SlideShare a Scribd company logo
1 of 34
AVG.COM.AU
AVG.CO.NZ




The Endless Wave of Online Threats – Protecting our
Community
Michael McKinnon – Security Advisor, AVG (AU/NZ)




              An Avalanche Technology Group company
Presentation Overview

• Overview of the AVG Community Protection Network

• Details and examples of the latest online threats:
   • Web threats

   • PC threats

   • Mobile threats

   • Printed malware

• Trends & issues




                                                       2
About AVG

• Best known globally for AVG Anti-Virus FREE

• Over 114 million active users, as of May 2012

• Windows based end-point security
   • Consumer market

   • SMB (typically up to 200)

• Mobile security product for the Android™ platform –
  AVG Mobilation

• Other research
   • AVG Digital Diaries – www.avgdigitaldiaries.com/




                                                        3
In our community, who are the most
vulnerable internet users?
Future Generations




                     5
Mature Generations




                     6
AVG Community Protection Network




                                   7
AVG Community Protection Network

• User is asked whether they would like to opt-in during
  the installation process of their AVG product

• Operating since the start of 2011




                                                           8
Web Threats
•   Overview
•   Exploit Toolkits (Blackhole)
•   Second Click Redirect Mechanism




                                      9
Web Threats - Overview




                         10
Blackhole Toolkit – What is it?

• Web based, distribution system for exploits and
  malware; runs on a private or compromised server




                                                     11
Blackhole Toolkit – Targets many platforms

• Allows them to target many platforms, including Mac!




                                                         12
Blackhole Toolkit – Features & Facts

• Interesting features:

   • Geo-IP detection & distribution

   • Built-in anti-virus scanning, re-obfuscation upon detection

• Facts:

   • In Q4 2011, it accounted for 80.2% of all known toolkits being used

   • Exploit toolkits account for 58% of threat activity on malicious websites




                                                                                 13
Second Click Redirection – What is it?
• Scripting technique for distributing malware

• User visits a site, typically with thumbnail images (video content, photos etc.)

• Cookie is set on first click, link goes to intended site

• If visitor returns, on second click, redirected to a fake anti-virus scan page –
  user tricked into installing fake anti-virus software (know as Fake AV)

• Subsequent clicks, link goes back to intended site

• AVG Community Protection Network detected ~8 million pages doing this,
  mostly from ~1700 domains




                                                                                     14
Second Click Redirection – Fake AV Webpage




                                             15
Second Click Redirection – Top 25 Domains




                                            16
Second Click Redirection – Site Owners




                                         17
PC Threats
•   Fake AV – Security Shield, System Fix etc.
•   Ransomware




                                                 18
Fake AV – What is it?

• Our support team has been helping clean up the
  following Fake AVs for customers:

   • Security Shield

   • System Fix

   • XP Antivirus 2012

   • Internet Security 2012

• Let’s have a look at what they can do…




                                                   19
Fake AV – Fake “Blue Screen of Death”




                                        20
Fake AV – Nag screens and pop-ups




                                    21
Ransomware – What is it?

• Has been observed being served up by blackhole
  toolkits

• Unlike Fake AV – this malicious code just locks up your
  computer and demands money!

• Usually pretends to be
  from the Government or
  a law enforcement
  agency




                                                            22
Ransomware – Your PC has been seized!




                                        23
Email Scams – Still prevalent, but declining




                                               24
Spammers are becoming Facebook scammers

• Global spam levels are decreasing

• Scammers are now using Facebook, which provides:

   • Instant access to 900+ million users

   • Built-in word of mouth provides viral spread

   • Default “trust” with Facebook is still high

   • Some people think that Facebook
     *is* the internet

   • Gen-Y using messaging apps more
     than email




                                                     25
Mobile Threats
•   Stolen private encryption keys for developer certificates
•   Premium SMS scams making money in Europe




                                                                26
Mobile Threats – Rogue Apps & Rootkits
• In Q4 2011, AVG reported the emergence of rogue “signed”
  applications available in the Android™ Marketplace

• Signed with stolen/leaked digital certificates

• Permission prompts on Android™ is weak – doesn’t make the user
  think at all

• Risks are mostly around spying and premium SMS

• Google has recently announced they are scanning apps in the
  Marketplace with “Bouncer”




                                                                   27
Printed Malware
•   QR Codes




                  28
Printed Malware – QR Codes




                             29
Printed Malware – QR Codes


•    Just like URL shorteners (like bit.ly for example), QR
     codes don’t reveal anything themselves until you
     use them

•    In Q4 2011, we observed a QR code being used in a
     Russian forum website that linked to a malicious
     mobile app

•    These are something to keep our focus
     on, especially with large, well-known, trusted
     brands starting to use them for marketing




                                                              30
Trends & Issues
•   Motives – data or money?
•   Could better reporting of cybercrime reduce it?




                                                      31
Motives – Data or Money?

• Lots of talk about information theft – protecting
  corporate data

• Our data, at the consumer and SMB space
  indicates, there are much more basic motives at play

• Money making scams:
   • Digital extortion (Fake AV)

   • Other fraud (banking Trojans)

• Clearly, just as there are vendors operating in different
  markets, there are cybercriminals also specialising in
  different markets




                                                              32
Can reporting cybercrime reduce it?

• Verizon DBIR 2011

   • Shows large reduction of data breaches reported

• Enterprises becoming very good at reporting incidents
  when they occur

• Consumers and small businesses still left in the dark
  and MOST low-level crimes continue to go unreported

• High volume of small incidents – what do these add up
  to in terms of lost time/productivity?




                                                          33
Thank You!


            Connect with us to stay up to date with the latest
            news and information about online threats and scams.
            We also provide simple and useful security
            tips, designed to keep our community safe.

            Come and say hello!




avg.com.au                                     facebook.com/avgaunz

avg.co.nz
                                               twitter.com/avgaunz




   Copyright © 2012 AVG (AU/NZ) Pty Ltd, an Avalanche Technology Group company. All rights reserved.
                                                                                                       34

More Related Content

What's hot

Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key FindingsSymantec
 
Study on Zeus Banking Malware
Study on Zeus Banking MalwareStudy on Zeus Banking Malware
Study on Zeus Banking MalwareShaik Anisa
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, LondonJohn Palfreyman
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 
Balancing Your Internet Cyber-Life with Privacy and Security
Balancing Your Internet Cyber-Life with Privacy and SecurityBalancing Your Internet Cyber-Life with Privacy and Security
Balancing Your Internet Cyber-Life with Privacy and Securityevolutionaryit
 
Advert Nov2010
Advert Nov2010Advert Nov2010
Advert Nov2010whiteyspcs
 
Mobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risksMobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risksVladimir Jirasek
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overviewFabio Pietrosanti
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer ConferenceFabio Pietrosanti
 
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...Andris Soroka
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version Brian Pichman
 
RSA Conference 2011 Presentation: BYOC: Securing Untrusted, Employee-Owned De...
RSA Conference 2011 Presentation: BYOC: Securing Untrusted, Employee-Owned De...RSA Conference 2011 Presentation: BYOC: Securing Untrusted, Employee-Owned De...
RSA Conference 2011 Presentation: BYOC: Securing Untrusted, Employee-Owned De...John Whaley
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bankshreemala1
 
Considerazioni su ITC Security e sui Cyber Attacks
Considerazioni su ITC Security e sui Cyber Attacks Considerazioni su ITC Security e sui Cyber Attacks
Considerazioni su ITC Security e sui Cyber Attacks seeweb
 
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesTyler Shields
 

What's hot (20)

Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings
 
Study on Zeus Banking Malware
Study on Zeus Banking MalwareStudy on Zeus Banking Malware
Study on Zeus Banking Malware
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 
BYOD and Your Business
BYOD and Your BusinessBYOD and Your Business
BYOD and Your Business
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Balancing Your Internet Cyber-Life with Privacy and Security
Balancing Your Internet Cyber-Life with Privacy and SecurityBalancing Your Internet Cyber-Life with Privacy and Security
Balancing Your Internet Cyber-Life with Privacy and Security
 
Advert Nov2010
Advert Nov2010Advert Nov2010
Advert Nov2010
 
Mobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risksMobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risks
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
RSA Conference 2011 Presentation: BYOC: Securing Untrusted, Employee-Owned De...
RSA Conference 2011 Presentation: BYOC: Securing Untrusted, Employee-Owned De...RSA Conference 2011 Presentation: BYOC: Securing Untrusted, Employee-Owned De...
RSA Conference 2011 Presentation: BYOC: Securing Untrusted, Employee-Owned De...
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank
 
Cyber Security Conference 2017
Cyber Security Conference 2017Cyber Security Conference 2017
Cyber Security Conference 2017
 
News Bytes - May 2015
News Bytes - May 2015News Bytes - May 2015
News Bytes - May 2015
 
Considerazioni su ITC Security e sui Cyber Attacks
Considerazioni su ITC Security e sui Cyber Attacks Considerazioni su ITC Security e sui Cyber Attacks
Considerazioni su ITC Security e sui Cyber Attacks
 
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the Berries
 
Cybersecurity Concerns You Should be Thinking About
Cybersecurity Concerns You Should be Thinking AboutCybersecurity Concerns You Should be Thinking About
Cybersecurity Concerns You Should be Thinking About
 

Viewers also liked (7)

New Threats to Data Security
New Threats to Data SecurityNew Threats to Data Security
New Threats to Data Security
 
Threats to online security and data
Threats to online security and dataThreats to online security and data
Threats to online security and data
 
Cybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurityCybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurity
 
Online Security
Online SecurityOnline Security
Online Security
 
Information Security Challenges & Opportunities
Information Security Challenges & OpportunitiesInformation Security Challenges & Opportunities
Information Security Challenges & Opportunities
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Similar to The Endless Wave of Online Threats - Protecting our Community

NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017chauhananand17
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five yearsSABBY GILL
 
E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...
E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...
E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...Lumension
 
Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Agora Group
 
Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009Lumension
 
PoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryPoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryInvincea, Inc.
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentationJamesDempsey1
 
The ever increasing threat of cyber crime
The ever increasing threat of cyber crimeThe ever increasing threat of cyber crime
The ever increasing threat of cyber crimeNathan Desfontaines
 
Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022PECB
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTjonspav
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptxRishabhDwivedi70
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Wen-Pai Lu
 
2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling finalMARIUS EUGEN OPRAN
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...Eoin Keary
 
Kaseya Connect 2012 – A Kaspersky Researcher Perspective
Kaseya Connect 2012 – A Kaspersky Researcher PerspectiveKaseya Connect 2012 – A Kaspersky Researcher Perspective
Kaseya Connect 2012 – A Kaspersky Researcher PerspectiveKaseya
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 

Similar to The Endless Wave of Online Threats - Protecting our Community (20)

NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five years
 
E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...
E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...
E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...
 
Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010
 
Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009
 
Mobile Apps Security
Mobile Apps SecurityMobile Apps Security
Mobile Apps Security
 
PoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryPoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail Industry
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 
KPMG-converted.pptx
KPMG-converted.pptxKPMG-converted.pptx
KPMG-converted.pptx
 
The ever increasing threat of cyber crime
The ever increasing threat of cyber crimeThe ever increasing threat of cyber crime
The ever increasing threat of cyber crime
 
Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022
 
News Bytes - December 2015
News Bytes - December 2015News Bytes - December 2015
News Bytes - December 2015
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2
 
2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final
 
Apresentação Allen ES
Apresentação Allen ESApresentação Allen ES
Apresentação Allen ES
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...
 
Kaseya Connect 2012 – A Kaspersky Researcher Perspective
Kaseya Connect 2012 – A Kaspersky Researcher PerspectiveKaseya Connect 2012 – A Kaspersky Researcher Perspective
Kaseya Connect 2012 – A Kaspersky Researcher Perspective
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 

More from AVG Technologies AU

How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!AVG Technologies AU
 
How To Be Facebook Friends With The Boss & Keep Your Job
How To Be Facebook Friends With The Boss & Keep Your JobHow To Be Facebook Friends With The Boss & Keep Your Job
How To Be Facebook Friends With The Boss & Keep Your JobAVG Technologies AU
 
Keeping hackers out of your POS!
Keeping hackers out of your POS!Keeping hackers out of your POS!
Keeping hackers out of your POS!AVG Technologies AU
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile SecurityAVG Technologies AU
 
AVG Community Powered Threat Report: Q1 2012
AVG Community Powered Threat Report: Q1 2012AVG Community Powered Threat Report: Q1 2012
AVG Community Powered Threat Report: Q1 2012AVG Technologies AU
 
eSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeeSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeAVG Technologies AU
 

More from AVG Technologies AU (8)

How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!
 
AVG Threat Report Q4 2012
AVG Threat Report Q4 2012AVG Threat Report Q4 2012
AVG Threat Report Q4 2012
 
AVG Q3 2012 Threat Report
AVG Q3 2012 Threat ReportAVG Q3 2012 Threat Report
AVG Q3 2012 Threat Report
 
How To Be Facebook Friends With The Boss & Keep Your Job
How To Be Facebook Friends With The Boss & Keep Your JobHow To Be Facebook Friends With The Boss & Keep Your Job
How To Be Facebook Friends With The Boss & Keep Your Job
 
Keeping hackers out of your POS!
Keeping hackers out of your POS!Keeping hackers out of your POS!
Keeping hackers out of your POS!
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile Security
 
AVG Community Powered Threat Report: Q1 2012
AVG Community Powered Threat Report: Q1 2012AVG Community Powered Threat Report: Q1 2012
AVG Community Powered Threat Report: Q1 2012
 
eSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeeSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers Safe
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

The Endless Wave of Online Threats - Protecting our Community

  • 1. AVG.COM.AU AVG.CO.NZ The Endless Wave of Online Threats – Protecting our Community Michael McKinnon – Security Advisor, AVG (AU/NZ) An Avalanche Technology Group company
  • 2. Presentation Overview • Overview of the AVG Community Protection Network • Details and examples of the latest online threats: • Web threats • PC threats • Mobile threats • Printed malware • Trends & issues 2
  • 3. About AVG • Best known globally for AVG Anti-Virus FREE • Over 114 million active users, as of May 2012 • Windows based end-point security • Consumer market • SMB (typically up to 200) • Mobile security product for the Android™ platform – AVG Mobilation • Other research • AVG Digital Diaries – www.avgdigitaldiaries.com/ 3
  • 4. In our community, who are the most vulnerable internet users?
  • 8. AVG Community Protection Network • User is asked whether they would like to opt-in during the installation process of their AVG product • Operating since the start of 2011 8
  • 9. Web Threats • Overview • Exploit Toolkits (Blackhole) • Second Click Redirect Mechanism 9
  • 10. Web Threats - Overview 10
  • 11. Blackhole Toolkit – What is it? • Web based, distribution system for exploits and malware; runs on a private or compromised server 11
  • 12. Blackhole Toolkit – Targets many platforms • Allows them to target many platforms, including Mac! 12
  • 13. Blackhole Toolkit – Features & Facts • Interesting features: • Geo-IP detection & distribution • Built-in anti-virus scanning, re-obfuscation upon detection • Facts: • In Q4 2011, it accounted for 80.2% of all known toolkits being used • Exploit toolkits account for 58% of threat activity on malicious websites 13
  • 14. Second Click Redirection – What is it? • Scripting technique for distributing malware • User visits a site, typically with thumbnail images (video content, photos etc.) • Cookie is set on first click, link goes to intended site • If visitor returns, on second click, redirected to a fake anti-virus scan page – user tricked into installing fake anti-virus software (know as Fake AV) • Subsequent clicks, link goes back to intended site • AVG Community Protection Network detected ~8 million pages doing this, mostly from ~1700 domains 14
  • 15. Second Click Redirection – Fake AV Webpage 15
  • 16. Second Click Redirection – Top 25 Domains 16
  • 17. Second Click Redirection – Site Owners 17
  • 18. PC Threats • Fake AV – Security Shield, System Fix etc. • Ransomware 18
  • 19. Fake AV – What is it? • Our support team has been helping clean up the following Fake AVs for customers: • Security Shield • System Fix • XP Antivirus 2012 • Internet Security 2012 • Let’s have a look at what they can do… 19
  • 20. Fake AV – Fake “Blue Screen of Death” 20
  • 21. Fake AV – Nag screens and pop-ups 21
  • 22. Ransomware – What is it? • Has been observed being served up by blackhole toolkits • Unlike Fake AV – this malicious code just locks up your computer and demands money! • Usually pretends to be from the Government or a law enforcement agency 22
  • 23. Ransomware – Your PC has been seized! 23
  • 24. Email Scams – Still prevalent, but declining 24
  • 25. Spammers are becoming Facebook scammers • Global spam levels are decreasing • Scammers are now using Facebook, which provides: • Instant access to 900+ million users • Built-in word of mouth provides viral spread • Default “trust” with Facebook is still high • Some people think that Facebook *is* the internet • Gen-Y using messaging apps more than email 25
  • 26. Mobile Threats • Stolen private encryption keys for developer certificates • Premium SMS scams making money in Europe 26
  • 27. Mobile Threats – Rogue Apps & Rootkits • In Q4 2011, AVG reported the emergence of rogue “signed” applications available in the Android™ Marketplace • Signed with stolen/leaked digital certificates • Permission prompts on Android™ is weak – doesn’t make the user think at all • Risks are mostly around spying and premium SMS • Google has recently announced they are scanning apps in the Marketplace with “Bouncer” 27
  • 28. Printed Malware • QR Codes 28
  • 29. Printed Malware – QR Codes 29
  • 30. Printed Malware – QR Codes • Just like URL shorteners (like bit.ly for example), QR codes don’t reveal anything themselves until you use them • In Q4 2011, we observed a QR code being used in a Russian forum website that linked to a malicious mobile app • These are something to keep our focus on, especially with large, well-known, trusted brands starting to use them for marketing 30
  • 31. Trends & Issues • Motives – data or money? • Could better reporting of cybercrime reduce it? 31
  • 32. Motives – Data or Money? • Lots of talk about information theft – protecting corporate data • Our data, at the consumer and SMB space indicates, there are much more basic motives at play • Money making scams: • Digital extortion (Fake AV) • Other fraud (banking Trojans) • Clearly, just as there are vendors operating in different markets, there are cybercriminals also specialising in different markets 32
  • 33. Can reporting cybercrime reduce it? • Verizon DBIR 2011 • Shows large reduction of data breaches reported • Enterprises becoming very good at reporting incidents when they occur • Consumers and small businesses still left in the dark and MOST low-level crimes continue to go unreported • High volume of small incidents – what do these add up to in terms of lost time/productivity? 33
  • 34. Thank You! Connect with us to stay up to date with the latest news and information about online threats and scams. We also provide simple and useful security tips, designed to keep our community safe. Come and say hello! avg.com.au facebook.com/avgaunz avg.co.nz twitter.com/avgaunz Copyright © 2012 AVG (AU/NZ) Pty Ltd, an Avalanche Technology Group company. All rights reserved. 34