350 likes | 421 Vues
From AV to Internetized Security Solution. --- The Analysis Report of Malware Technology in China in 2005. 马杰 Jeffrey Beijing Rising Tech. Co., Ltd. Travel. Agenda. Background Overview of the security industry Overview situation of viruses and spam Changes of viruses
E N D
From AV to Internetized Security Solution --- The Analysis Report of Malware Technology in China in 2005 马杰 Jeffrey Beijing Rising Tech. Co., Ltd.
Agenda • Background • Overview of the security industry • Overview situation of viruses and spam • Changes of viruses • Changes of purpose • Changes if anti-detection • Other threats on the internet • Unauthorized software (Rogue software) • Summary
Internet Statistics Data from: CNNIC
Security Industry Revenue Data from: CCID Consulting
Product Dispersal Data from: CCID Consulting
AV Market Share Distribution Data from: IDC 2005
Agenda • Background • Overview of the security industry • Overview situation of viruses and spam • Changes of viruses • Changes of purpose • Changes if anti-detection • Other threats on the internet • Unauthorized software (Rogue software) • Summary
Virus Statistics • 45059 new definitions added to virus database • From Jan. 1st to Nov. 15th, 2005 Data from: RISING
Most Active Top 10 Data from: RISING
Top 10 Worst Spam Countries (Jan. 19 2005) http://www.spamhaus.org
Top 10 Worst Spam Countries (Nov. 11 2005) http://www.spamhaus.org
Agenda • Background • Overview of the security industry • Overview situation of viruses • Changes of viruses • Changes of purpose • Changes if anti-detection • Other threats on the internet • Unauthorized software (Rogue software) • Summary
Gain Economic Benefits Show off Skills Changes of the purpose of virus creation • Gain economic benefits • Virtual property • Bank accounts • Increase website hits
Viruses have an Economic Purposes • Total: 4163 found till Nov. 15th, 2005 Data from: RISING
Agenda • Background • Overview of the security industry • Overview situation of viruses • Changes of viruses • Changes of purpose • Changes if anti-detection • Other threats on the internet • Unauthorized software (Rogue software) • Summary
Changes to Anti-Detection • The economic benefits by improving anti-detection technology • Methods used for anti-detection • Root Kit • Entry Point Obscuring • Source code level morphing
Root Kits • Hooks Native API Hides Processes – ZwQuerySystemInformation() Hides Files – ZwQueryDirectoryFile() etc… • Many Open Source Code www.rootkit.com
The Viruses Using Root Kit Technology Viruses using root kit technology found in 2005: 325 Data from: RISING
Agenda • Background • Overview of the security industry • Overview situation of viruses • Changes of viruses • Changes of purpose • Changes if anti-detection • Other threats on the internet • Unauthorized software (Rogue software) • Summary
Other Threats • Rogue software • Ad-ware • Spy-ware • Browser hijack and ActiveX controls • Track-ware • Malicious shareware • … • Fishing • etc…
Rogue software Data from: UNB
How Rogue Software Avoid Being Deleted? • Make themselves automatically launch • Install drivers to get a higher privilege • Create mutually protecting threads • Inject DLLs or threads into another process • Rubbish Files
To remove or not to remove… It’s hard to make the decision. • To remove: • Annoys the users. • Not to remove: • Free • Provides some useful features.
Agenda • Background • Overview of the security industry • Overview situation of viruses • Changes of viruses • Changes of purpose • Changes if anti-detection • Other threats on the internet • Unauthorized software (Rogue software) • Summary
The situation of viruses in 2005 • Economic purposes significantly lead to the increase of new viruses and virus technologies. • Weaknesses of a system is the major reason of virus infection. • Network is still the most commonly used media though which viruses spread. • IM tools are utilized by viruses to spread over internet. • New platforms are becoming the target of viruses • mobile phones • PDAs • and etc… • Open source is still the origin of lots of viruses
File System openomy project
People Internetized • A lot of things around us getting internetized • Job • E-mail • Web office • Instance Message • Life • Blog • Online Game • Online Movie
Threats Internetized Attack on internet Threats Gain from internet
Protection Needs to be Internetized! • Virus • Spam • Hack • Spy-ware • Browser hijack • Fishing
Protect Users Online Security • An internetized security solution provides: • Antivirus • Anti-spam • Firewall • Password protect • Anti browser hijack • Anti fishing
The Hardest Part I wish that I could work it out … Thank you! Jeffrey@rising.com.cn