SlideShare uma empresa Scribd logo
1 de 2
How Antivirus Companies Handle StateSponsored Malware
Government might get its own companies to play along and it would
not be able to influence international companies. So while the NSA
could certainly pressure McAfee or Symantec -- both Silicon Valley
companies -- to ignore NSA malware, it could not similarly pressure
Kaspersky Labs (Russian), F-Secure (Finnish), or AVAST (Czech).
And the governments of Russia, Finland, and the Czech Republic will
have comparable problems.
Bruce Schneier say in one of his articles «I joined a group of security
experts to ask antivirus companies explicitly if they were ignoring
malware at the behest of a government.Understanding that the
companies could certainly lie, this is the response so far: no one has
admitted to doing so.Up until this moment, only a handful of the
vendors have replied ESET, F-Secure, Norman Shark, Kaspersky,
Panda and Trend Micro. All of the responding companies have
confirmed the detection of state sponsored malware, e.g. R2D2 and
FinFisher. Furthermore, they claim they have never received a request
to not detect malware.
And if they were asked by any government to do so in the future, they
said they would not comply. All the aforementioned companies
believe there is no such thing as harmless malware.»
Furthermore, this means that several vendors did not respond to the
letter before the deadline. The letter was sent to: Agnitum, Ahnlab,
Avira operations GmbH & Co. KG, AVG, AVAST software a.s.,
Bullguard Ltd, Bitdefender SRL, F-Secure Corporation, Kaspersky
Lab, McAfee Inc, Norman Shark, Microsoft Corporation, ESET spol.
S r.o., Panda Security S.L., Symantec Corporation and Trend Micro
Incorporated. Mikko Hypponen of F-Secure attenpts to explain why
anti-virus companies didn't catch Stuxnet, DuQu and Flame .Hi say «
Stuxnet, Duqu and Flame are not normal, everyday
malware, of course. All three of them were most likely developed by
a Western intelligence
agency as part of covert operations that weren’t meant to be
discovered .
His conclusion is simply that the attackers -- in this case, military

intelligence agencies -- are simply better than
commercial-grade anti-virus programs !!!
Conclusion :
Security technology can stop common attacks, but targeted
attacks fly under the radar. That's
because traditional products, which scan e-mail at the network
gateway or on the desktop,
can't recognize the threat.

Mais conteúdo relacionado

Mais procurados

Enhanced threat intelligene for s ps v3
Enhanced threat intelligene for s ps v3Enhanced threat intelligene for s ps v3
Enhanced threat intelligene for s ps v3
Neil King
 
How much security is enough?
How much security is enough?How much security is enough?
How much security is enough?
Sherry Jones
 

Mais procurados (20)

15 Startling Facts About Mobile Security
15 Startling Facts About Mobile Security15 Startling Facts About Mobile Security
15 Startling Facts About Mobile Security
 
Enhanced threat intelligene for s ps v3
Enhanced threat intelligene for s ps v3Enhanced threat intelligene for s ps v3
Enhanced threat intelligene for s ps v3
 
2016 Trends in Security
2016 Trends in Security 2016 Trends in Security
2016 Trends in Security
 
Infographic Economic Impact of Cybercrime
Infographic Economic Impact of CybercrimeInfographic Economic Impact of Cybercrime
Infographic Economic Impact of Cybercrime
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
 
Verizon Data Breach Investigations Report (DBIR) 2017
Verizon Data Breach Investigations Report (DBIR) 2017Verizon Data Breach Investigations Report (DBIR) 2017
Verizon Data Breach Investigations Report (DBIR) 2017
 
READ THIS BEFORE USING FACEAPP! FACEAPP PRIVACY CONCERNS?
READ THIS BEFORE USING FACEAPP! FACEAPP PRIVACY CONCERNS?READ THIS BEFORE USING FACEAPP! FACEAPP PRIVACY CONCERNS?
READ THIS BEFORE USING FACEAPP! FACEAPP PRIVACY CONCERNS?
 
Symantec intelligence report august 2015
Symantec intelligence report august 2015Symantec intelligence report august 2015
Symantec intelligence report august 2015
 
4 Facts Every Business Should Know About Phishing
4 Facts Every Business Should Know About Phishing4 Facts Every Business Should Know About Phishing
4 Facts Every Business Should Know About Phishing
 
Next Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideNext Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers Guide
 
2016 Year in Review - Our Top 10 Blog Posts On Mobile Application Security
2016 Year in Review - Our Top 10 Blog Posts On Mobile Application Security 2016 Year in Review - Our Top 10 Blog Posts On Mobile Application Security
2016 Year in Review - Our Top 10 Blog Posts On Mobile Application Security
 
Rp quarterly-threat-q3-2013
Rp quarterly-threat-q3-2013Rp quarterly-threat-q3-2013
Rp quarterly-threat-q3-2013
 
How much security is enough?
How much security is enough?How much security is enough?
How much security is enough?
 
SecTor 2012 The Security Mendoza Line
SecTor 2012 The Security Mendoza LineSecTor 2012 The Security Mendoza Line
SecTor 2012 The Security Mendoza Line
 
IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:
IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:
IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:
 
Your Data Is Under Siege: Fortify Your Endpoints
Your Data Is Under Siege: Fortify Your EndpointsYour Data Is Under Siege: Fortify Your Endpoints
Your Data Is Under Siege: Fortify Your Endpoints
 
Cloud activ8 state of ransomware report_2021-dec
Cloud activ8 state of ransomware report_2021-decCloud activ8 state of ransomware report_2021-dec
Cloud activ8 state of ransomware report_2021-dec
 
CSS 2018 Trivia
CSS 2018 TriviaCSS 2018 Trivia
CSS 2018 Trivia
 
MLabs - Cyber Crime Tactics and Techniques Q2 2017
MLabs - Cyber Crime Tactics and Techniques Q2 2017MLabs - Cyber Crime Tactics and Techniques Q2 2017
MLabs - Cyber Crime Tactics and Techniques Q2 2017
 
BSides SF Security Mendoza Line
BSides SF Security Mendoza LineBSides SF Security Mendoza Line
BSides SF Security Mendoza Line
 

Semelhante a Antivirus weakness

Worker's thirst can lead to poisoned resumes
Worker's thirst can lead to poisoned resumesWorker's thirst can lead to poisoned resumes
Worker's thirst can lead to poisoned resumes
Digital Devices LTD: Top B2B IT Reseller in UK | Digital Devices
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
Raj Goel
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
Ken Spencer Brown
 
Anti virus in the corporate arena
Anti virus in the corporate arenaAnti virus in the corporate arena
Anti virus in the corporate arena
UltraUploader
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_brief
Beza Belayneh
 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-Security
Tara Gravel
 
56 JULY 2017 WWW.COM.docx
56                   JULY 2017                     WWW.COM.docx56                   JULY 2017                     WWW.COM.docx
56 JULY 2017 WWW.COM.docx
alinainglis
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
Deb Birch
 

Semelhante a Antivirus weakness (20)

Worker's thirst can lead to poisoned resumes
Worker's thirst can lead to poisoned resumesWorker's thirst can lead to poisoned resumes
Worker's thirst can lead to poisoned resumes
 
Cyber_Risk_in_Switzerland_March_2022.pdf
Cyber_Risk_in_Switzerland_March_2022.pdfCyber_Risk_in_Switzerland_March_2022.pdf
Cyber_Risk_in_Switzerland_March_2022.pdf
 
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacksIndustry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacks
 
3rd Part Cyber Risk Report - 2018
3rd Part Cyber Risk Report - 20183rd Part Cyber Risk Report - 2018
3rd Part Cyber Risk Report - 2018
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
 
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
Ransomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationRansomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and Mitigation
 
Hacking 04 2011
Hacking 04 2011Hacking 04 2011
Hacking 04 2011
 
Anti virus in the corporate arena
Anti virus in the corporate arenaAnti virus in the corporate arena
Anti virus in the corporate arena
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_brief
 
iStart - Cybercrime scene investigation
iStart - Cybercrime scene investigationiStart - Cybercrime scene investigation
iStart - Cybercrime scene investigation
 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-Security
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
 
Ransomware Review 2017
Ransomware Review 2017Ransomware Review 2017
Ransomware Review 2017
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
The WannaCry Black Swan Event -- Unpatchable FDA medical devices
The WannaCry Black Swan Event -- Unpatchable FDA medical devicesThe WannaCry Black Swan Event -- Unpatchable FDA medical devices
The WannaCry Black Swan Event -- Unpatchable FDA medical devices
 
56 JULY 2017 WWW.COM.docx
56                   JULY 2017                     WWW.COM.docx56                   JULY 2017                     WWW.COM.docx
56 JULY 2017 WWW.COM.docx
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
 
M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat
 

Antivirus weakness

  • 1. How Antivirus Companies Handle StateSponsored Malware Government might get its own companies to play along and it would not be able to influence international companies. So while the NSA could certainly pressure McAfee or Symantec -- both Silicon Valley companies -- to ignore NSA malware, it could not similarly pressure Kaspersky Labs (Russian), F-Secure (Finnish), or AVAST (Czech). And the governments of Russia, Finland, and the Czech Republic will have comparable problems. Bruce Schneier say in one of his articles «I joined a group of security experts to ask antivirus companies explicitly if they were ignoring malware at the behest of a government.Understanding that the companies could certainly lie, this is the response so far: no one has admitted to doing so.Up until this moment, only a handful of the vendors have replied ESET, F-Secure, Norman Shark, Kaspersky, Panda and Trend Micro. All of the responding companies have confirmed the detection of state sponsored malware, e.g. R2D2 and FinFisher. Furthermore, they claim they have never received a request to not detect malware. And if they were asked by any government to do so in the future, they said they would not comply. All the aforementioned companies believe there is no such thing as harmless malware.» Furthermore, this means that several vendors did not respond to the letter before the deadline. The letter was sent to: Agnitum, Ahnlab, Avira operations GmbH & Co. KG, AVG, AVAST software a.s., Bullguard Ltd, Bitdefender SRL, F-Secure Corporation, Kaspersky Lab, McAfee Inc, Norman Shark, Microsoft Corporation, ESET spol. S r.o., Panda Security S.L., Symantec Corporation and Trend Micro Incorporated. Mikko Hypponen of F-Secure attenpts to explain why anti-virus companies didn't catch Stuxnet, DuQu and Flame .Hi say « Stuxnet, Duqu and Flame are not normal, everyday malware, of course. All three of them were most likely developed by a Western intelligence agency as part of covert operations that weren’t meant to be
  • 2. discovered . His conclusion is simply that the attackers -- in this case, military intelligence agencies -- are simply better than commercial-grade anti-virus programs !!! Conclusion : Security technology can stop common attacks, but targeted attacks fly under the radar. That's because traditional products, which scan e-mail at the network gateway or on the desktop, can't recognize the threat.