190 likes | 350 Views
The changing threat landscape: 2010 and beyond. Chester Wisniewski – Sophos Eamonn Medlar - WPP Moderator: Angela Moscaritolo. Threat landscape splitting in two. Opportunistic. Targeted. 2. What is an opportunistic attack?. Affiliate marketing Conficker Fake-AV Spam Phishing
E N D
The changing threat landscape: 2010 and beyond • Chester Wisniewski – Sophos • EamonnMedlar - WPP • Moderator: Angela Moscaritolo
Threat landscape splitting in two Opportunistic Targeted 2
What is an opportunistic attack? • Affiliate marketing • Conficker • Fake-AV • Spam • Phishing • Social media • SEO poisoning
ДОРВЕЙ (Doorway) “A web page that is designed to attract traffic from a search engine and then redirect it to another site or page.”
Koobface – What can it do? • Steal software keys • Upload stored passwords • Web server • Search hijacking • Captcha busting • PPC fraud • Fake AV • Soc Net Spambot Screenshot courtesy of abuse.ch
Targeted attacks have diverged • Unknown exploit(s) • Unknown malware • Nearly silent • Used for espionage/cyberwarfare MS Advisory for “Aurora” exploit How do we react to this new branch of attack?
MS10-046 Shortcut exploit • 15 year old bug • Stuxnet, Chymin, etc • Multiplerootkits
Silent, but deadly • Signatures • Tiny • P2P Comms • Exploits (RCE and EoP) • Small (without packers)
Zeus takes the 3rd step • Law enforcement crackdown • Widely decentralized Image courtesy of krebsonsecurity,com
Challenges to the protector • “It’s mine” • Portability • Regulation • Chain of trust • Legacy increases attacksurface Creative Commons image courtesy of thetechbuzz'sFlickrphotostream.
Evolving with the threat • AV good for basic threat • Behavior is key • Collective intelligence • Event correlation • Defense in depth • Data protection is key
Q&A Discussion with EamonnMedlar, WPP
Summary Proven: 25+ years of experience Integrated threat detection SophosLabs 24/7/365 Anti-Malware Email Protection Web Filtering Encryption Device/App Control NAC Email: chesterw@sophos.com Twitter: @chetwisniewski Blog: http://nakedsecurity.sophos.com Contact: 19