200 likes | 466 Views
2012 Malnet Report: Breaking the Vicious Cycle. Grant Asplund Senior Technology Evangelist. Average business faces 5,000 threats per month. Stage 1: Build the Infrastructure. Number of malnets has tripled over the last six months. 2/3 of all Web-based attacks will be driven by malnets.
E N D
2012 Malnet Report: Breaking the Vicious Cycle Grant Asplund Senior Technology Evangelist
Stage 1: Build the Infrastructure Number of malnets has tripled over the last six months
INFECT SYSTEMS BECOME PART OF MALNET INFRASTRUCTURE & LAUNCH NEW ATTACKS Stage 1 Stage 5 BUILD The Malnet Infrastructure Stage 4 Stage 2 Stage3 INFECT SYSTEMS STALK USERS Launch ATTACKS
Malnets are how you get infected and botnets are what you are once you’re infected.
Malnets Scale to Support Attacks SHNAKULE TRICKI RUBOL RASKAT RONGDAC Max Hosts Max Hosts Max Hosts Max Hosts 547 476 163 105 Max Hosts 5,005 AVG. Hosts AVG. Hosts AVG. Hosts AVG. Hosts AVG. Hosts 1,717 106 76 50 50 MIN. Hosts 50 MIN. Hosts MIN. Hosts MIN. Hosts MIN. Hosts 4 1 5 1 Drive-by downloads; Fake AV, codecs, Flash and Firefox updates; Botnet C&C controls; pornography; gambling; work-at-home scams Search EnginePoisoning & Relays Spam Ecosystem Search EnginePoisoning & Relays Spam Ecosystem
Top Malnet Entry Points Search Engine 35.5% Email 11.1% Unrated ? 10.9% Pornography 4.2% XXX Computers/Internet 4.2%
One Botnet Falls, Others Rise 47% 517% Zeus Aleuron
Eliminating the botnet threat is impossible if you haven’t first solved the malnetproblem
Geographic Distribution of Shnakule CENTRAL ASIA WESTERN EUROPE 0% -54% 98% +4% AMERICAS 42% -22% 6% +3% 0% -1% 5% -4% 1% +1% 3% -57% 37% +32% 90% -2% 37% +17% 33% +6% 1% -5% 40% +37% 67% +58% 17% -1% 1% -2% 3% +3% 0% -2% 18% +1% 0% -9% 2% +2% PORN SEP / RELAY EASTERN EUROPE & MIDDLE EAST EAST/SE ASIA COMMAND & CONTROL SCAMS MALEWARE SERVERS
Mapping Malnets Attack type doesn’t matter. Content doesn’t matter. Zero-day exploits don’t matter. Payload encryption doesn’t matter.
Negative Day Defense Negative Day Defense Identifies and Blocks New Components Negative Day Defense Continues to Block Malnet Infrastructure UTM Policy applied AV Engines Begin Detection Active Threat Phase -30 Days 0 Day +1 Days +30 Days Infrastructure Phase New Subnet, IP Address and Host Name Dynamic Payload Changes Domain Exploit Server Attack Begins Attack Ends
Blocking a Zero-Day Java Exploit Infected systems begin communicating with command and control domain New C&C site comes online ok.aa24.net actively distributes malicious executable that uses zero-day Java exploit New exploit site named ok.aa24.net becomes active Jan -225 Days April -120 Days Aug 26 0 Day Aug 26 0 Day 2012 WebPulse automatically blocks all requests to site WebPulse automatically blocks all requests to domain WebPulse rates IP address as suspicious and begins blocking WebPulserates as malware source & begins blocking
Best Practices for Protecting Businesses Block malnet infrastructures to limit employee exposure to botnet-producing Trojans Block communications from infected end-user systems to command and control servers x Update Web usage policies and keep network/firewall rules current Use a reporting solution that can identify potentially infected end-user systems for quarantine Set and enforce policies that require employees to update browsers and applications with the latest patches and security updates
Download at http://www.bluecoat.com/security/reports
Thank You! Grant Asplund 206-612-8652 grant.asplund@bluecoat.com Twitter: @gasplund