SlideShare uma empresa Scribd logo
1 de 83
New York City August 5, 2010
Welcome Randy Drawas Chief Marketing Officer Kaspersky Lab Americas
Kaspersky Lab Fighting Cybercrime for 25 Years Founded in 1997 Headquartered in Moscow,The Russian Federation Trained as cryptographer, Eugene Kaspersky got hit with one of the Internet’s very first viruses in 1986.
Kaspersky Technology Inside The World’s Largest OEM of Anti-Malware Technology (100+ Partners)
Fastest Growth in the Security Industry The world’s largest privately-held anti-malware company 100% focus on Threat Protection & Anti-Malware Protecting 300 million systems worldwide 50,000 new systems added every day! 2,000 experts globally #1 selling software in the U.S. retail This includes MS Office & World of Warcraft
Special Guest Scott Stratten UnMarketing @unmarketing
Today’s Moderator Ryan Naraine Security Evangelist Kaspersky Lab Americas
Agenda The Rise & Rise of Scareware Nico Brulez, Senior Malware Researcher, France
Agenda Behind the Scenes of Identity Theft David Emm, Senior Researcher, United Kingdom
Agenda Social Media & the Automation of Targeted Attacks Stefan Tanase, Senior Anti-Virus Researcher, Romania
Agenda Aurora Who? Roel Schouwenberg, Senior Anti-Virus Researcher, U.S.
The Rise & Rise of Scareware Nicolas Brulez, Senior Malware Researcher Global Research and Analysis Team
History and Evolution of Rogue AV 2006 Desktop hijackers, fake anti-spyware 2007 Fake registry cleaning tools added 2008 Desktop hijackers, Fake anti-virus (rogue anti-virus) 2009 System notifications (popup near the system tray) became standard behavior 2010 Fake anti-virus becomes more advanced  Now includes phone, chat and e-mail support, uninstallers, multi-language support
Infection Vectors Black Hat SEO Spam Fake videos and fake codecs Social Networks Instant Messengers Downloaded and installed by prior malware infections
The number of detected malware: up to 70 Popup Wall paper Hijacking They copy the look and feel from legit Anti Virus products to display behavior detections Task Manager Injection Sounds, Screen blinking Fake Network Intrusion detection Scaring people 101
Real person Ready to answer any question Phone Support 24*7 Support E-mail support in anylanguage Rogue AV Support
Conclusion and Predictions Rogue AV has greatly improved during the past 4 years Professional graphical interface - localized Phone, email and live chat support – 24/7 Advanced scaring techniques Multiple ways to target new “customers” We predict improvements in the support systems to make them appear more legitimate New scaring and spreading techniques will appear in the future
Thank you!  Nico Brulez Global Research and Analysis Team
Behind the Scenes of Identity Theft David Emm Global Research and Analysis Team
Setting the Scene: Cybercrime Cybercrime is a booming business It’s profitable. It’s easy to do. It’s low-risk. Botnets are a core component of the threat landscape. The drop-zone is where they stash the stolen loot. Let’s take a closer look at - Their modus operandi The drop-zone of a banking Trojan
The Zeus Trojan ,[object Object]
aka Zbot, Wsnpoem, Kneber
The most popular banking Trojan in the wild
First appeared at the end of 2006
Thousands of versions available
Full pack with generic version
Cost = $500-$1,000
Full pack + unique exclusive version
Cost = $3,000-$5,000
Many plug-ins and modules available
Licensed separately,[object Object]
Zeus Infections Worldwide
Command & Control Online Command & Control panels provide easy management of cybercriminal bot armies
Command & Control PDF exploits for Adobe Reader top the charts
C&C – Bot Geo Distribution The cybercriminals can easily see where their victims are located & even target specific geo areas!
C&C – Infection Statistics
C&C – Maintenance
Trojan Drop-Zones ,[object Object]
A server configured to receive and store stolen data
This may amount to several GB daily.
Generally, cybercriminals like to take care of their valuables.
So they typically run several drop-zones.,[object Object]
Dump File Analysis
Drop-Zone Logs Logs can be easily read and understood:
Drop-Zone Logs Thousands of credit cards, bank accounts
Intercepting Financial Transactions Cybercriminals can intercept financial transactions on-the-fly and change the receiving account  to their own.
Profitability Evolution – Cybercriminal Group ‘X’ Total: $1.7 million -1000$ Even criminals have bad days 400% growth in 9 months
Conclusions ,[object Object]
Highly profitable
Sophisticated but easy-to-use systems
Drop-zones can be closed, but new ones appear immediately.
There are many victims.
Mitigation is a process.
Modern hardware and software
Patches and updates
Internet security solution
The right security mindset
Education,[object Object]
Social Media & the Automation of Targeted Attacks Stefan Tanase Global Research and Analysis Team
The Evolution of Malware ,[object Object]
2009:  more than 15,000,000
End of 2009:Approximately 34,000,000unique malicious files in the Kaspersky Lab collection,[object Object]
Targeted attacks: threats to SMBs & enterprises
Targeted Attacks - Threats to Businesses
Targeted Attacks vs Classic Malware ,[object Object]
One email is enough, instead of tens of thousands
Targeted organizations are either not awareor don’t publicly disclose information
It is hard to get samples for analysis
Classic signature-based AV is useless
New defense technologies
Much higher stakes
Intellectual property theft, corporate espionage,[object Object]
What’s Socially Acceptable? ,[object Object],[object Object]
Targeted Attacks Becoming Mainstream Targeted ads?  Targeted attacks are already out there. Social networks  Enabling cybercriminals to deliverautomated targeted attacks The personal data is there.  Next step? Automation - Geographical IP location has been around for a while. Automatic language translation services are becoming better. Personal interests & tastes are public (ie: trending topics).
Geo Targeting Example
Language Targeting Example
Interests Targeting Example
Surviving Targeted Attacks ,[object Object]
User education and awareness
Human mind is hard to patch
Proactive protection technologies
Virtualization and sandboxing
Behavioral analysis

Mais conteúdo relacionado

Mais procurados

5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
ReadWrite
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of security
Sejahtera Affif
 

Mais procurados (20)

Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...
Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...
Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...
 
Evolution of ransomware
Evolution of ransomwareEvolution of ransomware
Evolution of ransomware
 
Cyber crime trends in 2013
Cyber crime trends in 2013 Cyber crime trends in 2013
Cyber crime trends in 2013
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
 
Ransomware ly
Ransomware lyRansomware ly
Ransomware ly
 
Balancing Your Internet Cyber-Life with Privacy and Security
Balancing Your Internet Cyber-Life with Privacy and SecurityBalancing Your Internet Cyber-Life with Privacy and Security
Balancing Your Internet Cyber-Life with Privacy and Security
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Malware
MalwareMalware
Malware
 
Historyofviruses
HistoryofvirusesHistoryofviruses
Historyofviruses
 
C3
C3C3
C3
 
Spo1 r31 spo1-r31
Spo1 r31 spo1-r31Spo1 r31 spo1-r31
Spo1 r31 spo1-r31
 
Tt 06-ck
Tt 06-ckTt 06-ck
Tt 06-ck
 
Oh... that's ransomware and... look behind you a three-headed Monkey
Oh... that's ransomware and... look behind you a three-headed MonkeyOh... that's ransomware and... look behind you a three-headed Monkey
Oh... that's ransomware and... look behind you a three-headed Monkey
 
Light, Dark and... a Sunburst... dissection of a very sophisticated attack.
Light, Dark and... a Sunburst... dissection of a very sophisticated attack.Light, Dark and... a Sunburst... dissection of a very sophisticated attack.
Light, Dark and... a Sunburst... dissection of a very sophisticated attack.
 
Software theft
Software theftSoftware theft
Software theft
 
Modern cyber threats_and_how_to_combat_them_panel
Modern cyber threats_and_how_to_combat_them_panelModern cyber threats_and_how_to_combat_them_panel
Modern cyber threats_and_how_to_combat_them_panel
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of security
 

Destaque (7)

IT Security Risks Survey 2014
IT Security Risks Survey 2014IT Security Risks Survey 2014
IT Security Risks Survey 2014
 
Avast Reviews, Antivirus Software
Avast Reviews, Antivirus SoftwareAvast Reviews, Antivirus Software
Avast Reviews, Antivirus Software
 
Kaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01aKaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01a
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
 
2016 kaspersky
2016 kaspersky2016 kaspersky
2016 kaspersky
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
 

Semelhante a Kaspersky North American Virus Analyst Summit

Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64
Chema Alonso
 
Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010
Agora Group
 

Semelhante a Kaspersky North American Virus Analyst Summit (20)

Hacking 10 2010
Hacking 10 2010Hacking 10 2010
Hacking 10 2010
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
 
NetWitness
NetWitnessNetWitness
NetWitness
 
APT in the Financial Sector
APT in the Financial SectorAPT in the Financial Sector
APT in the Financial Sector
 
Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010
 
MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence
 
Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to Infrastructure
 
A comprehensive survey ransomware attacks prevention, monitoring and damage c...
A comprehensive survey ransomware attacks prevention, monitoring and damage c...A comprehensive survey ransomware attacks prevention, monitoring and damage c...
A comprehensive survey ransomware attacks prevention, monitoring and damage c...
 
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
 
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
 
Ransomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxRansomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptx
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day Reality
 
Your money or your files
Your money or your filesYour money or your files
Your money or your files
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 

Kaspersky North American Virus Analyst Summit