SlideShare a Scribd company logo
1 of 18
2013 Security Threat Report
5 Threats to Watch

Richard Wang, SophosLabs
Join us on Twitter

         Live tweeting from
          @Sophos_News

        Send us your thoughts
            #SophosLive
Topics


  Overview           • 2012 in review


  Specific threats   • The year’s most widespread threats


  Predictions        • What 2013 will bring
2012 in review
Plus ça change …




                   More platforms       Faster adoption
                     attacked             of exploits




                                           New
                   Web delivery still
                                        moneymaking
                    rules supreme
                                         schemes
Significant threats of 2012
Java
Blackhole




            Image:NASA
Blackhole v2
Blackhole deliveries
August – September 2012




                          Zbot
                          Ransomware
                          PWS
                          Sinowal
                          FakeAV
                          Backdoor
                          ZeroAccess
                          Downloader
                          Other
Ransomware
75% unique

          Attacks per malware binary
80%
70%
60%
50%
40%
30%
20%
10%
0%
      1    2        3        4         5   >5
Polymorphism

3J-448481K3J-2443N4A4C-8293N4E3N-6464C1K4C-03J4A3P3N-04C1K3L4A
3J-948481K3J-5443N4A4C-4293N4E3N-4464C1K4C-23J4A3P3N-04C1K3L4A
3J-448481K3J-6443N4A4C-8293N4E3N-5464C1K4C-43J4A3P3N-74C1K3L4A


100,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,
000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,
000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,
000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,
000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,
000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,
000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,
000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,
000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,
000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,
000,000,000,000,000,000
Mobile threats
2013

                     “Irreversible”
                         attacks




                                      Better exploit
                                       mitigation
       Premium
       attack kits
Get Your Threat Report




      www.sophos.com/threatreport
Stay ahead of the curve


nakedsecurity.sophos.com
@NakedSecurity
@Sophos_News
www.facebook.com/SophosSecurity

Sophos North America
1-866-866-2802
nasales@sophos.com

UK & Worldwide
+44(0)8447 671131
sales@sophos.com
Questions




17
Did we miss you?


         Tweet us
       @Sophos_News

More Related Content

More from Sophos

2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report PresentationSophos
 
2013 Security Threat Report
2013 Security Threat Report2013 Security Threat Report
2013 Security Threat ReportSophos
 
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionSophos
 
Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Sophos
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't StopSophos
 
When Malware Goes Mobile
When Malware Goes MobileWhen Malware Goes Mobile
When Malware Goes MobileSophos
 
Exposing the Money Behind Malware
Exposing the Money Behind MalwareExposing the Money Behind Malware
Exposing the Money Behind MalwareSophos
 
BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your SchoolSophos
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security BoxSophos
 
Complete Security
Complete SecurityComplete Security
Complete SecuritySophos
 
IT Security DOs und DON’Ts (Italian)
IT Security DOs und DON’Ts (Italian)IT Security DOs und DON’Ts (Italian)
IT Security DOs und DON’Ts (Italian)Sophos
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts Sophos
 

More from Sophos (13)

2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report Presentation
 
2013 Security Threat Report
2013 Security Threat Report2013 Security Threat Report
2013 Security Threat Report
 
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless Protection
 
Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop
 
When Malware Goes Mobile
When Malware Goes MobileWhen Malware Goes Mobile
When Malware Goes Mobile
 
Exposing the Money Behind Malware
Exposing the Money Behind MalwareExposing the Money Behind Malware
Exposing the Money Behind Malware
 
BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your School
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security Box
 
Complete Security
Complete SecurityComplete Security
Complete Security
 
IT Security DOs und DON’Ts (Italian)
IT Security DOs und DON’Ts (Italian)IT Security DOs und DON’Ts (Italian)
IT Security DOs und DON’Ts (Italian)
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 

Recently uploaded

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 

Recently uploaded (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 

2013 Sophos Security Threat Report

Editor's Notes

  1. Our more attentive viewers will be scratching their heads at this point. The title says Java but the image is clearly an installer for Adobe Flash Player. However, as with all things in security it’s not that simple. One story this year pulled together so many of the common security topics that we just have to discuss it. Vulernabilities, patching and of course non-Windows platforms. That story was the Flashback botnet. A network of around 600,000 OS X computers that were infected due to an unpatched version of Java. During the infection the malware claimed to be an update for Adobe Flash player, just to add to the buzzword confusion. There are several good lessons in the story:Firstly – ignoring security patches because you think you’re not a target is just a bad idea. Apple, who were at the time responsible for updating Java on OSX, failed to distribute a security patch for 6 weeks after Windows users were update. This gave the bad guys a nice opportunity to make best use of a know vulnerability which they duly did.Secondly – Adding steps in the update chain causes delays and leave users exposed. Although Oracle have taken Java updating on OS X back from Apple to close this hole we do see the same problem in other areas. Most notably in the mobile space where security patches to Android have to pass through Google, the handset vendor and the mobile network before they get to the end user. We’ll see later that Android can’t afford to lag with security patches either.Thirdly – one of the big lessons to learn from this, particularly with respect to Java is that if you don’t need to have something installed then don’t have it. Java plugins have been a rich target for attackers on both Windows and OS X in the last year and many users are opening themselves up to attack when they don’t even need Java. May seem an odd place to start but a discussion of vulns here (not just Java?) will lead nicely into Blackhole
  2. Blackhole is the most commonly seen exploit kit.Describe kit activity + business model.Overview of v1For the astronomy geeks that’s an artist’s impression of GRO J1655-40, a binary system of a black hole and star.
  3. OK, this is in Russian but there are some interesting points in the release announcement for BHv2.“Are pleased to welcome you to a brand new version of the bundle of exploits. For more than 2 years of existence of our project, the old engine arrival and ligaments badly worn, AV companies have become very quick to recognize that this kind of criteria BlackHole and flag it as malware.”Further down in the announcement are several interesting claims, some of which are summarised below:“prevent direct download of executable payloadsonly load exploit contents when client is considered vulnerabledrop use of PluginDetect library (performance justification)remove some old exploits (leaving Java atomic & byte, PDF LibTIFF, MDAC)change from predictable url structure (filenames and querystring parameter names)”Our own observations of the BH v2 kit have shown that the authors have indeed restricted the exploits they are using to Java vulnerabilities, PDF vulnerabilities and an old IE6 exploit which we can only assume their telemetry tells them is still useful.The query strings they are using to call home to their download servers are much more randomised than before, in an attempt to confuse IDS filters.And they announced the new pricing too:“Rent on our server:-Day rental - $ 50 (limit traffic 50k hits)-Week rental - $ 200 (limit traffic 70k hits a day)-Month rental - $ 500 (limit traffic 70k hits a day)if needed, traffic limit can be raised for the additional feeThe license for your server:-License for 3 months $ 700-The license for six months $ 1,000License for 1 year $ 1500multidomain bundle version - $ 200 one-time fee for the duration of the license (not binding to the domain and the ip)change of the domain on the standard bundle version - $ 20change ip for multidomain bundle version - $ 50a one-time cleaning - $ 50auto-updates for a month - $ 300 (auto-update, as soon as your cryptor is identified)“
  4. So what is BHv2 actually delivering?Research done in August and September shows a variety of payloads being delivered by the kit ….Notable in this is the rise of Ransomware, now a more common payload than FakeAv.
  5. The payload statistics from Blackhole clearly illustrate another of the threat trend we saw in 2012, the rise of ransomware.Ransomware has in fact been around for many years in one form or another. The business model is pretty simple. As the name suggests the malware holds your data for ransom, releasing it only when you pay the bad guys. There are several ways this can be done. The simplest is to lock the user out of their PC until the ransom is paid, this was a common technique in Russian ransomware a few years ago. When trying to log in to their PCs the victims would instead see a message telling them to send a code by text message to a premium rate number. In return they would receive a password to unlock their PC and the criminals would collect the proceeds from the premium rate SMS number. This had some obvious drawback, notable the need to set up premium rate SMS numbers in any country that the criminals wanted to target.The more modern versions of ransomware use a variety of messages to target the victim and tend to use anonymous online payment services for their ransom payments. In some cases the message purports to come from a local law enforcement agency, tailored to the victims location of course (FBI in the US, Scotland Yard in the UK,) fining them for possession of illegal material. As with many other types of threat ransomware has evolved technically as security companies have adapted to counter it. In others the user’s personal files are encrypted and a simple ransom demand is issued. Initially comparatively simple encryption was used to prevent users accessing their files. Enough to keep the average user out but not so secure that it couldn’t be broken. Several security companies produced tools that could reverse the encryption and release the files. In response the malware authors moved to a public-key encryption scheme that cannot be easily broken, leaving the victims to rely on backups to restore their data. The authors must convince the victim that the threat is genuine and therefore to pay the ransom while also making the threat technically sophisticated enough that the victim cannot simply download a free tool to fix their problem.Of course some criminals solve this by removing the social engineering element entirely. They just encrypt the files and demand a ransom.
  6. Of course ransomware isn’t the only threat using technology in an attempt to defeat security software. Blackhole itself and many other threats extensively use polymorphism to hide their code. Like ransomware this isn’t a brand new technique but we are now seeing it in ever increasing numbers, especially in web-based attacks. We can see here the result of research done by SophosLabs studying around 7 million attacks over a 3 month period. It shows how many attacks are launched by each individual version of a threat. Three quarters of binaries are unique to the victim of that particular attack. As we can see the numbers drop away rapidly for 2, 3 or more victim organizations. What this means in practice is that if you encounter malware there’s a 75% chance that no-one else anywhere has seen that exact piece of malware before. In effect a unique attack has been generated just for you. The actual effects of the attack will be exactly the same as those that everyone else sees but the form it takes will be slightly different. This is all done to avoid detection by security software
  7. So what is polymorphism and how does it work.Well, here we have three code snippets from a Blackhole attack. Specifically these are extracted from a malicious PDF that Blackhole generates to attack an Adobe Reader vulnerability. You’ll notice that they are very similar, except for the highlighted digits, which are changed in each version. This is of course a very simple version of polymorphism and is easily defeated by a security scanner but even with this simple trick Blackhole can generate a mind-bogglingly huge number of version of the PDF (specifically that absurdly long number filling the rest of the slide.)<discuss polymorphism, history thereof, advantages of server side, esp for attacks against mobile – asymmetrical resources>
  8. To find out just how at-risk mobile devices are we looked at the feedback data from our security software in the field. SophosLabs measured the Threat Exposure Rate over a three month period. Effectively this is the percentage chance that your device will encounter a malicious threat during the three month period. As you can see, in most regions the threat to PCs (both desktop and laptop) is far greater than that to mobile devices but in some countries like the United States,Australia and Germany the risk to mobile devices has actually drawn level and in some cases surpassed the risk to traditional PCs. These are, of course, richer countries with higher percentages of smartphone use, making them more lucrative targets for attackers.But what are these attacks?...<discuss various mobile attacks>
  9. For the latest news on malware, exploit kits, botnets and many other security topics stay up to date with the Naked Security blog or follow our security experts on Twitter and Facebook.