Fighting the. Botnet Ecosystem. Renaud BIDOU. Page 1
|
|
- Amelia Shelton
- 5 years ago
- Views:
Transcription
1 Fighting the Botnet Ecosystem Renaud BIDOU Page 1
2 Bots, bots, bots Page 2
3 Botnet classification Internal Structure Command model Propagation mechanism 1. Monolithic Coherent, all features in one binary Evolution may not be trivial Kaiten, SDBot, Spybot 2. Modular Evolution voluntarily made easy Choice of appropriate language (C++) AgoBot 3. Barnum Set of heterogeneous scripts Often relies on local interpreters PHP bots, GTBot Page 3
4 Botnet classification Internal Structure Command model Propagation mechanism 1. No control Automated behavior Less flexible, more resistant Morris worm, CodeRed 2. Public infrastructure Reliable and «anonymous» Mostly IRC, P2P upcoming 95% of botnets 3. Private CC Channel Usually based on covert channels Better stealth at short term Sobig Page 4
5 Botnet classification Internal Structure Command model Propagation mechanism 1. No No propagation function Relies on 3rd party Kaiten 2. Single Exploits one specific vulnerability May need human action CodeRed, Netsky, Mytob 3. Modular Use of multiple exploits Transported by different vectors Morris worm, SDBot, MPack Page 5
6 Short botnet history 1988 Morris Worm Multiple vectors propagation «Unvoluntarily» blocked the internet Page 6
7 Short botnet history 1988 Morris Worm 1993 EggDrop Multiple vectors propagation «First Unvoluntarily «real» worm» blocked the internet Propagated through IRC channels Page 7
8 Short botnet history 1988 Morris Worm 1993 EggDrop 1998 GTBot Multiple vectors propagation «First Unvoluntarily «real» worm» blocked the internet Propagated First bot based through on IRC C&C channels Channel Competition with PrettyPark for the title Page 8
9 Short botnet history 1988 Morris Worm 1993 EggDrop First 1998 «real GTBot» worm 2000 Major DDoS Multiple vectors propagation «Unvoluntarily» blocked the internet Propagated First bot based through on IRC C&C channels Channel Competition First visible with DDoS PrettyPark for dummies for the title Trin00, TFN, Stacheldraht Page 9
10 Short botnet history 1988 Morris Worm 1993 EggDrop First 1998 «real GTBot» worm 2000 Major DDoS 2001 CodeRed Multiple vectors propagation «Unvoluntarily» blocked the internet Propagated First bot based through on IRC C&C channels Channel Competition First visible with DDoS PrettyPark for dummies for the title Trin00, First «TFN, large Stacheldraht scale» worm Failed to DoS white house web site Page 10
11 Short botnet history 1988 Morris Worm 1993 EggDrop First 1998 «real GTBot» worm 2000 Major DDoS Propagated through IRC channels First 2001 visible CodeRed DDoS for dummies 2002 Rise of the Giants Multiple vectors propagation «Unvoluntarily» blocked the internet First bot based on IRC C&C Channel Competition with PrettyPark for the title Trin00, First «TFN, large Stacheldraht scale» worm Failed AgoBot to DoS Professional white house design web site SDBot Still the most popular IRC bot Page 11
12 Short botnet history 1988 Morris Worm 1993 EggDrop First 1998 «real GTBot» worm Propagated First 2000 bot based Major through on DDoS IRC C&C channels Channel First 2001 visible CodeRed DDoS for dummies Trin00, First 2002 «TFN, large Rise Stacheldraht scale of the» worm Giants 2003 Mass mailing worms Multiple vectors propagation «Unvoluntarily» blocked the internet Competition with PrettyPark for the title Failed AgoBot First to «large DoS Professional white scale house» worm design web site SDBot Failed PoC : to Melissa, Still DoSthe white «most I love house popular you web» IRC sitebot Netsky, Mytob Page 12
13 Short botnet history 1988 Morris Worm 1993 EggDrop First 1998 «real GTBot» worm Propagated First 2000 bot based Major through on DDoS IRC C&C channels Channel First 2001 visible CodeRed DDoS for dummies Trin00, First 2002 «TFN, large Rise Stacheldraht scale of the» worm Giants AgoBot 2003 First «large Mass Professional scale mailing» worm design worms 2004 Witty Multiple vectors propagation «Unvoluntarily» blocked the internet Competition with PrettyPark for the title Failed to DoS white house web site SDBot Failed PoC : to Melissa, Still DoSthe white «most I love house popular you web» IRC sitebot Netsky, First «Mytob 0-day» worm Launched 36 hours after discovery Page 13
14 Short botnet history 1988 Morris Worm 1993 EggDrop First 1998 «real GTBot» worm Propagated First 2000 bot based Major through on DDoS IRC C&C channels Channel Competition First 2001 visible CodeRed with DDoS PrettyPark for dummies for the title Trin00, First 2002 «TFN, large Rise Stacheldraht scale of the» worm Giants Failed AgoBot 2003 First to «large DoS Mass Professional white scale mailing house» worm design worms web site SDBot Failed PoC 2004 : to Melissa, Witty Still DoSthe white «most I love house popular you web» IRC sitebot Since 2005 The Botnet Ecosystem Multiple vectors propagation «Unvoluntarily» blocked the internet Netsky, First «Mytob 0-day» worm Launched Turning technology 36 hours after intodiscovery money A new actor on the field : organized crime No more «state of the art» research Evolution and variant of existing technologies Short-term exploits Page 14
15 Birth and growth of a botnet Page 15
16 Ecosystem actors The Good The Bad «Innocent» Systems Malicious Systems The Ugly 0-day, botnet, malware «markets» Page 16
17 Birth of a worm-based botnet Markets BUY ATTACK C&C Botnet Page 17
18 Birth of a botnet via spam Markets Relays BUY ATTACK C&C Botnet Page 18
19 Birth of a MPack-like botnet Markets Relays BUY SET C&C Botnet Page 19
20 Extending the botnet Basic propagation [urx] #foobar :.advscan lsass r -s PRIVMSG #foobar :[lsass]: Exploiting IP: XXX PRIVMSG #foobar :[TFTP]: File transfer started SDBot Page 20
21 Extending the botnet Advanced propagation WAREZ SITE harvest.cdkeys AgoBot Page 21
22 Into the Ecosystem Page 22
23 Making money with botnets Direct cash generation Spam Impacting stock values Stealing credential (phishing) «Nigerian scam» Advertisement Extorsion DDoS Private data stealth On-demand Hacking Page 23
24 Making money with botnets Botnet market Renting the botnet & services Time limited DoS generator Mail relays & spam campains Proxy chains to provide anonymity Advertisement via pop-ups Malware distribution Technology markets 0-day markets Corporate vs. Underground «Promoted» by security laws IE vulnerability ~ $ Tools / malware market «Hacking for dummies» MPack ~ 500 $ Page 24
25 Mapping the threat Map of the ecosystem Client-side vulnerability Most of current security concerns are involved in the ecosystem Page 25
26 Hurting the ecosystem Laws Financial Common laws against crime money Increase risks ad reduce interest for criminals Falls into organized crime prevention methods Efficient for «big» business not for $ exploits IT specific Illegal behaviors repression spam, intrusion etc. more or less effective Prevention of research Adopted by many countries Forbid security research and publication Leads to opposite effects, searchers going underground Page 26
27 Hurting the ecosystem Laws impact Client-side vulnerability No impact on operations Page 27
28 Hurting the ecosystem Education Computer security basics Anti-virus update Apply vendors security updates Relatively efficient Good usage of IT Do not click on everything! Avoid suspicious sites Only use legal software and licenses No illegal download of MP3, DivX Stop believing everybody wants to give you money! Merely useless : humans will be humans Page 28
29 Hurting the ecosystem Education impact Client-side vulnerability Mostly limited by lack of application kill users Page 29
30 Hurting the ecosystem Technologies Host-based technologies Local hygiene Patches,user accounts not admin, data encryption etc. Security technologies Anti-viruses, anti-spyware, HIPS, personal firewall Good efficiency but relies on end-user system Network-based technologies Traffic control Firewalls, NAC, Proxys Security enforcement Anti-Spam, IPS, URL filtering Efficient but very heterogeneous Page 30
31 Hurting the ecosystem Technology impact Client-side vulnerability Expensive and heterogeneous efficiency limited Page 31
32 Hurting the ecosystem All Together Client-side vulnerability The fight can be won Theoritically Page 32
33 The real world Reasons for a disaster Unlimited scope World-wide phenomenon reduces local laws impact International prosecution maybe impossible Everybody can be a victim enterprise, home users, universities etc. different level of education, security technologies etc. Global security impossible to provide Cost Management Lack of knowledge No one as a all-in-one solution Even if some claim they do Page 33
34 The command & control channel Page 34
35 Targeting the C&C Channel Strike to the heart Client-side vulnerability C&C channel is single point of failure Page 35
36 C&C characteristics Communication Protocols IRC 80% of current botnets Distributed and Reliable Clear text, most command known P2P Some experiments PhatBot (AgoBot variant) uses the WASTE network Probable future of IRC network Proprietary channels Usually based on Covert Channels and/or encryption Needs a «private» infrastructure Efficient at short-term but quickly blocked TOR to change this status Page 36
37 Blocking the C&C Prevention technologies Filtering Efficient against basic channels, who needs IRC anyway? Useless in all other cases Signatures Efficient against common commands issued through cleartext channels Efficient against major botnet variants Efficient to block most P2P communications Useless for encrypted and «home-made» channels Page 37
38 Blocking the C&C Prevention technologies Protocol anomalies Comes together with stateful analysis Efficient against covert channels Useless for other C&C channels Behavioral analysis Efficient in detecting abnormal use of legitimate traffic Relatively efficient against encrypted channels Useless against «low volume» C&C channels Page 38
39 Limitations Autonomous Botnets Few but famous : Morris Worm, CodeRed Definitely a pain AI to make them more and more dangerous Everybody s concern Channels to be blocked wherever computers are Unmanaged systems & networks will remain active One step behind anyway Prevention techniques are known Channels are designed to bypass Development takes time Page 39
40 Conclusion Page 40
41 Another never-ending story? Complete security is not realistic Prevention scope should be global Legal impact is long-term Secure behavior is becoming usual Most effects can be mitigated Botnet resources can be exhausted Page 41
42 Page 42
Endpoint Protection : Last line of defense?
Endpoint Protection : Last line of defense? First TC Noumea, New Caledonia 10 Sept 2018 Independent Information Security Advisor OVERVIEW UNDERSTANDING ENDPOINT SECURITY AND THE BIG PICTURE Rapid development
More informationCompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management
CompTIA Security+ Lecture Six Threats and Vulnerabilities Vulnerability Management Copyright 2011 - VTC Malware Malicious code refers to software threats to network and systems, including viruses, Trojan
More informationMalware Research at SMU. Tom Chen SMU
Malware Research at SMU Tom Chen SMU tchen@engr.smu.edu www.engr.smu.edu/~tchen Outline About SMU and Me Virus Research Lab Early Worm Detection Epidemic Modeling New Research Interests TC/BT/11-5-04 SMU
More informationAutomating Security Response based on Internet Reputation
Add Your Logo here Do not use master Automating Security Response based on Internet Reputation IP and DNS Reputation for the IPS Platform Anthony Supinski Senior Systems Engineer www.h3cnetworks.com www.3com.com
More informationCompTIA E2C Security+ (2008 Edition) Exam Exam.
CompTIA JK0-015 CompTIA E2C Security+ (2008 Edition) Exam Exam TYPE: DEMO http://www.examskey.com/jk0-015.html Examskey CompTIA JK0-015 exam demo product is here for you to test the quality of the product.
More informationEMERGING THREATS & STRATEGIES FOR DEFENSE. Paul Fletcher Cyber Security
EMERGING THREATS & STRATEGIES FOR DEFENSE Paul Fletcher Cyber Security Evangelist @_PaulFletcher Threats by Customer Environment Cloud Environment On Premise Environment 1.96% 0.13% 0.02% application-attack
More informationUTM 5000 WannaCry Technote
UTM 5000 WannaCry Technote The news is full of reports of the massive ransomware infection caused by WannaCry. Although these security threats are pervasive, and ransomware has been around for a decade,
More informationIntelligent and Secure Network
Intelligent and Secure Network BIG-IP IP Global Delivery Intelligence v11.2 IP Intelligence Service Brian Boyan - b.boyan@f5.com Tony Ganzer t.ganzer@f5.com 2 Agenda Welcome & Intro Introduce F5 IP Intelligence
More informationDynamic Botnet Detection
Version 1.1 2006-06-13 Overview The widespread adoption of broadband Internet connections has enabled the birth of a new threat against both service providers and the subscribers they serve. Botnets vast
More informationHow do you decide what s best for you?
How do you decide what s best for you? Experience Transparency Leadership Commitment Cost reduction Security Trustworthiness Credibility Confidence Reliability Compliance Privacy Expertise Flexibility
More informationSecuring Information Systems
Chapter 7 Securing Information Systems 7.1 2007 by Prentice Hall STUDENT OBJECTIVES Analyze why information systems need special protection from destruction, error, and abuse. Assess the business value
More informationINDEX. browser-hijacking adware programs, 29 brute-force spam, business, impact of spam, business issues, C
HausmanIndexFinal.qxd 9/2/05 9:24 AM Page 354 browser-hijacking adware programs, 29 brute-force spam, 271-272 business, impact of spam, 274-275 business issues, 49-51 C capacity, impact of security risks
More informationService Provider View of Cyber Security. July 2017
Service Provider View of Cyber Security July 2017 Quick Stats Caribbean and LatAm: 3 rd largest population of Internet Users You Are Here Visualization from the Opte Project of the various routes through
More informationSecurity Architect Northeast US Enterprise CISSP, GCIA, GCFA Cisco Systems. BRKSEC-2052_c Cisco Systems, Inc. All rights reserved.
Web 2.0 Security Recommendations Ken Kaminski Security Architect Northeast US Enterprise CISSP, GCIA, GCFA Cisco Systems 1 Agenda Reputation Services Web application security Secure Coding and Web Application
More informationSymantec Protection Suite Add-On for Hosted Security
Symantec Protection Suite Add-On for Hosted Email Security Overview Malware and spam pose enormous risk to the health and viability of IT networks. Cyber criminal attacks are focused on stealing money
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 3 Protecting Systems Objectives Explain how to harden operating systems List ways to prevent attacks through a Web browser Define
More informationSecuring Your Business Against the Diversifying Targeted Attacks Leonard Sim
Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim Manager, Client & Partner Services, Asia 1 Agenda 2010 Threats Targeted Attacks Defense Against Targeted Attacks Questions 2
More informationMassive Attack WannaCry Update and Prevention. Eric Kwok KL.CSE
Massive Attack WannaCry Update and Prevention Eric Kwok KL.CSE Wannacry Q: After patch ms17-010, your computer A: YES / NO won't be infect wannacry ransomware Wannacry Q: In order to against Wannacry attack,
More informationCyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)
Cyber Security Presenters: - Brian Everest, Chief Technology Officer, Starport Managed Services - Susan Pawelek, Accountant, Compliance and Registrant Regulation February 13, 2018 (webinar) February 15,
More informationCIH
mitigating at host level, 23 25 at network level, 25 26 Morris worm, characteristics of, 18 Nimda worm, characteristics of, 20 22 replacement login, example of, 17 signatures. See signatures SQL Slammer
More informationBotnets: major players in the shadows. Author Sébastien GOUTAL Chief Science Officer
Botnets: major players in the shadows Author Sébastien GOUTAL Chief Science Officer Table of contents Introduction... 3 Birth of a botnet... 4 Life of a botnet... 5 Death of a botnet... 8 Introduction
More informationIs the Best Defense a Good Offense? Christopher T. Pierson, CIPP/US, CIPP/G James T. Shreve, CIPP/US, CIPP/IT
Is the Best Defense a Good Offense? Christopher T. Pierson, CIPP/US, CIPP/G James T. Shreve, CIPP/US, CIPP/IT Agenda & Disclaimer 1. Scenarios 2. Issues - Status of Cybersecurity and Hacking 3. Capabilities
More informationThe Tension. Security vs. ease of use: the more security measures added, the more difficult a site is to use, and the slower it becomes
s10 Security 1 The Tension Security vs. ease of use: the more security measures added, the more difficult a site is to use, and the slower it becomes Security vs. desire of individuals to act anonymously
More informationSecurity Awareness. Presented by OSU Institute of Technology
Security Awareness Presented by OSU Institute of Technology Information Technologies Division Security Awareness Topics Social Engineering Phishing Social Networks Displaying Sensitive Information Wireless
More informationNext Generation Enduser Protection
Next Generation Enduser Protection Janne Timisjärvi Systems Engineer 10.5.2017 What is the the real threat? Encrypted! Give me all your Bitcoin$ Let s check if there Is something of value The Evolution
More informationCYBER ATTACKS DON T DISCRIMINATE. Michael Purcell, Systems Engineer Manager
CYBER ATTACKS DON T DISCRIMINATE Michael Purcell, Systems Engineer Manager THREAT LANDSCAPE IS HUGE AND ORGANIZED $8 TRILLION Will be cost of fighting cybercrime in 2022 (JuniperResearch) 14.5 BILLION
More informationIC B01: Internet Security Threat Report: How to Stay Protected
IC B01: Internet Security Threat Report: How to Stay Protected Piero DePaoli Director, Product Marketing IC B01: Internet Security Threat Report: How to Stay Protected 1 Topics 1 Targeted Attacks 2 Spam
More informationOffice 365 Buyers Guide: Best Practices for Securing Office 365
Office 365 Buyers Guide: Best Practices for Securing Office 365 Microsoft Office 365 has become the standard productivity platform for the majority of organizations, large and small, around the world.
More informationNetwork Security Fundamentals
Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 5 Viruses & Worms, Botnets, Today s Threats Viruses
More informationWho We Are! Natalie Timpone
Who We Are! Natalie Timpone Manager of Security Business Management Office Enterprise Security Awareness Manager Carmelo Walsh Security, Risk, and Compliance Security Awareness Subject Matter Expert Who
More informationMODERN DESKTOP SECURITY
MODERN DESKTOP SECURITY I M GOING TO BE HONEST. WE RE IN THE FIGHT OF OUR DIGITAL LIVES, AND WE ARE NOT WINNING! M I C H A E L M C C A U L, C H A I R M A N, U S H O M E L A N D S E C U R I T Y C O M M
More informationCE Advanced Network Security Botnets
CE 817 - Advanced Network Security Botnets Lecture 11 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained
More informationTraining UNIFIED SECURITY. Signature based packet analysis
Training UNIFIED SECURITY Signature based packet analysis At the core of its scanning technology, Kerio Control integrates a packet analyzer based on Snort. Snort is an open source IDS/IPS system that
More informationIBM Security Network Protection Solutions
Systems IBM Security IBM Security Network Protection Solutions Pre-emptive protection to keep you Ahead of the Threat Tanmay Shah Product Lead Network Protection Appliances IBM Security Systems 1 IBM Security
More informationThe First 12. An Hour-by-Hour Breakdown of a Threat Actor Inside Your Environment. Dr. Chase Cunningham ECSA,
The First 12 An Hour-by-Hour Breakdown of a Threat Actor Inside Your Environment Dr. Chase Cunningham ECSA, LPT HEAD OF THREAT RESEARCH & DEVELOPMENT, ARMOR @CynjaChaseC Hour 1 0100 HOURS Target Observation
More informationEnterprise D/DoS Mitigation Solution offering
Enterprise D/DoS Mitigation Solution offering About the Domain TCS Enterprise Security and Risk Management (ESRM) offers full services play in security with integrated security solutions. ESRM s solution
More informationMay the (IBM) X-Force Be With You
Ann Arbor, Michigan July 23-25 May the (IBM) X-Force Be With You A QUICK PEEK INTO ONE OF THE MOST RENOWNED SECURITY TEAMS IN THE WORLD Marlon Machado Worldwide Standardization Leader, Application Security
More informationACS / Computer Security And Privacy. Fall 2018 Mid-Term Review
ACS-3921-001/4921-001 Computer Security And Privacy Fall 2018 Mid-Term Review ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been adopted and/or modified
More informationINF3700 Informasjonsteknologi og samfunn. Application Security. Audun Jøsang University of Oslo Spring 2015
INF3700 Informasjonsteknologi og samfunn Application Security Audun Jøsang University of Oslo Spring 2015 Outline Application Security Malicious Software Attacks on applications 2 Malicious Software 3
More informationLarge-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity
Computer Crime and Intellectual Property Section Large-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity Anthony V. Teelucksingh Computer Crime and Intellectual Property Section (CCIPS) Criminal
More informationRANSOMWARE PROTECTION. A Best Practices Approach to Securing Your Enterprise
RANSOMWARE PROTECTION A Best Practices Approach to Securing Your Enterprise TABLE OF CONTENTS Introduction...3 What is Ransomware?...4 Employee Education...5 Vulnerability Patch Management...6 System Backups...7
More informationFast Deployment of Botnet Detection with Traffic Monitoring
2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing Fast Deployment of Botnet Detection with Traffic Monitoring Chung-Huang Yang Nation Kaohsiung Normal
More informationThe Invisible Threat of Modern Malware Lee Gitzes, CISSP Comm Solutions Company
The Invisible Threat of Modern Malware Lee Gitzes, CISSP Comm Solutions Company November 12, 2014 Malware s Evolution Why the change? Hacking is profitable! Breaches and Malware are Projected to Cost $491
More informationThe Bots Are Coming The Bots Are Coming Scott Taylor Director, Solutions Engineering
The Bots Are Coming The Bots Are Coming Scott Taylor Director, Solutions Engineering Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information
More informationEthical Hacking and Prevention
Ethical Hacking and Prevention This course is mapped to the popular Ethical Hacking and Prevention Certification Exam from US-Council. This course is meant for those professionals who are looking for comprehensive
More informationRSA Web Threat Detection
RSA Web Threat Detection Online Threat Detection in Real Time Alaa Abdulnabi. CISSP, CIRM RSA Pre-Sales Manager, TEAM Region 1 Web Threat Landscape In the Wild Begin Session Login Transaction Logout Web
More informationA Review Paper on Network Security Attacks and Defences
EUROPEAN ACADEMIC RESEARCH Vol. IV, Issue 12/ March 2017 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) A Review Paper on Network Security Attacks and ALLYSA ASHLEY
More informationData Communication. Chapter # 5: Networking Threats. By: William Stalling
Data Communication Chapter # 5: By: Networking Threats William Stalling Risk of Network Intrusion Whether wired or wireless, computer networks are quickly becoming essential to everyday activities. Individuals
More informationChapter 6 Network and Internet Security and Privacy
Chapter 6 Network and Internet Security and Privacy Learning Objectives LO6.1: Explain network and Internet security concerns LO6.2: Identify online threats LO6.3: Describe cyberstalking and other personal
More informationIntroduction to Information Security Dr. Rick Jerz
Introduction to Information Security Dr. Rick Jerz 1 Goals Explain the various types of threats to the security of information Discuss the different categorizations of security technologies and solutions
More informationNETWORK THREATS DEMAN
SELF-DEFENDING NETWORK NETWORK THREATS DEMAN NEW SECURITY: STRATEGIES TECHNOLOGIES Self-Propagating Threats A combination of: self propagating threats Collaborative applications Interconnected environments
More information(Botnets and Malware) The Zbot attack. Group 7: Andrew Mishoe David Colvin Hubert Liu George Chen John Marshall Buck Scharfnorth
(Botnets and Malware) The Zbot attack Group 7: Andrew Mishoe David Colvin Hubert Liu George Chen John Marshall Buck Scharfnorth What Happened? Type of Attack Botnet - refers to group of compromised computers
More informationImproved C&C Traffic Detection Using Multidimensional Model and Network Timeline Analysis
Improved C&C Traffic Detection Using Multidimensional Model and Elad Menahem Avidan Avraham Modern Threats Are More Sophisticated & Evasive CYBER KILL CHAIN: Infection Phase Post-Infection Recon Weaponization
More informationSizing and Scoping ecrime
ICANN MEXICO CITY MARCH 5 TH, 2009 Sizing and Scoping ecrime Jeffrey R. Bedser President/COO The Internet Crimes Group Inc. ithreat Solutions Sophos: Downadup May Cause Friday the 13th / Southwest Airlines
More informationThreat Landscape vs Threat Management. Thomas Ludvik Næss Country Manager
Threat Landscape vs Threat Management Thomas Ludvik Næss Country Manager Threat Landscape Past, Present and Future So it begins in the year of 1802 Joseph Marie Jacquard 3 Very first computer virus 1971
More informationBringing the Fight to Them: Exploring Aggressive Countermeasures to Phishing and other Social Engineering Scams
Bringing the Fight to Them: Exploring Aggressive Countermeasures to Phishing and other Social Engineering Scams Allen Zhou Comp116 Final Presentation What is Phishing? Social Engineering Steal credentials,
More informationSecuring the SMB Cloud Generation
Securing the SMB Cloud Generation Intelligent Protection Against the New Generation of Threats Colin Brackman, National Distribution Manager, Consumer Sales, Symantec Christopher Covert Principal Product
More informationTHE ACCENTURE CYBER DEFENSE SOLUTION
THE ACCENTURE CYBER DEFENSE SOLUTION A MANAGED SERVICE FOR CYBER DEFENSE FROM ACCENTURE AND SPLUNK. YOUR CURRENT APPROACHES TO CYBER DEFENSE COULD BE PUTTING YOU AT RISK Cyber-attacks are increasingly
More informationImperva Incapsula Website Security
Imperva Incapsula Website Security DA T A SH E E T Application Security from the Cloud Imperva Incapsula cloud-based website security solution features the industry s leading WAF technology, as well as
More informationFuture-ready security for small and mid-size enterprises
First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,
More informationTHE BUSINESS CASE FOR OUTSIDE-IN DATA CENTER SECURITY
THE BUSINESS CASE FOR OUTSIDE-IN DATA CENTER SECURITY DATA CENTER WEB APPS NEED MORE THAN IP-BASED DEFENSES AND NEXT-GENERATION FIREWALLS table of contents.... 2.... 4.... 5 A TechTarget White Paper Does
More informationCertified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
More informationRadware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper
Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper Table of Contents Abstract...3 Understanding Online Business
More informationEvolution of Spear Phishing. White Paper
Evolution of Spear Phishing White Paper Executive Summary Phishing is a well-known security threat, but few people understand the difference between phishing and spear phishing. Spear phishing is the latest
More informationSecuring Your Amazon Web Services Virtual Networks
Securing Your Amazon Web Services s IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up a workload,
More informationChanging face of endpoint security
Changing face of endpoint security S A N T H O S H S R I N I V A S A N C I S S P, C I S M, C R I S C, C E H, C I S A, G S L C, C G E I T D I R E C T O R S H A R E D S E R V I C E S, H C L T E C H N O L
More informationHow to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis
White paper How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis AhnLab, Inc. Table of Contents Introduction... 1 Multidimensional Analysis... 1 Cloud-based Analysis...
More informationCisco Cyber Range. Paul Qiu Senior Solutions Architect
Cisco Cyber Range Paul Qiu Senior Solutions Architect Cyber Range Service A platform to experience the intelligent Cyber Security for the real world What I hear, I forget What I see, I remember What I
More informationFighting Spam, Phishing and Malware With Recurrent Pattern Detection
Fighting Spam, Phishing and Malware With Recurrent Pattern Detection White Paper September 2017 www.cyren.com 1 White Paper September 2017 Fighting Spam, Phishing and Malware With Recurrent Pattern Detection
More informationddos-guard.net Protecting your business DDoS-GUARD: Distributed protection against distributed attacks
ddos-guard.net Protecting your business DDoS-GUARD: Distributed protection against distributed attacks 2 WHAT IS A DDOS-ATTACK AND WHY ARE THEY DANGEROUS? Today's global network is a dynamically developing
More informationFIREWALL BEST PRACTICES TO BLOCK
Brought to you by Enterprie Control Systems FIREWALL BEST PRACTICES TO BLOCK Recent ransomware attacks like Wanna and Petya have spread largely unchecked through corporate networks in recent months, extorting
More informationMost Common Security Threats (cont.)
Most Common Security Threats (cont.) Denial of service (DoS) attack Distributed denial of service (DDoS) attack Insider attacks. Any examples? Poorly designed software What is a zero-day vulnerability?
More informationERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016
Abstract The Mirai botnet struck the security industry in three massive attacks that shook traditional DDoS protection paradigms, proving that the Internet of Things (IoT) threat is real and the grounds
More informationAgile Security Solutions
Agile Security Solutions Piotr Linke Security Engineer CISSP CISA CRISC CISM Open Source SNORT 2 Consider these guys All were smart. All had security. All were seriously compromised. 3 The Industrialization
More informationCyber Criminal Methods & Prevention Techniques. By
Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Meeting Agenda Trends Attacker Motives and Methods Areas of Concern Typical Assessment Findings ISO-17799 & NIST Typical Remediation
More informationFundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring
Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring Learning Objective Explain the importance of security audits, testing, and monitoring to effective security policy.
More informationSecurity Gap Analysis: Aggregrated Results
Email Security Gap Analysis: Aggregrated Results Average rates at which enterprise email security systems miss spam, phishing and malware attachments November 2017 www.cyren.com 1 Email Security Gap Analysis:
More informationCHAPTER 8 SECURING INFORMATION SYSTEMS
CHAPTER 8 SECURING INFORMATION SYSTEMS BY: S. SABRAZ NAWAZ SENIOR LECTURER IN MANAGEMENT & IT SEUSL Learning Objectives Why are information systems vulnerable to destruction, error, and abuse? What is
More informationOnline Security and Safety Protect Your Computer - and Yourself!
Online Security and Safety Protect Your Computer - and Yourself! www.scscu.com Fraud comes in many shapes and sizes, but the outcome is simple: the loss of both money and time. That s why protecting your
More informationThe Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015
The Cost of Phishing Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 Executive Summary.... 3 The Costs... 4 How To Estimate the Cost of an Attack.... 5 Table
More informationPerimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN
T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN Perimeter Defenses Enterprises need to take their security strategy beyond stacking up layers of perimeter defenses to building up predictive
More information3.5 SECURITY. How can you reduce the risk of getting a virus?
3.5 SECURITY 3.5.4 MALWARE WHAT IS MALWARE? Malware, short for malicious software, is any software used to disrupt the computer s operation, gather sensitive information without your knowledge, or gain
More informationSecurity & Phishing
Email Security & Phishing Best Practices In Cybersecurity Presenters Bill Shieh Guest Speaker Staff Engineer Information Security Ellie Mae Supervisory Special Agent Cyber Crime FBI 2 What Is Phishing?
More informationHow We Delivered Compliance to a London-based Law Firm. A Network Security Project Case Study.
How We Delivered Compliance to a London-based Law Firm. A Network Security Project Case Study. Contents. Introduction... 3 Our initial findings... 5 The solution.... 6 Using Gateway Antivirus for multi-layer
More informationPanda Security 2010 Page 1
Panda Security 2010 Page 1 Executive Summary The malware economy is flourishing and affecting both consumers and businesses of all sizes. The reality is that cybercrime is growing exponentially in frequency
More informationDiscover threats quickly, remediate immediately, and mitigate the impact of malware and breaches
Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches Introduction No matter how hard you work to educate your employees about the constant and evolving threats
More informationSOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications
Enabling and Securing Digital Business in Economy Protect s Serving Business Critical Applications 40 percent of the world s web applications will use an interface Most enterprises today rely on customers
More informationIBM Next Generation Intrusion Prevention System
IBM Next Generation Intrusion Prevention System Fadly Yahaya SWAT Optimizing the World s Infrastructure Oct 2012 Moscow 2012 IBM Corporation Please note: IBM s statements regarding its plans, directions,
More informationSecurity. The DynaSis Education Series for C-Level Executives
Email Security The DynaSis Education Series for C-Level Executives Threats to your IT network abound, many of them delivered through email. Fortunately, there are cost effective tools available to protect
More informationThe Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It
The Credential Phishing Handbook Why It Still Works and 4 Steps to Prevent It Introduction Phishing is more than 20 years old, but still represents more than 90% of targeted attacks. The reason is simple:
More informationPrevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,
Prevx 3.0 v3.0.1.65 Product Overview - Core Functionality April, 2009 includes overviews of MyPrevx, Prevx 3.0 Enterprise, and Prevx 3.0 Banking and Ecommerce editions Copyright Prevx Limited 2007,2008,2009
More informationAURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo
ETHICAL HACKING (CEH) CURRICULUM Introduction to Ethical Hacking What is Hacking? Who is a Hacker? Skills of a Hacker? Types of Hackers? What are the Ethics and Legality?? Who are at the risk of Hacking
More informationSecuring Your Microsoft Azure Virtual Networks
Securing Your Microsoft Azure Virtual Networks IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up
More informationANATOMY OF AN ATTACK!
ANATOMY OF AN ATTACK! Are Your Crown Jewels Safe? Dom Kapac, Security Evangelist WHAT DO WE MEAN BY CROWN JEWELS? Crown jewels for most organizations are critical infrastructure and data Data is a valuable
More informationBeyond Firewalls: The Future Of Network Security
Beyond Firewalls: The Future Of Network Security XChange University: IT Security Jennifer Blatnik 20 August 2016 Security Trends Today Network security landscape has expanded CISOs Treading Water Pouring
More information6 KEY SECURITY REQUIREMENTS
KEY SECURITY REQUIREMENTS for Next Generation Mobile Networks A Prevention-Oriented Approach to in Evolving Mobile Network Ecosystems A Prevention-Oriented Approach to in Evolving Mobile Network Ecosystems
More informationProtecting Against Modern Attacks. Protection Against Modern Attack Vectors
Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches
More informationSecuring Office 365 & Other SaaS
Securing Office 365 & Other SaaS PrecisionAccess Vidder, Inc. Securing Office 365 & Other SaaS 1 Executive Summary Securing Office 365 means securing Email, SharePoint, OneDrive, and a number of other
More informationCybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY
Cybersecurity THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY Gary Meshell World Wide Leader Financial Services Industry IBM Security March 21 2019 You have been breached; What Happens Next 2 IBM Security
More informationBasic Concepts in Intrusion Detection
Technology Technical Information Services Security Engineering Roma, L Università Roma Tor Vergata, 23 Aprile 2007 Basic Concepts in Intrusion Detection JOVAN GOLIĆ Outline 2 Introduction Classification
More information