec Website Security Threat Report - Insights (20)

The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016
 
Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report
 
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat ReportTECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
 
Cybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber SpiesCybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber Spies
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2
 
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_230 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
 
Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015
 
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptxWhy-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
 
INFOGRAPHIC: Secure Computing as Threats Evolve
INFOGRAPHIC: Secure Computing as Threats EvolveINFOGRAPHIC: Secure Computing as Threats Evolve
INFOGRAPHIC: Secure Computing as Threats Evolve
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five years
 
CyberDen 2020
CyberDen 2020CyberDen 2020
CyberDen 2020
 
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Retail Week: Cloud Security
Retail Week: Cloud SecurityRetail Week: Cloud Security
Retail Week: Cloud Security
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
Scot Secure 2015
Scot Secure 2015Scot Secure 2015
Scot Secure 2015
 
2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report
 
AGC Networks Security Solutions - Cyber-i
AGC Networks Security Solutions - Cyber-iAGC Networks Security Solutions - Cyber-i
AGC Networks Security Solutions - Cyber-i
 
Istr19 en
Istr19 enIstr19 en
Istr19 en
 

Mehr von Symantec Website Security

Mehr von Symantec Website Security (20)

Symantec Code Sign (NAM)
Symantec Code Sign (NAM)Symantec Code Sign (NAM)
Symantec Code Sign (NAM)
 
Symantec Code Signing (SE)
Symantec Code Signing (SE)Symantec Code Signing (SE)
Symantec Code Signing (SE)
 
Сертификаты подписания кода Symantec
Сертификаты подписания кода SymantecСертификаты подписания кода Symantec
Сертификаты подписания кода Symantec
 
Symantec Code Signing (IT)
Symantec Code Signing (IT)Symantec Code Signing (IT)
Symantec Code Signing (IT)
 
Symantec Code Signing (FR)
Symantec Code Signing (FR)Symantec Code Signing (FR)
Symantec Code Signing (FR)
 
Code signing de Symantec (ES)
Code signing de Symantec (ES)Code signing de Symantec (ES)
Code signing de Symantec (ES)
 
Symantec Code Signing (DE)
Symantec Code Signing (DE)Symantec Code Signing (DE)
Symantec Code Signing (DE)
 
Symantec Code Signing (CH)
Symantec Code Signing (CH)Symantec Code Signing (CH)
Symantec Code Signing (CH)
 
Symantec Code Signing (UK)
Symantec Code Signing (UK)Symantec Code Signing (UK)
Symantec Code Signing (UK)
 
Symantec Website Security Threats: March 2014 update.
Symantec Website Security Threats: March 2014 update.Symantec Website Security Threats: March 2014 update.
Symantec Website Security Threats: March 2014 update.
 
Um guia de e-commerce para a aquisição e manutenção de novos clientes da Syma...
Um guia de e-commerce para a aquisição e manutenção de novos clientes da Syma...Um guia de e-commerce para a aquisição e manutenção de novos clientes da Syma...
Um guia de e-commerce para a aquisição e manutenção de novos clientes da Syma...
 
Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...
Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...
Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...
 
Guida per l'e-commerce Symantec - Come acquisire nuovi clienti e conservarli
Guida per l'e-commerce Symantec - Come acquisire nuovi clienti e conservarliGuida per l'e-commerce Symantec - Come acquisire nuovi clienti e conservarli
Guida per l'e-commerce Symantec - Come acquisire nuovi clienti e conservarli
 
Guía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clients
Guía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clientsGuía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clients
Guía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clients
 
Guía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clients
Guía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clientsGuía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clients
Guía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clients
 
Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...
Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...
Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...
 
Leitfaden von Symantec: „Das 1×1 der Kundengewinnung und -bindung im E-Commerce“
Leitfaden von Symantec: „Das 1×1 der Kundengewinnung und -bindung im E-Commerce“Leitfaden von Symantec: „Das 1×1 der Kundengewinnung und -bindung im E-Commerce“
Leitfaden von Symantec: „Das 1×1 der Kundengewinnung und -bindung im E-Commerce“
 
Symantec: The rise of hacktivism and insider threats
Symantec: The rise of hacktivism and insider threatsSymantec: The rise of hacktivism and insider threats
Symantec: The rise of hacktivism and insider threats
 
Symantec Website Security Threats: February 2014 Update.
Symantec Website Security Threats: February 2014 Update.Symantec Website Security Threats: February 2014 Update.
Symantec Website Security Threats: February 2014 Update.
 
Symantec SSL Explained
Symantec SSL ExplainedSymantec SSL Explained
Symantec SSL Explained
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Symantec Website Security Threat Report - Insights

  • 1. Symantec Website Security Threat Report 12 June 2013 Alistair Johnson, Mike Smart, Andrew Horbury 1
  • 2. Welcome The WSTR is a subset of the annual Symantec ISTR – To complement this webinar we have put together: • Video • Infographics • Podcasts • And much more… www.symantec.com/threatreport 2
  • 3. Agenda Introduction to report1 Targeted attacks2 Vulnerabilities3 Watering hole attacks4 Malware and the emergence of Ransomware5 3
  • 4. • 69 million sensors • 157 countries • 51,644 recorded vulnerabilities (spanning two decades) • 3 billion emails processed each day • 1.5 Million websites scanned Information sources 4
  • 6. Targeted attacks up 42% in 2012 6
  • 7. Targeted attacks by company size 7
  • 8. Top 10 Industries attacked in 2012 • Manufacturing moved to top position in 2012 • But all industries are targeted 8
  • 9. Targeted attack by job function R&D 27% Senior 12% C-Level 17% Sales 24% Shared Mailbox 13% Recruitment 4% Media 3% PA 1% 0% 5% 10% 15% 20% 25% 30% • Attacks may start with the ultimate target but often look for any entry into a company 9
  • 10. Spear phishing Watering hole attack Send target a relevant email message Infect the website and then lie in wait for the target • Targeted attacks predominately start with as spear phishing attacks • In 2012 we saw the emergence of Watering hole attacks http://bit.ly/Elderwood 10
  • 11. How effective is a watering hole attack? 1 Watering Hole Attack in 2012 infected 500 companies All within 24 hours • Watering Hole attacks target specific groups and sites • They can capture a large number of victims in a short space of time 11
  • 12. Watering Hole attacked targeting iOS Developers • An example of a Watering Hole • The attackers were looking for iOS developers 12
  • 13. Recent Examples of Water Hole Attack • In 2013 we predict this type of attack will become more widely used • In February this year several high profile companies fell victim to this type of attack 13
  • 16. Zero-Day Vulnerabilities 4 2 3 4 13 15 9 12 14 8 14 0 5 10 15 20 25 2006 2007 2008 2009 2010 2011 2012 Total Volume Elderwood Stuxnet • One group can significantly affect yearly numbers • The Elderwood gang drove the rise in zero day vulnerabilities 16
  • 17. All vulnerabilities 4842 4644 5562 4814 6253 4989 5291 0 1000 2000 3000 4000 5000 6000 7000 2006 2007 2008 2009 2010 2011 2012 • No significant rise or fall in discovery of new vulnerabilities in last six years 17
  • 18. 74,000 55,000 43,000 0 10,000 20,000 30,000 40,000 50,000 60,000 70,000 80,000 2010 2011 2012 New unique malicious web domains Decrease In new malicious domains 18
  • 19. Our websites are being used against us •53% of legitimate websites have unpatched vulnerabilities •24% have critical vulnerabilities unpatched •61% of malicious websites are legitimate 19
  • 20. Our own websites are being used against us • In 2012 one threat (LizaMoon) infected more than 1 million websites • Operating on legitimate webpages it sends users to a fake antivirus alert site, warning them that their computer may be infected. 20
  • 21. 21
  • 22. • 16 Number of criminal gangs involved in this cybercrime • 5M USD estimated amount extorted from victims in 2012 • 500,000 average number of attacks seen from one threat in 18 day period 22
  • 23. How Symantec can help (Print Screen) Symantec technology What it does How it can help Symantec Extended Validation SSL Certificates Encrypts confidential information, such as credit card data, between the browser and your servers. Also confirms the identity of the website in the browser address bar. • Powerful encryption • Visible security • Authenticates the website • Greater customer trust • Increased conversions. Web Site Malware Scanning Scans websites for malware infections. Reduces the risk of warnings and blocking by search engines and the risk of reputation damage when a site infects its visitors. Symantec Managed PKI for SSL Lets website managers keep track of all their SSL certificates from a web-hosted management console. Reduce the risk of accidental certificate expiry and credibility-damaging certificate warnings. Always-on SSL with Symantec Secure Site Pro SSL Certificates Always-on SSL is used by sites such as Google, Facebook and LinkedIn to protect all the user’s interactions with the site. Build trust and encourage user interaction by making sure that it is all encrypted and secure. The Norton™ Secured Seal Shows customers that you value their trust and that your site is secure because it has been scanned weekly for malware and vulnerabilities. The Norton™ Secured Seal is the most recognised trust mark on the Internet Symantec Seal-in-Search™ Displays the widely-recognised Norton Secured Seal trust mark in web search results. Increase search traffic Increase customer trust and confidence. AdVantage Real-time detection, notification, and analysis of malvertisement incidents through the cloud from Symantec. Comprehensive static & dynamic malvertisement detection technologies Instant notification of malvertisement activity 23
  • 24. Stay informed • Follow us on twitter @nortonsecured @threatintel • www.symantec.com/threatreport • go.symantec.com/ssl • Blogs www.symantec.com/connect/blogs/website- security-solutions 24
  • 26. Thank you! Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Andrew Horbury Email: andy_horbury@symantec.com Mike Smart Alistair Johnson 26