1 / 32

Cyber- [.......] Hype or Trend? The drivers behind malware development

Cyber- [.......] Hype or Trend? The drivers behind malware development. Information Security Distance Learning Weekend Conference 7 th - 8 th September 2013. Ram Herkanaidu Education Manager Kaspersky Lab. Numbers. Kaspersky Lab. Evolution of malware waves we have to deal with. 1994.

jules
Télécharger la présentation

Cyber- [.......] Hype or Trend? The drivers behind malware development

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber-[.......] Hype or Trend?The drivers behind malware development Information Security Distance Learning Weekend Conference 7th - 8thSeptember 2013 Ram Herkanaidu Education Manager Kaspersky Lab

  2. Numbers

  3. Kaspersky Lab Evolution of malware waves we have to deal with 1994 One new virus every hour PAGE 3 |

  4. Kaspersky Lab Evolution of malware waves we have to deal with 2006 One new virus every minute PAGE 4 |

  5. Kaspersky Lab Evolution of malware waves we have to deal with 2011 One new virus every second Or 70.000 samples/day PAGE 5 |

  6. What about 2013 ?

  7. Kaspersky Lab • is currently processing • 200,000 • unique malware samples • EVERY DAY What about 2012 ?

  8. Vulnerabilities and exploits • Applications containing vulnerabilities targeted by web exploits in 2012 Source: Kaspersky Lab January 2013

  9. Phishing – June 2013 Source: Kaspersky Lab June2013 PAGE 9 |

  10. Mobile malware Some statistics • The growing use of the Internet to protest • Number of mobile malware families to-date: 679 • Number of mobile malware modifications to-date: 107,068 • Mobile malware found in July 2013: 4,181 new modifications • 99.96 per cent of all mobile malware found in 2012 is targeting Android • The number of samples gathered in 2012 alone is more than six times higher than in the previous 7 years altogether • Source: Kaspersky Lab July 2013 PAGE 10 |

  11. Mobile malware • Distribution of malware targeting Android OS detected on user devices by behaviour: Q3 2012 Source: Kaspersky Lab December2012 PAGE 11 |

  12. Malware victims • Top 20 countries with the greatest proportion of users attacked while surfing the web: H1 2013 Source: Kaspersky Security Network: Web Anti-virus: Sept 2013

  13. Top countries with harmful hostings • The top 20 countries within whose territories are located the malicious hosting services most actively used by cybercriminals: • H1 2013 Source: Kaspersky Security Network: Web Anti-virus: Sept 2013

  14. Threats & Tactics

  15. Humans are vulnerable too

  16. Spear phishing Or COO, CTO, CFO, etc.

  17. Types of attack Cyber-weapons: ‘Destroyers’ Espionage programs Cyber-sabotage tools Targeted attacks ‘Traditional’ cybercrime

  18. Company perceptions & disclosure Kaspersky Lab survey, June 2011

  19. Targeted attacks • Some of the victims: • Google • RSA • Lockheed Martin • HBGary • Sony • Comodo • DigiNotar • Saudi Aramco • LinkedIn • Adobe • Syrian Ministry of Foreign Affairs • New York Times

  20. Cyberespionage Stealing commercial or military secrets “There’s no such thing as ‘secure’ any more. The most sophisticated adversaries are going to go unnoticed on our networks. We have to build our systems on the assumption that adversaries will get in. We have to, again, assume that all the components of our system are not safe, and make sure we’re adjusting accordingly.” Debora Plunkett, NSA Director Quoted in “NSA Switches to Assuming Security Has Always Been Compromised”

  21. Cyberattacks “… cyber weapons are: a) effective; b) much cheaper than traditional weapons; c) difficult to detect; d) difficult to attribute to a particular attacker …; e) difficult to protect against …; f) can be replicated at no extra cost. What’s more, the seemingly harmless nature of these weapons means their owners have few qualms about unleashing them, with little thought for the consequences. Eugene Kaspersky June 2012 http://eugene.kaspersky.com/2012/06/14/the-flame-that-changed-the-world/

  22. Cyber activism The growing use of the Internet to protest

  23. Cyber weapons?

  24. 2010 2011 2012 2012 Espionage. Sabotage. Cyberwar.

  25. Cyber weapons

  26. Solutions

  27. Technical Solutions

  28. Non-Technical Solutions

  29. Future of cyber…. • Profit is still main motivator. We’ll see • More targeted attacks • More state backed malware • More cyber activism • Cyber defence • Intergovernmental / legal cooperation • Connected devices needing to be secured • Critical Infrastructure security

  30. Ram Herkanaidu Education Manager Kaspersky Lab ram.herkanaidu@kaspersky.com

More Related