Streamlining Python Development: A Guide to a Modern Project Setup
Looking Back to Protect the Future: Cybercrime Trends and Advanced Threat Defense
1. CyberCrime, CyberSpy,
CyberWar – Looking back in
order to protect the future
JD Sherry
VP of Public Technology and Solutions
@jdsherry
2. Discussion Outcomes
I. How might organizations learn from elite hackers?
II. Given the widespread use of APTs and the evolution of the cyber
attack chain- how can advanced situational awareness be achieved?
III. Predictions for 2013 and how can we counter measure?
3. Copyright 2013 Trend Micro Inc. SALES KICKOFF 2013
INFORMATION HAS BECOME
YOUR MOST STRATEGIC ASSET
Identify trends
Understand customer behavior
Analyze opportunities
Discover efficiencies
4. The New Reality
• One new threat created every second 1
• A cyber intrusion happens every 5 minutes 2
• Over 90% of enterprises have malware 1
• Almost 75% have one or more bots 1
• Mobile malware outpacing PC malware
– 350,000 Android pieces in 2012
Sources: 1: Trend Micro, 2012, 2: US-Cert 2012
6. • Localized attacks such as malware that will not execute unless certain
conditions are met, such as language settings, or “watering hole”
attacks that will only affect certain geographic regions or even only
specific netblocks.
• The malware used in targeted attacks will have destructive capacity,
either as its primary intent or as a clean-up mechanism to cover the
attackers’ tracks.
• Social, political and economic indicators must be used in conjunction
with technical indicators to fully assess and analyze targeted attacks.
Targeted Attack Trends
10. The Greatest Trick the Devil Ever Pulled was Convincing the
World that He Didn’t Exist…
• Kevin Spacey aka Verbal Kint-“The Usual Suspects”
11. Chinese Actors Gaining Headlines but…
• Trend Micro has concluded that Eastern European hackers pose a greater
threat than East Asian hackers
• East Asian objectives: speed and cost-effectiveness.
• Attacks are persistent, but use known vulnerabilities and malware and don’t
hide their tracks as well.
• Eastern European objectives: remain hidden throughout the operation and
build online reputation. Attacks use custom malware and innovative
techniques.
12. Eastern European Tactics
• Malware is innovative: RATs have all capabilities hard- coded internally;
encrypted traffic, dynamic drop zones, complex command & control
• Infrastructure is internal to the operation, or bulletproof hosts are carefully
selected
• Professionals who build a reputation over time; they respect and do not
attack the motherland
• Generally control their own servers, develop DNS servers, and create
sophisticated traffic systems for attacks. Hallmark is to maintain total
control.
13. In the News…
• Spanish police Ransomware-REVETON
– $1M per year revenue stream
– Victims tricked into paying attackers posing as law enforcement
– Computers compromised as well
– Trend Micro corroborates with Spanish police to bring down
• South Korean media and banking attacks
– Destructive Trojan/logic bombs that erased MBR
• Sleep cycle set to cause mayhem on March 20 at 2PM.
– Trend Micro provides intelligence prior to attack
– All codes detected by APT hunter-Deep Discovery
• Major Korean bank avoids major attack
18. Banking Malware: Customized and Quiet
• Citadel – modularized malware that steals online-banking credentials
• TinBa- Tiny Banker 56K large- memory injection
• SpyEye- Automated Transfer Systems
• Eurograbber – multistaged attacks that compromise desktops and
mobile devices
• Gozi-Prinimalka – spring attack to be aimed at 30 U.S. banking
institutions
• High Roller - uses automation to drain high-value bank accounts
21. How do you answer these questions?
• Have you been targeted by an attack?
Unfortunately Yes!
Not sure? But would like to know!
• How do you know?
Data breach, forensic analysis
Continuous Monitoring
Security audit
Incident response, alerts
Custom threat defense
• Why are you being targeted?
• What are they after?
22. Detection Begins with Network Indicators
• Changing C&C protocols requires considerable effort
• Network traffic can be correlated with other indicators to provide
proactive detection
• Unknown threats may be detected by extrapolating methods and
characteristics from known threat communication behaviors
24. Data Center
Physical Virtual Private Cloud Public Cloud
Cloud and Data Center Security
Anti-Malware
Integrity
Monitoring
Encryption
Log
Inspection
Firewall
Intrusion
Prevention
Data Center Ops
Security
26. Risk Management 101
6/5/2013 Copyright 2013 Trend Micro Inc.
1. Has the cyber security posture of all third parties been audited?
2. Is access to all sensitive systems and computers governed by two factor authentication?
3. Does a log inspection program exist? How frequently are they reviewed?
4. Does file integrity monitoring exist?
5. Can vulnerabilities be virtually patched?
6. Is MDM and Mobile Application Reputation software utilized?
7. Do you utilize a DLP?
8. Can you migrate your layered security into the cloud?
9. Do you maintain multi-level rule-based event correlation? Is there custom sandbox
analysis?
10. Do you have access to global threat intelligence?
11. Can you transfer your risk?