Top Banner
2014 TRUSTWAVE GLOBAL SECURITY REPORT John Yeo VP at Trustwave Stockholm - November 2014
46
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Sammanfattning av 2014 Trustwave Global Security Report

2014

TRUSTWAVE GLOBAL

SECURITY REPORT

John Yeo

VP at Trustwave

Stockholm - November 2014

Page 2: Sammanfattning av 2014 Trustwave Global Security Report

1 Victim Demographics

2 Data and Systems Targeted

3 Intrusion Methods

4 Indicators of Compromise

5 Detection Statistics

6 Understanding Widespread Malware

7 Actions and Recommendations

2014 GSR: AGENDA

Welcome…

Page 3: Sammanfattning av 2014 Trustwave Global Security Report

1 Victim Demographics

2 Data and Systems Targeted

3 Intrusion Methods

4 Indicators of Compromise

5 Detection Statistics

6 Understanding Widespread Malware

7 Actions and Recommendations

2014 GSR: AGENDA

Page 4: Sammanfattning av 2014 Trustwave Global Security Report

2014 GSR: SUMMARY OF FINDINGS

1. More victims, more breaches

2. Shift in data types

3. Similar targets and methods as past years

4. Self detection = early detection

5. Response is key

Page 5: Sammanfattning av 2014 Trustwave Global Security Report

2014

TRUSTWAVE GLOBAL

SECURITY REPORT

WHO WERE THE

VICTIMS?

Page 6: Sammanfattning av 2014 Trustwave Global Security Report

THE VOLUME OF DATA

BREACH INVESTIGATIONS

INCREASED 54% OVER 2012

Page 7: Sammanfattning av 2014 Trustwave Global Security Report

ATTACK SOURCE

IP ADDRESSES

LOCATION OF

VICTIMS

19% United States 4% Germany

18% China 4% United Kingdom

16% Nigeria 4% Japan

5% Russia 3% France

5% Korea 3% Taiwan

19% Other Countries

19% United States 1% Mauritus

14% United Kingdom 1% New Zealand

11% Australia 1% Ireland

2% Hong Kong 1% Belgium

2% India 1% Canada

7% Other Countries

Page 8: Sammanfattning av 2014 Trustwave Global Security Report

35% 18%

11%

RET

AIL

FOO

D &

BEV

ERA

GE

HO

SP

ITA

LIT

Y

35% RETAIL

18% FOOD & BEVERAGE

11% HOSPITALITY

9% FINANCE

8% PROFESSIONAL SERVICES

6% TECHNOLOGY

4% ENTERTAINMENT

3% TRANSPORTATION

2% HEALTH CARE

4% OTHER

Page 9: Sammanfattning av 2014 Trustwave Global Security Report

2014

TRUSTWAVE GLOBAL

SECURITY REPORT

WHAT WAS

TARGETED?

Page 10: Sammanfattning av 2014 Trustwave Global Security Report

33% INCREASE IN

NON-CARD DATA

TARGETED

POS payment

card data

(track data)

45%

36%

19%

Non-payment

card data

E-commerce

payment card data

Page 11: Sammanfattning av 2014 Trustwave Global Security Report

E-COMMERCE MADE

UP 54% OF ASSETS

TARGETED

Page 12: Sammanfattning av 2014 Trustwave Global Security Report

POINT-OF-SALE (POS)

BREACHES ACCOUNTED

FOR ONE THIRD OF OUR

INVESTIGATIONS

Page 13: Sammanfattning av 2014 Trustwave Global Security Report

2014

TRUSTWAVE GLOBAL

SECURITY REPORT

HOW DID

ATTACKERS GET

ACCESS?

Page 14: Sammanfattning av 2014 Trustwave Global Security Report

WEAK PASSWORDS

OPENED THE DOOR FOR

THE INITIAL INTRUSION IN

31% OF COMPROMISES

Page 15: Sammanfattning av 2014 Trustwave Global Security Report

MOST COMMON

PASSWORD FOUND

WITHIN CORPORATE

ENVIRONMENTS?

Page 16: Sammanfattning av 2014 Trustwave Global Security Report

TOP 25 PASSWORDS

16

BY PERCENT

Page 17: Sammanfattning av 2014 Trustwave Global Security Report

PASSWORD LENGTH

17

Page 18: Sammanfattning av 2014 Trustwave Global Security Report

ALMOST ALL

APPLICATIONS

SCANNED

HARBORED ONE

OR MORE

SERIOUS

SECURITY

VULNERABILITIES

Page 19: Sammanfattning av 2014 Trustwave Global Security Report

TOP 10 APPLICATION VULNERABILITIES

Page 20: Sammanfattning av 2014 Trustwave Global Security Report

2014

TRUSTWAVE GLOBAL

SECURITY REPORT

INDICATORS OF

COMPROMISE

Page 21: Sammanfattning av 2014 Trustwave Global Security Report

Businesses often…

1. Don’t centralize logging

2. Log but don’t monitor

3. Log the wrong things

important because…

Page 22: Sammanfattning av 2014 Trustwave Global Security Report

ANOMALOUS ACCOUNT ACTIVITY

UNEXPLAINED OR SUSPICIOUS OUTBOUND DATA

NEW AND/OR SUSPICIOUS FILES DROPPED

GEOGRAPHIC ANOMALIES IN LOGINS

UNEXPLAINED OR SUSPICIOUS CHANGES TO THE WINDOWS REGISTRY

EVIDENCE OF LOG TAMPERING

EVIDENCE OF TAMPERING WITH ANTI-VIRUS SERVICES

ANOMALOUS SERVICE ACTIVITY (SERVICES ADDED, STOPPED OR PAUSED)

INTERRUPTION IN THE PAYMENT PROCESS FLOW (E-COMMERCE)

UNEXPLAINED ACCESS TO ADMINSTRATION CONSOLES OR WEB ADMIN (E-COMMERCE)

Page 23: Sammanfattning av 2014 Trustwave Global Security Report

2014

TRUSTWAVE GLOBAL

SECURITY REPORT

DETECTION

STATISTICS

Page 24: Sammanfattning av 2014 Trustwave Global Security Report

71% OF COMPROMISE

VICTIMS DID NOT DETECT

BREACHES THEMSELVES

Page 25: Sammanfattning av 2014 Trustwave Global Security Report
Page 26: Sammanfattning av 2014 Trustwave Global Security Report
Page 27: Sammanfattning av 2014 Trustwave Global Security Report
Page 28: Sammanfattning av 2014 Trustwave Global Security Report

2014

TRUSTWAVE GLOBAL

SECURITY REPORT

UNDERSTANDING

WIDESPREAD

MALWARE

Page 29: Sammanfattning av 2014 Trustwave Global Security Report

NARRATIVE OF A

MALICIOUS CAMPAIGN

Page 30: Sammanfattning av 2014 Trustwave Global Security Report

THE TOP THREE MALWARE

HOSTING COUNTRIES WERE:

42% UNITED STATES

13% RUSSIA

9% GERMANY

Page 31: Sammanfattning av 2014 Trustwave Global Security Report

MALWARE STRAINS:

PASSWORD STEALERS

BANKING TROJANS

DDOS BOTS

RANSOMWARE

FAKE UPDATES OR ANTI-VIRUS

CRYPTO-CURRENCY MINER

POINT-OF-SALE MALWARE

SPAMBOTS

Page 32: Sammanfattning av 2014 Trustwave Global Security Report

BLACKHOLE TOPPED

THE LIST OF MOST

PREVALENT EXPLOIT

KITS AT 49%

Page 33: Sammanfattning av 2014 Trustwave Global Security Report

85% OF EXPLOITS

DETECTED WERE OF

THIRD-PARTY PLUG-INS

INCLUDING JAVA AND

ADOBE FLASH, ACROBAT

AND READER

Page 34: Sammanfattning av 2014 Trustwave Global Security Report

78% OF EXPLOITS

DETECTED WERE OF

JAVA VULNERABILITIES

Page 35: Sammanfattning av 2014 Trustwave Global Security Report

SPAM MADE UP

70 PERCENT OF

INBOUND MAIL

Page 36: Sammanfattning av 2014 Trustwave Global Security Report

IN TERMS OF

MALICIOUS SPAM,

59% INCLUDED

ATTACHMENTS &

41% INCLUDED LINKS

Page 37: Sammanfattning av 2014 Trustwave Global Security Report

2014

TRUSTWAVE GLOBAL

SECURITY REPORT

ACTION PLAN/

RECOMMENDATIONS

Page 38: Sammanfattning av 2014 Trustwave Global Security Report

TO DO LIST:

1. Educate employees on best

security practices through

security awareness training.

2. Invest in gateway security

technologies to protect

networks and users against

zero-day exploits, targeted

malware and blended

threats.

Page 39: Sammanfattning av 2014 Trustwave Global Security Report

TO DO LIST:

1. Implement and enforce

strong password policies for

employees.

2. Change default and “admin”

passwords immediately.

3. Consider two-factor

authentication solutions.

Page 40: Sammanfattning av 2014 Trustwave Global Security Report

TO DO LIST:

1. Know your data - discover all

types of sensitive data

across your environment.

2. Combine ongoing scanning

and testing across all assets

- endpoint, network,

application and database -

so you can identify and fix

flaws before an attacker

finds them.

Page 41: Sammanfattning av 2014 Trustwave Global Security Report

TO DO LIST:

1. Pit a security expert against

your network hosts,

applications and databases

for a real-world threat

perspective.

2. Test resilience of your

systems with regular

penetration testing.

Page 42: Sammanfattning av 2014 Trustwave Global Security Report

TO DO LIST:

1. Develop, institute, and

rehearse an incident

response plan.

2. Ensure ongoing security

training and education of

your IT staff.

3. Consider a MSSP for expert

help, including ongoing

tuning of your technologies

and continuous threat

monitoring.

Page 43: Sammanfattning av 2014 Trustwave Global Security Report

IN CLOSING, SECURITY IS:

1. A continuous process

2. Compliance != Security

3. Is bigger than the IT dept

4. Is an effective combination:

• of People

• pf Process

• of Technology; AND

• of expert partners

Page 44: Sammanfattning av 2014 Trustwave Global Security Report

2014

TRUSTWAVE GLOBAL

SECURITY REPORT

Further

Resources

Page 45: Sammanfattning av 2014 Trustwave Global Security Report

www.trustwave.com/GSR

blog.spiderlabs.com

Page 46: Sammanfattning av 2014 Trustwave Global Security Report

ANY QUESTIONS?