350 likes | 423 Vues
This report analyzes the malware technology landscape in China in 2005, focusing on viruses, spam, anti-detection techniques, and other internet threats. Gain insights on economic benefits and changes in virus creation purposes.
E N D
From AV to Internetized Security Solution --- The Analysis Report of Malware Technology in China in 2005 马杰 Jeffrey Beijing Rising Tech. Co., Ltd.
Agenda • Background • Overview of the security industry • Overview situation of viruses and spam • Changes of viruses • Changes of purpose • Changes if anti-detection • Other threats on the internet • Unauthorized software (Rogue software) • Summary
Internet Statistics Data from: CNNIC
Security Industry Revenue Data from: CCID Consulting
Product Dispersal Data from: CCID Consulting
AV Market Share Distribution Data from: IDC 2005
Agenda • Background • Overview of the security industry • Overview situation of viruses and spam • Changes of viruses • Changes of purpose • Changes if anti-detection • Other threats on the internet • Unauthorized software (Rogue software) • Summary
Virus Statistics • 45059 new definitions added to virus database • From Jan. 1st to Nov. 15th, 2005 Data from: RISING
Most Active Top 10 Data from: RISING
Top 10 Worst Spam Countries (Jan. 19 2005) http://www.spamhaus.org
Top 10 Worst Spam Countries (Nov. 11 2005) http://www.spamhaus.org
Agenda • Background • Overview of the security industry • Overview situation of viruses • Changes of viruses • Changes of purpose • Changes if anti-detection • Other threats on the internet • Unauthorized software (Rogue software) • Summary
Gain Economic Benefits Show off Skills Changes of the purpose of virus creation • Gain economic benefits • Virtual property • Bank accounts • Increase website hits
Viruses have an Economic Purposes • Total: 4163 found till Nov. 15th, 2005 Data from: RISING
Agenda • Background • Overview of the security industry • Overview situation of viruses • Changes of viruses • Changes of purpose • Changes if anti-detection • Other threats on the internet • Unauthorized software (Rogue software) • Summary
Changes to Anti-Detection • The economic benefits by improving anti-detection technology • Methods used for anti-detection • Root Kit • Entry Point Obscuring • Source code level morphing
Root Kits • Hooks Native API Hides Processes – ZwQuerySystemInformation() Hides Files – ZwQueryDirectoryFile() etc… • Many Open Source Code www.rootkit.com
The Viruses Using Root Kit Technology Viruses using root kit technology found in 2005: 325 Data from: RISING
Agenda • Background • Overview of the security industry • Overview situation of viruses • Changes of viruses • Changes of purpose • Changes if anti-detection • Other threats on the internet • Unauthorized software (Rogue software) • Summary
Other Threats • Rogue software • Ad-ware • Spy-ware • Browser hijack and ActiveX controls • Track-ware • Malicious shareware • … • Fishing • etc…
Rogue software Data from: UNB
How Rogue Software Avoid Being Deleted? • Make themselves automatically launch • Install drivers to get a higher privilege • Create mutually protecting threads • Inject DLLs or threads into another process • Rubbish Files
To remove or not to remove… It’s hard to make the decision. • To remove: • Annoys the users. • Not to remove: • Free • Provides some useful features.
Agenda • Background • Overview of the security industry • Overview situation of viruses • Changes of viruses • Changes of purpose • Changes if anti-detection • Other threats on the internet • Unauthorized software (Rogue software) • Summary
The situation of viruses in 2005 • Economic purposes significantly lead to the increase of new viruses and virus technologies. • Weaknesses of a system is the major reason of virus infection. • Network is still the most commonly used media though which viruses spread. • IM tools are utilized by viruses to spread over internet. • New platforms are becoming the target of viruses • mobile phones • PDAs • and etc… • Open source is still the origin of lots of viruses
File System openomy project
People Internetized • A lot of things around us getting internetized • Job • E-mail • Web office • Instance Message • Life • Blog • Online Game • Online Movie
Threats Internetized Attack on internet Threats Gain from internet
Protection Needs to be Internetized! • Virus • Spam • Hack • Spy-ware • Browser hijack • Fishing
Protect Users Online Security • An internetized security solution provides: • Antivirus • Anti-spam • Firewall • Password protect • Anti browser hijack • Anti fishing
The Hardest Part I wish that I could work it out … Thank you! Jeffrey@rising.com.cn