Top Banner
The changing threat landscape: 2010 and beyond Chester Wisniewski – Sophos Eamonn Medlar - WPP Moderator: Angela Moscaritolo
19

The changing threat landscape: 2010 and beyond Chester Wisniewski – Sophos Eamonn Medlar - WPP Moderator: Angela Moscaritolo.

Dec 25, 2015

Download

Documents

Solomon Stewart
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: The changing threat landscape: 2010 and beyond  Chester Wisniewski – Sophos  Eamonn Medlar - WPP  Moderator: Angela Moscaritolo.

The changing threat landscape: 2010 and beyond

Chester Wisniewski – Sophos Eamonn Medlar - WPP Moderator: Angela Moscaritolo

Page 2: The changing threat landscape: 2010 and beyond  Chester Wisniewski – Sophos  Eamonn Medlar - WPP  Moderator: Angela Moscaritolo.

Threat landscape splitting in two

2

Opportunistic Targeted

Page 3: The changing threat landscape: 2010 and beyond  Chester Wisniewski – Sophos  Eamonn Medlar - WPP  Moderator: Angela Moscaritolo.

What is an opportunistic attack?

Affiliate marketing

Conficker

Fake-AV

Spam

Phishing

Social media

SEO poisoning

Page 4: The changing threat landscape: 2010 and beyond  Chester Wisniewski – Sophos  Eamonn Medlar - WPP  Moderator: Angela Moscaritolo.

Fake anti-virus: Latest tricks

Page 5: The changing threat landscape: 2010 and beyond  Chester Wisniewski – Sophos  Eamonn Medlar - WPP  Moderator: Angela Moscaritolo.

ДОРВЕЙ (Doorway)

“A web page that is designed to attract traffic from a search

engine and then redirect it to another site or page.”

Page 6: The changing threat landscape: 2010 and beyond  Chester Wisniewski – Sophos  Eamonn Medlar - WPP  Moderator: Angela Moscaritolo.

Black hat SEO

Page 7: The changing threat landscape: 2010 and beyond  Chester Wisniewski – Sophos  Eamonn Medlar - WPP  Moderator: Angela Moscaritolo.

Social network malware

Page 8: The changing threat landscape: 2010 and beyond  Chester Wisniewski – Sophos  Eamonn Medlar - WPP  Moderator: Angela Moscaritolo.

Koobface - Multilingual

Page 9: The changing threat landscape: 2010 and beyond  Chester Wisniewski – Sophos  Eamonn Medlar - WPP  Moderator: Angela Moscaritolo.

Koobface – What can it do?

Steal software keys Upload stored passwords Web server Search hijacking Captcha busting PPC fraud Fake AV Soc Net Spambot

Screenshot courtesy of abuse.ch

Page 10: The changing threat landscape: 2010 and beyond  Chester Wisniewski – Sophos  Eamonn Medlar - WPP  Moderator: Angela Moscaritolo.

Targeted attacks have diverged

Unknown exploit(s)

Unknown malware

Nearly silent

Used for

espionage/cyberwa

rfare

How do we react to this new branch of attack?

MS Advisory for “Aurora” exploit

Page 11: The changing threat landscape: 2010 and beyond  Chester Wisniewski – Sophos  Eamonn Medlar - WPP  Moderator: Angela Moscaritolo.

MS10-046 Shortcut exploit

15 year old bug

Stuxnet, Chymin, etc

Multiple rootkits

Page 12: The changing threat landscape: 2010 and beyond  Chester Wisniewski – Sophos  Eamonn Medlar - WPP  Moderator: Angela Moscaritolo.

Signatures Tiny P2P Comms Exploits

(RCE and EoP) Small (without packers)

Silent, but deadly

Page 13: The changing threat landscape: 2010 and beyond  Chester Wisniewski – Sophos  Eamonn Medlar - WPP  Moderator: Angela Moscaritolo.

The new blended threat – Step 1

Page 14: The changing threat landscape: 2010 and beyond  Chester Wisniewski – Sophos  Eamonn Medlar - WPP  Moderator: Angela Moscaritolo.

The new blended threat – Step 2

Sample Zeus commands

Sethomepage [URL] resetgrab

getmff getcerts

Bc_add [service] [ip] [port] kos

Block_url shutdown

Rexec [url] [args] reboot

Lexec [file] [args] Upcfg [url]

Addsf [filemask] Block_fake

Page 15: The changing threat landscape: 2010 and beyond  Chester Wisniewski – Sophos  Eamonn Medlar - WPP  Moderator: Angela Moscaritolo.

Zeus takes the 3rd step

Law enforcement crackdown Widely decentralized

Image courtesy of krebsonsecurity,com

Page 16: The changing threat landscape: 2010 and beyond  Chester Wisniewski – Sophos  Eamonn Medlar - WPP  Moderator: Angela Moscaritolo.

“It’s mine” Portability Regulation Chain of trust Legacy increases

attacksurface

Challenges to the protector

Creative Commons image courtesy of thetechbuzz's Flickr photostream.

Page 17: The changing threat landscape: 2010 and beyond  Chester Wisniewski – Sophos  Eamonn Medlar - WPP  Moderator: Angela Moscaritolo.

Evolving with the threat

AV good for basic threat

Behavior is key

Collective intelligence

Event correlation

Defense in depth

Data protection is key

Page 18: The changing threat landscape: 2010 and beyond  Chester Wisniewski – Sophos  Eamonn Medlar - WPP  Moderator: Angela Moscaritolo.

Discussion with Eamonn Medlar, WPP

Q&A

Page 19: The changing threat landscape: 2010 and beyond  Chester Wisniewski – Sophos  Eamonn Medlar - WPP  Moderator: Angela Moscaritolo.

19

Summary

Contact:

Proven:25+ years of experience

Integratedthreat detection

SophosLabs

24/7/365

Anti-Malware

Email Protection

Web Filtering

Encryption

Email: [email protected]

Twitter: @chetwisniewski

Blog: http://nakedsecurity.sophos.com

Device/App Control

NAC