SlideShare una empresa de Scribd logo
1 de 42
MALWARE 2.0
     Shane Ochotny
TYPES OF MALWARE
 Worms                                     Exploits

                    Trojans
                                  Adware
          Spyware
                                                Keyloggers
                              Viruses

Dialers
                                                      Rootkits
                          Rogue
STATISTICS
                TREND MICRO UNIQUE THREAT GROWTH




20,000,000


15,000,000


10,000,000


 5,000,000


        0
         2005           2006              2007     2008
STATISTICS
                TREND MICRO UNIQUE THREAT GROWTH




20,000,000


15,000,000


10,000,000


 5,000,000


        0
         2005           2006              2007     2008
MALWARE 1.0
BORED KIDS
   80’s - 90’s
INFECTION VECTORS
      File Replication
MALWARE 2.0
ORGANIZED CRIME

Groups Discovering and Selling Exploits
         Developing and Selling Malware
         Hosting Exploits and Malware
         Selling the Stolen Data
         Using the Stolen Data
ORGANIZED CRIME

        Discovering and Selling Exploits
Groups Developing and Selling Malware
        Hosting Exploits and Malware
        Selling the Stolen Data
        Using the Stolen Data
ORGANIZED CRIME

        Discovering and Selling Exploits
        Developing and Selling Malware
Groups Hosting Exploits and Malware
        Selling the Stolen Data
        Using the Stolen Data
ORGANIZED CRIME

         Discovering and Selling Exploits
         Developing and Selling Malware
         Hosting Exploits and Malware
Groups Selling the Stolen Data
         Using the Stolen Data
ORGANIZED CRIME

        Discovering and Selling Exploits
        Developing and Selling Malware
        Hosting Exploits and Malware
        Selling the Stolen Data
Groups Using the Stolen Data
MONETARY GAIN
MONEY HOW?
                                        Bank Accounts
      Authentication Credentials


Credit Card Numbers        Send Spam           Emails


   DDoS                Address Book Contacts


        Social Security Numbers            Screenshots


                                       Recent Websites
  Keystrokes          DNS Redirect
INFECTION VECTORS



         Exploits


    Social Engineering
REACHING THE USERS
IFRAMES
MALVERTIZEMENTS
REDIRECTION



MySpace        IFrame        Bad Website

MySpace     Malvertizement   Bad Website
REDIRECTION



MySpace        IFrame        Bad Website

MySpace     Malvertizement   Bad Website
REDIRECTION



MySpace        IFrame        Bad Website

MySpace     Malvertizement   Bad Website
REDIRECTION



MySpace        IFrame        Bad Website

MySpace     Malvertizement   Bad Website
REDIRECTION



MySpace        IFrame        Bad Website

MySpace     Malvertizement   Bad Website
REDIRECTION



MySpace        IFrame        Bad Website

MySpace     Malvertizement   Bad Website
HIGH PROFILE WEBSITES
EXPLOITS
TAKE ADVANTAGE OF SOFTWARE VULNERABILITIES




   No User Interaction
   No Downloading Accidentally
   No User Knowledge
SOCIAL ENGINEERING
  TAKES ADVANTAGE OF USER VULNERABILITIES
SOCIAL ENGINEERING
  TAKES ADVANTAGE OF USER VULNERABILITIES
SOCIAL ENGINEERING
  TAKES ADVANTAGE OF USER VULNERABILITIES
SOCIAL ENGINEERING
  TAKES ADVANTAGE OF USER VULNERABILITIES
MALWARE SOURCES
                     THREATEXPERT.COM


Canada               United Kingdom       Russia
 0.67%                    6.17%           22.29%



     United States
         6.42%                              China
                                            32.07%

                                 Africa
                                 0.17%

            Brazil
            6.92%
WHY BARCAMP?
SOCIAL THREATS
    Facebook


    MySpace


    YouTube


    Twitter


    Instant Messaging
FACEBOOK
MYSPACE
  JULY 2006
YOUTUBE
TWITTER
INSTANT MESSAGING
Network Anti-Malware
Passive on the Network
No Client Software
MALWARE SOURCES
                     THREATEXPERT.COM


Canada               United Kingdom       Russia
 0.67%                    6.17%           22.29%



     United States
         6.42%                              China
                                            32.07%

                                 Africa
                                 0.17%

            Brazil
            6.92%
MALWARE 2.0
     Shane Ochotny

Más contenido relacionado

Similar a Malware 2.0

Today's malware aint what you think
Today's malware aint what you thinkToday's malware aint what you think
Today's malware aint what you thinkNathan Winters
 
Owasp e crime-london-2012-final
Owasp e crime-london-2012-finalOwasp e crime-london-2012-final
Owasp e crime-london-2012-finalMarco Morana
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?Samvel Gevorgyan
 
Black Hat Protection and Q&A - Andre Alpar, Dominik Wojcik and Ralph Tegtmeier
Black Hat Protection and Q&A - Andre Alpar, Dominik Wojcik and Ralph TegtmeierBlack Hat Protection and Q&A - Andre Alpar, Dominik Wojcik and Ralph Tegtmeier
Black Hat Protection and Q&A - Andre Alpar, Dominik Wojcik and Ralph Tegtmeierauexpo Conference
 
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...HackerOne
 
Social networks security risks
Social networks security risksSocial networks security risks
Social networks security risksosuhaibany
 
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionScaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionWayne Huang
 
TRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasTRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasAditya K Sood
 
Metascan Multi-scanning Technology
Metascan Multi-scanning TechnologyMetascan Multi-scanning Technology
Metascan Multi-scanning TechnologyOPSWAT
 
Why do THEY want your digital devices?
Why do THEY want your digital devices?Why do THEY want your digital devices?
Why do THEY want your digital devices?ESET
 
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...Eric Kolb
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityJay Moliya
 
Best & Worst of Cybersecurity
Best & Worst of CybersecurityBest & Worst of Cybersecurity
Best & Worst of CybersecurityDavid Amrani
 

Similar a Malware 2.0 (20)

Today's malware aint what you think
Today's malware aint what you thinkToday's malware aint what you think
Today's malware aint what you think
 
Owasp e crime-london-2012-final
Owasp e crime-london-2012-finalOwasp e crime-london-2012-final
Owasp e crime-london-2012-final
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?
 
Botnets used for ad fraud spam ddos attacks
Botnets used for ad fraud spam ddos attacksBotnets used for ad fraud spam ddos attacks
Botnets used for ad fraud spam ddos attacks
 
Black Hat Protection and Q&A - Andre Alpar, Dominik Wojcik and Ralph Tegtmeier
Black Hat Protection and Q&A - Andre Alpar, Dominik Wojcik and Ralph TegtmeierBlack Hat Protection and Q&A - Andre Alpar, Dominik Wojcik and Ralph Tegtmeier
Black Hat Protection and Q&A - Andre Alpar, Dominik Wojcik and Ralph Tegtmeier
 
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ratzan2
Ratzan2Ratzan2
Ratzan2
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
quick-heal-threat-report-q2-2023.pdf
quick-heal-threat-report-q2-2023.pdfquick-heal-threat-report-q2-2023.pdf
quick-heal-threat-report-q2-2023.pdf
 
quick-heal-threat-report-q2-2023.pdf
quick-heal-threat-report-q2-2023.pdfquick-heal-threat-report-q2-2023.pdf
quick-heal-threat-report-q2-2023.pdf
 
Social networks security risks
Social networks security risksSocial networks security risks
Social networks security risks
 
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionScaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware Infection
 
TRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasTRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , Texas
 
Metascan Multi-scanning Technology
Metascan Multi-scanning TechnologyMetascan Multi-scanning Technology
Metascan Multi-scanning Technology
 
Why do THEY want your digital devices?
Why do THEY want your digital devices?Why do THEY want your digital devices?
Why do THEY want your digital devices?
 
Ratzan2
Ratzan2Ratzan2
Ratzan2
 
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Best & Worst of Cybersecurity
Best & Worst of CybersecurityBest & Worst of Cybersecurity
Best & Worst of Cybersecurity
 

Último

Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 

Último (20)

Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 

Malware 2.0