SlideShare a Scribd company logo
1 of 6
Download to read offline
white paper




        Malware Security
        report: protecting your
        BuSineSS, cuStoMerS,
        and the BottoM line
white paper




contentS
1	 Malware	is	crawling	onto	web	sites	everywhere

1	 what	is	Malware?	

2	 the	anatoMy	of	Malware	attacks

3	 the	Malware	business	Model	

4	 conclusion

4	 about	verisign
white paper


    Malware Security report:
    protecting your BuSineSS,
    cuStoMerS, and the BottoM line
    Malware is crawling onto                                        as email filtering made it more difficult for attackers to
    web sites everywhere                                            distribute their programs through email spam. Additionally,
    This white paper will help you understand the threat from       as firewalls have become more prevalent in the workplace
    malware and how it can impact your online business. You’ll      and at home, malware can no longer easily spread from
    learn about criminals’ motivations for distributing malware     system to system over a network. Through the web, there are
    through the web and how they infect web servers to make         opportunities for hackers to penetrate your company’s web
    distribution possible. This paper also highlights techniques    site and use it as a host to spread malware to your customers.
    administrators can use to detect when and how attackers
                                                                    Malware code is not easily detectable and may infect
    have compromised their web server.
                                                                    consumers’ computers when they simply browse your web
    Other critical malware discussion points include:               site. This is known as “drive-by” malware, and users are
                                                                    largely (or completely) unaware that their systems have
       How attackers distribute malware through
      ƒƒ                                                            become compromised with this type of attack—making it a
        web browsers rather than traditional techniques,            particularly insidious problem. Hackers use drive-by malware
        such as infected email attachments.
                                                                    to spread viruses, hijack computers, or steal sensitive data,
       What the profit motivations are for modern criminals
      ƒƒ                                                            such as credit card numbers or other personal information.
        to infect end-user systems.
       How malware is distributed by infecting legitimate
      ƒƒ                                                            _________________________________________________________
        web sites.
                                                                    how drive-by malware works,
       What tools have been developed to infect as many
      ƒƒ                                                            and are small web sites at risk?
        pages as possible
                                                                    Drive-by malware downloads itself onto a user’s system
       How cybercriminals have developed attack techniques
      ƒƒ                                                            without their consent. Cybercriminals exploit browser and/
        that allow malware to infect thousands of web sites         or plug—in vulnerabilities to deliver the malware by hiding
        at once by exploiting web site vulnerabilities.             it within a web page as an invisible element (e.g., an iframe
                                                                    or obfuscated javascript) or by embedding it in an image
       How attackers distribute their code through malicious
      ƒƒ
                                                                    (e.g., a flash or PDF file) that can be unknowingly delivered
        advertisements to infect the most-popular, often            from the web site to the visitor’s system.
        well-secured, web sites.
                                                                    Any web site is at risk. Small sites can be more vulnerable
                                                                    because they are less likely to have the resources and
                                                                    expertise needed to detect and rapidly respond to attacks.
    what is Malware?                                                Malware may infect your customers’ computers when
                                                                    they simply browse your site. Targeting web sites with
    Malware is a general term for malicious software, and it is a   low traffic allows hackers to avoid detection longer
    growing problem on the Internet. Hackers install malware        and cause more damage.
    by exploiting security weaknesses on your web server to gain    _________________________________________________________
    access to your web site. Malware includes everything from
    adware, which displays unwanted pop-up advertisements, to
    Trojan horses, which can help criminals steal confidential
    information, like online banking credentials.

    Malware is increasingly distributed through web browsers.
    This tactic has become more common in recent years,




1
white paper



    the anatoMy of Malware attacks                                       _________________________________________________________
    To infect a computer through a web browser, an attacker              common types of malware
    must accomplish two tasks. First, they must find a way to            delivery mechanisms:
    connect with the victim. Next, the attacker must install
                                                                         • software updates: Malware posts invitations inside
    malware on the victim’s computer. Both of these steps                  social media sites, inviting users to view a video.
    can occur quickly and without the victim’s knowledge,                  The link tries to trick users into believing they need
    depending on the attacker’s tactics.                                   to update their current software to view the video.
                                                                           The software offered is malicious.
    One way for an attacker to make a victim’s browser execute
                                                                         • banner ads: Sometimes called “malvertising,”
    their malicious code is to simply ask the victim to visit a web
                                                                           unsuspecting users click on a banner ad that then
    site that is infected with malware. Of course, most victims            attempts to install malicious code on the user’s
    will not visit a site if told it is infected, so the attacker must     computer. Alternatively, the ad directs users to a
    mask the nefarious intent of the web site. Sophisticated               web site that instructs them to download a PDF with
    attackers use the latest delivery mechanisms, and often send           heavily-obscured malicious code, or they are instructed
                                                                           to divulge payment details to download a PDF properly.
    malware-infected messages over social networks, such as
    Facebook, or through instant messaging systems. While these          • Downloadable documents: Users are enticed into
    methods have proved successful to a degree, they still rely on         opening a recognizable program, such as Microsoft
    tempting a user to visit a particular web site.                        Word or Excel, that contains a preinstalled Trojan horse.

                                                                         • Man-in-the-middle: Users may think they are
    Other attackers choose to target web sites that potential              communicating with a web site they trust. In reality,
    victims will visit on their own. To do this, an attacker               a cybercriminal is collecting the data users share with
    compromises the targeted web site and inserts a small piece            the site, such as login and password. Or, a criminal can
    of HTML code that links back to their server. This code                hijack a session, and keep it open after users think it
    can be loaded from any location, including a completely                has been closed. The criminal can then conduct their
                                                                           malicious transactions. If the user was banking, the
    different web site. Each time a user visits a web site
                                                                           criminal can transfer funds. If the user was shopping,
    compromised in this manner, the attacker’s code has                    a criminal can access and steal the credit card number
    the chance to infect their system with malware.                        used in the transaction.

                                                                         • keyloggers: Users are tricked into downloading
                                                                           keylogger software using any of the techniques
                                                                           mentioned above. The keylogger then monitors
                                                                           specific actions, such as mouse operations or keyboard
                                                                           strokes, and takes screenshots in order to capture
                                                                           personal banking or credit card information.
                                                                         _________________________________________________________




2
white paper



    the Malware business MoDel                                      verisign continues its leaDership
                                                                    in online security
    How do attackers use malware to turn a profit? They can use
    infected computers to generate income in many ways. One of      VeriSign was the first-to-market with a commercial SSL
    the simplest is through advertising. Just as many of the web    solution in the mid-1990’s. It is the leading provider of
    sites generate income by displaying ads, malware can display    SSL Certificates, and VeriSign is the most recognized
    ads that result in payments to the cybercriminal.               Internet security brand in the world today. Cultivated
                                                                    over many years, this reputation has been developed with
    Alternatively, extortion is used. A large network of infected   both consumers and online businesses through industry
    computers can be very powerful, and some attackers use this     leadership and the application of state-of-the-art
    threat to extract payments from web site owners. A group of     technology into its leading SSL solutions.
    computers controlled by one attacker, known as a “botnet,”
    can send a large amount of network traffic to a single web
    site, which can result in a denial of service (DoS) attack.
    The criminals then contact the web site owner and demand
    a payment to stop the attack.

    Criminals also frequently use infected computers to gather      In addition to the peace-of-mind that comes with selecting
    valuable user information, such as credentials for online       a proven SSL Certificate, VeriSign has continued to address
    banking. This type of malware, known as an infostealer          its customers’ needs by constantly augmenting its SSL
    or banking Trojan, is one of the most sophisticated and         offerings with support for new standards and integration
    stealthy forms of malware. The criminals can then use the       with complementary technologies and solutions. VeriSign
    private information for their own malicious schemes or sell     continues this heritage by providing daily web site malware
    it to a third-party who then uses it to make a profit.          scanning with its SSL solutions to ensure that your web
                                                                    site, your valuable brand, and your customers’ confidential
    _________________________________________________________       information are protected from an ever-changing Internet
    what is blacklisting, and why is it                             threat environment.
    important to avoid?
    Because of the potential damage caused by malware,
    Google, Yahoo, Bing and other search engines place
    any web site found with malware on a blocked list,
    or “blacklist.” Once blacklisted, the search engine
    issues a warning to potential visitors that the site is
    unsafe or excludes it from search results altogether.
    No matter how much search engine optimization you
    do, if your web site is blacklisted the impact to your
    business could be devastating. This blacklisting can
    occur without warning, is often done without your
    knowledge, and is very difficult to reverse. Taking the
    proper measures to prevent search engine blacklisting
    is critical to the long-term success of any web site.
    _________________________________________________________




3
white paper



    conclusion
    Online sales and services have experienced tremendous
    growth over the past decade. However, the increasing use
    of the Internet in everyday life has also brought a rise in
    nefarious activity. Malware is becoming more pervasive and
    jeopardizes the growth of e-commerce by fostering fears of
    compromised personal information. This leads to trepidation
    and sub-optimal results for online businesses. There needs
    to be an effective means to combat the use of malware if
    e-commerce is to reach its full potential.

    VeriSign provides a comprehensive trust solution for
    your online business success by combining premium SSL
    Certificates with innovative functionality to ensure that
    your public-facing web sites are regularly monitored for
    malware. Combined with the VeriSign seal, the world’s
    #1 trust mark, VeriSign helps you give your customers
    peace of mind when they interact with you online. If
    you want to ensure that consumers view your web site
    as a trusted place to conduct e-commerce, VeriSign SSL
    Certificates are the right choice.


    about verisign
    VeriSign is the trusted provider of Internet infrastructure
    services for the digital world. Billions of times each
    day, companies and consumers rely on our Internet
    infrastructure to communicate and conduct commerce
    with confidence.

    visit	us	at	www.veris	gn.com	for	more	information.	
                         i
                         	




    ©2010 VeriSign, Inc. All rights reserved. VeriSign, the VeriSign logo, the Checkmark Circle logo, and other trademarks, service marks, and designs are registered or
    unregistered trademarks of VeriSign, Inc., and its subsidiaries in the United States and foreign countries. All other trademarks are property of their respective owners.

4   00028754 06-23-2010

More Related Content

More from BillStankiewicz

Hwc logistics ad january 31, 2013
Hwc logistics ad january 31, 2013Hwc logistics ad january 31, 2013
Hwc logistics ad january 31, 2013BillStankiewicz
 
Dubai Seven Star Hotel From Bill Stankiewicz
Dubai Seven Star Hotel From Bill StankiewiczDubai Seven Star Hotel From Bill Stankiewicz
Dubai Seven Star Hotel From Bill StankiewiczBillStankiewicz
 
Bill Stankiewicz Copy Of Facebook 2012 Beyond Hype
Bill Stankiewicz Copy Of  Facebook 2012 Beyond HypeBill Stankiewicz Copy Of  Facebook 2012 Beyond Hype
Bill Stankiewicz Copy Of Facebook 2012 Beyond HypeBillStankiewicz
 
Bill Stankiewicz Copy American Shipper Report 20012 Web
Bill Stankiewicz Copy American Shipper  Report 20012 WebBill Stankiewicz Copy American Shipper  Report 20012 Web
Bill Stankiewicz Copy American Shipper Report 20012 WebBillStankiewicz
 
Bill Stankiewicz Copy William Gates U Ti
Bill Stankiewicz Copy William Gates U TiBill Stankiewicz Copy William Gates U Ti
Bill Stankiewicz Copy William Gates U TiBillStankiewicz
 
Bill Stankiewicz Copy State Of Logistics Study For Web 3 Pl
Bill Stankiewicz Copy  State Of Logistics Study For Web 3 PlBill Stankiewicz Copy  State Of Logistics Study For Web 3 Pl
Bill Stankiewicz Copy State Of Logistics Study For Web 3 PlBillStankiewicz
 
Bill Stankiewicz Copy Adrian Gonzalez, Arc V2
Bill Stankiewicz Copy Adrian Gonzalez, Arc  V2Bill Stankiewicz Copy Adrian Gonzalez, Arc  V2
Bill Stankiewicz Copy Adrian Gonzalez, Arc V2BillStankiewicz
 
Bill Stankiewicz Copy Greg Smith Oracle For Web
Bill Stankiewicz Copy Greg Smith Oracle For WebBill Stankiewicz Copy Greg Smith Oracle For Web
Bill Stankiewicz Copy Greg Smith Oracle For WebBillStankiewicz
 
Bill Stankiewicz Copy Of Sid Brown Nfi
Bill Stankiewicz Copy Of Sid Brown NfiBill Stankiewicz Copy Of Sid Brown Nfi
Bill Stankiewicz Copy Of Sid Brown NfiBillStankiewicz
 
Bill Stankiewicz Copy Keith Bradley Ingram Micro
Bill Stankiewicz Copy Keith Bradley Ingram MicroBill Stankiewicz Copy Keith Bradley Ingram Micro
Bill Stankiewicz Copy Keith Bradley Ingram MicroBillStankiewicz
 
Bill Stankiiewicz Copy 4 2011 Social Media Report
Bill Stankiiewicz Copy 4 2011 Social Media ReportBill Stankiiewicz Copy 4 2011 Social Media Report
Bill Stankiiewicz Copy 4 2011 Social Media ReportBillStankiewicz
 
Bill Stankiewicz Copy Jan. 2011 Uncertainty Is Certain
Bill Stankiewicz Copy Jan. 2011 Uncertainty Is CertainBill Stankiewicz Copy Jan. 2011 Uncertainty Is Certain
Bill Stankiewicz Copy Jan. 2011 Uncertainty Is CertainBillStankiewicz
 
2 5 2011 Mobile In Retail
2 5 2011 Mobile In Retail2 5 2011 Mobile In Retail
2 5 2011 Mobile In RetailBillStankiewicz
 
2 5 2011 Global Powers Of Retailing
2 5 2011 Global Powers Of Retailing2 5 2011 Global Powers Of Retailing
2 5 2011 Global Powers Of RetailingBillStankiewicz
 
2 5 2011 Exel And Dhl Seek Greater Flexibility
2 5 2011 Exel And Dhl Seek Greater Flexibility2 5 2011 Exel And Dhl Seek Greater Flexibility
2 5 2011 Exel And Dhl Seek Greater FlexibilityBillStankiewicz
 
2 5 2011 Bill Stankiewicz Copy Sustainability Trends European Retail
2 5 2011 Bill Stankiewicz Copy Sustainability Trends European Retail2 5 2011 Bill Stankiewicz Copy Sustainability Trends European Retail
2 5 2011 Bill Stankiewicz Copy Sustainability Trends European RetailBillStankiewicz
 
2 5 2011 Bill Stankiewicz Copy Of Traceability
2 5 2011 Bill Stankiewicz Copy Of Traceability2 5 2011 Bill Stankiewicz Copy Of Traceability
2 5 2011 Bill Stankiewicz Copy Of TraceabilityBillStankiewicz
 

More from BillStankiewicz (20)

Hwc logistics ad january 31, 2013
Hwc logistics ad january 31, 2013Hwc logistics ad january 31, 2013
Hwc logistics ad january 31, 2013
 
Dubai Seven Star Hotel From Bill Stankiewicz
Dubai Seven Star Hotel From Bill StankiewiczDubai Seven Star Hotel From Bill Stankiewicz
Dubai Seven Star Hotel From Bill Stankiewicz
 
Bill Stankiewicz Copy Of Facebook 2012 Beyond Hype
Bill Stankiewicz Copy Of  Facebook 2012 Beyond HypeBill Stankiewicz Copy Of  Facebook 2012 Beyond Hype
Bill Stankiewicz Copy Of Facebook 2012 Beyond Hype
 
Bill Stankiewicz Copy American Shipper Report 20012 Web
Bill Stankiewicz Copy American Shipper  Report 20012 WebBill Stankiewicz Copy American Shipper  Report 20012 Web
Bill Stankiewicz Copy American Shipper Report 20012 Web
 
Clg Overview
Clg OverviewClg Overview
Clg Overview
 
Bill Stankiewicz Copy William Gates U Ti
Bill Stankiewicz Copy William Gates U TiBill Stankiewicz Copy William Gates U Ti
Bill Stankiewicz Copy William Gates U Ti
 
Bill Stankiewicz Copy State Of Logistics Study For Web 3 Pl
Bill Stankiewicz Copy  State Of Logistics Study For Web 3 PlBill Stankiewicz Copy  State Of Logistics Study For Web 3 Pl
Bill Stankiewicz Copy State Of Logistics Study For Web 3 Pl
 
Bill Stankiewicz Copy Adrian Gonzalez, Arc V2
Bill Stankiewicz Copy Adrian Gonzalez, Arc  V2Bill Stankiewicz Copy Adrian Gonzalez, Arc  V2
Bill Stankiewicz Copy Adrian Gonzalez, Arc V2
 
Bill Stankiewicz Copy Greg Smith Oracle For Web
Bill Stankiewicz Copy Greg Smith Oracle For WebBill Stankiewicz Copy Greg Smith Oracle For Web
Bill Stankiewicz Copy Greg Smith Oracle For Web
 
Bill Stankiewicz Copy Of Sid Brown Nfi
Bill Stankiewicz Copy Of Sid Brown NfiBill Stankiewicz Copy Of Sid Brown Nfi
Bill Stankiewicz Copy Of Sid Brown Nfi
 
Bill Stankiewicz Copy Keith Bradley Ingram Micro
Bill Stankiewicz Copy Keith Bradley Ingram MicroBill Stankiewicz Copy Keith Bradley Ingram Micro
Bill Stankiewicz Copy Keith Bradley Ingram Micro
 
Bill Stankiiewicz Copy 4 2011 Social Media Report
Bill Stankiiewicz Copy 4 2011 Social Media ReportBill Stankiiewicz Copy 4 2011 Social Media Report
Bill Stankiiewicz Copy 4 2011 Social Media Report
 
The Spirit April 2011
The Spirit April 2011The Spirit April 2011
The Spirit April 2011
 
March2011,Breeze
March2011,BreezeMarch2011,Breeze
March2011,Breeze
 
Bill Stankiewicz Copy Jan. 2011 Uncertainty Is Certain
Bill Stankiewicz Copy Jan. 2011 Uncertainty Is CertainBill Stankiewicz Copy Jan. 2011 Uncertainty Is Certain
Bill Stankiewicz Copy Jan. 2011 Uncertainty Is Certain
 
2 5 2011 Mobile In Retail
2 5 2011 Mobile In Retail2 5 2011 Mobile In Retail
2 5 2011 Mobile In Retail
 
2 5 2011 Global Powers Of Retailing
2 5 2011 Global Powers Of Retailing2 5 2011 Global Powers Of Retailing
2 5 2011 Global Powers Of Retailing
 
2 5 2011 Exel And Dhl Seek Greater Flexibility
2 5 2011 Exel And Dhl Seek Greater Flexibility2 5 2011 Exel And Dhl Seek Greater Flexibility
2 5 2011 Exel And Dhl Seek Greater Flexibility
 
2 5 2011 Bill Stankiewicz Copy Sustainability Trends European Retail
2 5 2011 Bill Stankiewicz Copy Sustainability Trends European Retail2 5 2011 Bill Stankiewicz Copy Sustainability Trends European Retail
2 5 2011 Bill Stankiewicz Copy Sustainability Trends European Retail
 
2 5 2011 Bill Stankiewicz Copy Of Traceability
2 5 2011 Bill Stankiewicz Copy Of Traceability2 5 2011 Bill Stankiewicz Copy Of Traceability
2 5 2011 Bill Stankiewicz Copy Of Traceability
 

Recently uploaded

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Recently uploaded (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Bill Stankiewicz June Copy Malware Security Report

  • 1. white paper Malware Security report: protecting your BuSineSS, cuStoMerS, and the BottoM line
  • 2. white paper contentS 1 Malware is crawling onto web sites everywhere 1 what is Malware? 2 the anatoMy of Malware attacks 3 the Malware business Model 4 conclusion 4 about verisign
  • 3. white paper Malware Security report: protecting your BuSineSS, cuStoMerS, and the BottoM line Malware is crawling onto as email filtering made it more difficult for attackers to web sites everywhere distribute their programs through email spam. Additionally, This white paper will help you understand the threat from as firewalls have become more prevalent in the workplace malware and how it can impact your online business. You’ll and at home, malware can no longer easily spread from learn about criminals’ motivations for distributing malware system to system over a network. Through the web, there are through the web and how they infect web servers to make opportunities for hackers to penetrate your company’s web distribution possible. This paper also highlights techniques site and use it as a host to spread malware to your customers. administrators can use to detect when and how attackers Malware code is not easily detectable and may infect have compromised their web server. consumers’ computers when they simply browse your web Other critical malware discussion points include: site. This is known as “drive-by” malware, and users are largely (or completely) unaware that their systems have How attackers distribute malware through ƒƒ become compromised with this type of attack—making it a web browsers rather than traditional techniques, particularly insidious problem. Hackers use drive-by malware such as infected email attachments. to spread viruses, hijack computers, or steal sensitive data, What the profit motivations are for modern criminals ƒƒ such as credit card numbers or other personal information. to infect end-user systems. How malware is distributed by infecting legitimate ƒƒ _________________________________________________________ web sites. how drive-by malware works, What tools have been developed to infect as many ƒƒ and are small web sites at risk? pages as possible Drive-by malware downloads itself onto a user’s system How cybercriminals have developed attack techniques ƒƒ without their consent. Cybercriminals exploit browser and/ that allow malware to infect thousands of web sites or plug—in vulnerabilities to deliver the malware by hiding at once by exploiting web site vulnerabilities. it within a web page as an invisible element (e.g., an iframe or obfuscated javascript) or by embedding it in an image How attackers distribute their code through malicious ƒƒ (e.g., a flash or PDF file) that can be unknowingly delivered advertisements to infect the most-popular, often from the web site to the visitor’s system. well-secured, web sites. Any web site is at risk. Small sites can be more vulnerable because they are less likely to have the resources and expertise needed to detect and rapidly respond to attacks. what is Malware? Malware may infect your customers’ computers when they simply browse your site. Targeting web sites with Malware is a general term for malicious software, and it is a low traffic allows hackers to avoid detection longer growing problem on the Internet. Hackers install malware and cause more damage. by exploiting security weaknesses on your web server to gain _________________________________________________________ access to your web site. Malware includes everything from adware, which displays unwanted pop-up advertisements, to Trojan horses, which can help criminals steal confidential information, like online banking credentials. Malware is increasingly distributed through web browsers. This tactic has become more common in recent years, 1
  • 4. white paper the anatoMy of Malware attacks _________________________________________________________ To infect a computer through a web browser, an attacker common types of malware must accomplish two tasks. First, they must find a way to delivery mechanisms: connect with the victim. Next, the attacker must install • software updates: Malware posts invitations inside malware on the victim’s computer. Both of these steps social media sites, inviting users to view a video. can occur quickly and without the victim’s knowledge, The link tries to trick users into believing they need depending on the attacker’s tactics. to update their current software to view the video. The software offered is malicious. One way for an attacker to make a victim’s browser execute • banner ads: Sometimes called “malvertising,” their malicious code is to simply ask the victim to visit a web unsuspecting users click on a banner ad that then site that is infected with malware. Of course, most victims attempts to install malicious code on the user’s will not visit a site if told it is infected, so the attacker must computer. Alternatively, the ad directs users to a mask the nefarious intent of the web site. Sophisticated web site that instructs them to download a PDF with attackers use the latest delivery mechanisms, and often send heavily-obscured malicious code, or they are instructed to divulge payment details to download a PDF properly. malware-infected messages over social networks, such as Facebook, or through instant messaging systems. While these • Downloadable documents: Users are enticed into methods have proved successful to a degree, they still rely on opening a recognizable program, such as Microsoft tempting a user to visit a particular web site. Word or Excel, that contains a preinstalled Trojan horse. • Man-in-the-middle: Users may think they are Other attackers choose to target web sites that potential communicating with a web site they trust. In reality, victims will visit on their own. To do this, an attacker a cybercriminal is collecting the data users share with compromises the targeted web site and inserts a small piece the site, such as login and password. Or, a criminal can of HTML code that links back to their server. This code hijack a session, and keep it open after users think it can be loaded from any location, including a completely has been closed. The criminal can then conduct their malicious transactions. If the user was banking, the different web site. Each time a user visits a web site criminal can transfer funds. If the user was shopping, compromised in this manner, the attacker’s code has a criminal can access and steal the credit card number the chance to infect their system with malware. used in the transaction. • keyloggers: Users are tricked into downloading keylogger software using any of the techniques mentioned above. The keylogger then monitors specific actions, such as mouse operations or keyboard strokes, and takes screenshots in order to capture personal banking or credit card information. _________________________________________________________ 2
  • 5. white paper the Malware business MoDel verisign continues its leaDership in online security How do attackers use malware to turn a profit? They can use infected computers to generate income in many ways. One of VeriSign was the first-to-market with a commercial SSL the simplest is through advertising. Just as many of the web solution in the mid-1990’s. It is the leading provider of sites generate income by displaying ads, malware can display SSL Certificates, and VeriSign is the most recognized ads that result in payments to the cybercriminal. Internet security brand in the world today. Cultivated over many years, this reputation has been developed with Alternatively, extortion is used. A large network of infected both consumers and online businesses through industry computers can be very powerful, and some attackers use this leadership and the application of state-of-the-art threat to extract payments from web site owners. A group of technology into its leading SSL solutions. computers controlled by one attacker, known as a “botnet,” can send a large amount of network traffic to a single web site, which can result in a denial of service (DoS) attack. The criminals then contact the web site owner and demand a payment to stop the attack. Criminals also frequently use infected computers to gather In addition to the peace-of-mind that comes with selecting valuable user information, such as credentials for online a proven SSL Certificate, VeriSign has continued to address banking. This type of malware, known as an infostealer its customers’ needs by constantly augmenting its SSL or banking Trojan, is one of the most sophisticated and offerings with support for new standards and integration stealthy forms of malware. The criminals can then use the with complementary technologies and solutions. VeriSign private information for their own malicious schemes or sell continues this heritage by providing daily web site malware it to a third-party who then uses it to make a profit. scanning with its SSL solutions to ensure that your web site, your valuable brand, and your customers’ confidential _________________________________________________________ information are protected from an ever-changing Internet what is blacklisting, and why is it threat environment. important to avoid? Because of the potential damage caused by malware, Google, Yahoo, Bing and other search engines place any web site found with malware on a blocked list, or “blacklist.” Once blacklisted, the search engine issues a warning to potential visitors that the site is unsafe or excludes it from search results altogether. No matter how much search engine optimization you do, if your web site is blacklisted the impact to your business could be devastating. This blacklisting can occur without warning, is often done without your knowledge, and is very difficult to reverse. Taking the proper measures to prevent search engine blacklisting is critical to the long-term success of any web site. _________________________________________________________ 3
  • 6. white paper conclusion Online sales and services have experienced tremendous growth over the past decade. However, the increasing use of the Internet in everyday life has also brought a rise in nefarious activity. Malware is becoming more pervasive and jeopardizes the growth of e-commerce by fostering fears of compromised personal information. This leads to trepidation and sub-optimal results for online businesses. There needs to be an effective means to combat the use of malware if e-commerce is to reach its full potential. VeriSign provides a comprehensive trust solution for your online business success by combining premium SSL Certificates with innovative functionality to ensure that your public-facing web sites are regularly monitored for malware. Combined with the VeriSign seal, the world’s #1 trust mark, VeriSign helps you give your customers peace of mind when they interact with you online. If you want to ensure that consumers view your web site as a trusted place to conduct e-commerce, VeriSign SSL Certificates are the right choice. about verisign VeriSign is the trusted provider of Internet infrastructure services for the digital world. Billions of times each day, companies and consumers rely on our Internet infrastructure to communicate and conduct commerce with confidence. visit us at www.veris gn.com for more information. i ©2010 VeriSign, Inc. All rights reserved. VeriSign, the VeriSign logo, the Checkmark Circle logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of VeriSign, Inc., and its subsidiaries in the United States and foreign countries. All other trademarks are property of their respective owners. 4 00028754 06-23-2010