320 likes | 449 Views
Cyber- [.......] Hype or Trend? The drivers behind malware development. Information Security Distance Learning Weekend Conference 7 th - 8 th September 2013. Ram Herkanaidu Education Manager Kaspersky Lab. Numbers. Kaspersky Lab. Evolution of malware waves we have to deal with. 1994.
E N D
Cyber-[.......] Hype or Trend?The drivers behind malware development Information Security Distance Learning Weekend Conference 7th - 8thSeptember 2013 Ram Herkanaidu Education Manager Kaspersky Lab
Kaspersky Lab Evolution of malware waves we have to deal with 1994 One new virus every hour PAGE 3 |
Kaspersky Lab Evolution of malware waves we have to deal with 2006 One new virus every minute PAGE 4 |
Kaspersky Lab Evolution of malware waves we have to deal with 2011 One new virus every second Or 70.000 samples/day PAGE 5 |
What about 2013 ?
Kaspersky Lab • is currently processing • 200,000 • unique malware samples • EVERY DAY What about 2012 ?
Vulnerabilities and exploits • Applications containing vulnerabilities targeted by web exploits in 2012 Source: Kaspersky Lab January 2013
Phishing – June 2013 Source: Kaspersky Lab June2013 PAGE 9 |
Mobile malware Some statistics • The growing use of the Internet to protest • Number of mobile malware families to-date: 679 • Number of mobile malware modifications to-date: 107,068 • Mobile malware found in July 2013: 4,181 new modifications • 99.96 per cent of all mobile malware found in 2012 is targeting Android • The number of samples gathered in 2012 alone is more than six times higher than in the previous 7 years altogether • Source: Kaspersky Lab July 2013 PAGE 10 |
Mobile malware • Distribution of malware targeting Android OS detected on user devices by behaviour: Q3 2012 Source: Kaspersky Lab December2012 PAGE 11 |
Malware victims • Top 20 countries with the greatest proportion of users attacked while surfing the web: H1 2013 Source: Kaspersky Security Network: Web Anti-virus: Sept 2013
Top countries with harmful hostings • The top 20 countries within whose territories are located the malicious hosting services most actively used by cybercriminals: • H1 2013 Source: Kaspersky Security Network: Web Anti-virus: Sept 2013
Spear phishing Or COO, CTO, CFO, etc.
Types of attack Cyber-weapons: ‘Destroyers’ Espionage programs Cyber-sabotage tools Targeted attacks ‘Traditional’ cybercrime
Company perceptions & disclosure Kaspersky Lab survey, June 2011
Targeted attacks • Some of the victims: • Google • RSA • Lockheed Martin • HBGary • Sony • Comodo • DigiNotar • Saudi Aramco • LinkedIn • Adobe • Syrian Ministry of Foreign Affairs • New York Times
Cyberespionage Stealing commercial or military secrets “There’s no such thing as ‘secure’ any more. The most sophisticated adversaries are going to go unnoticed on our networks. We have to build our systems on the assumption that adversaries will get in. We have to, again, assume that all the components of our system are not safe, and make sure we’re adjusting accordingly.” Debora Plunkett, NSA Director Quoted in “NSA Switches to Assuming Security Has Always Been Compromised”
Cyberattacks “… cyber weapons are: a) effective; b) much cheaper than traditional weapons; c) difficult to detect; d) difficult to attribute to a particular attacker …; e) difficult to protect against …; f) can be replicated at no extra cost. What’s more, the seemingly harmless nature of these weapons means their owners have few qualms about unleashing them, with little thought for the consequences. Eugene Kaspersky June 2012 http://eugene.kaspersky.com/2012/06/14/the-flame-that-changed-the-world/
Cyber activism The growing use of the Internet to protest
2010 2011 2012 2012 Espionage. Sabotage. Cyberwar.
Future of cyber…. • Profit is still main motivator. We’ll see • More targeted attacks • More state backed malware • More cyber activism • Cyber defence • Intergovernmental / legal cooperation • Connected devices needing to be secured • Critical Infrastructure security
Ram Herkanaidu Education Manager Kaspersky Lab ram.herkanaidu@kaspersky.com